This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post The Next Stage of Mobile Quickening: Links Get Intelligent appeared first on John Battelle's Search Blog. How Branch Metrics works…click to enlarge. Early in a conversation with Alex Austin, CEO of mobile startup Branch Metrics , I had to interrupt and ask what seemed like a really dumb question. “So, wait, Alex, you’re telling me that the essence of your company’s solution is that it… makes sure a link works?
This presentation is adapted from a tutorial I wrote for AIIM , which is available in their SharePoint Resource Center. I also presented some of this material at the SharePoint Users Group of DC (SUGDC) on 9/11/2014. How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information from Kevin Parker. The AIIM Resource Centers offer lots of tutorials, webinars, publications, perspectives and more on SharePoint and a host of Information Management topics.
The other day I got a note, from a DB2 for z/OS DBA, in which I was asked for my thoughts regarding the selection of page size for a table space. I typed out what I hoped would be a useful response, and found myself thinking, as I sometimes do, "Hey -- I could turn this into a blog entry." And so I have. I'll start here by offering some guidelines on page size selection for table spaces, and then I'll shift to the index perspective on the matter.
Software Robots – friend or foe? p.butler@cgi.com. Fri, 10/31/2014 - 04:00. Robotics are not new. They have existed in manufacturing for many years and their potential has been showcased again by Honda in the form of New ASIMO , which I personally think is a fantastic piece of engineering. But what are software robots? Software Robots, or Robotic Process Automation to use its correct name, is the “application of technology that allows employees in a company to configure computer software or a ‘
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On October 24, 2014, the Federal Communications Commission announced that it intends to impose a $10 million fine on TerraCom, Inc. (“TerraCom”) and YourTel America, Inc. (“YourTel”) for violating privacy laws relating to their customers’ personal information. This announcement marks the FCC’s first enforcement action in the data security arena as well as its largest privacy action to date.
ARMA International is all-in on Information Governance. I am not privy to ARMA Board meetings, nor have I talked about this with the staff HQ. But walking into the annual conference in San Diego this week, the switch from RIM to IG was inescapable. Traditionalists may bemoan the blurring focus, seeing it as a dilution of discipline or a paean to fashionable modernity.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
ARMA International is all-in on Information Governance. I am not privy to ARMA Board meetings, nor have I talked about this with the staff HQ. But walking into the annual conference in San Diego this week, the switch from RIM to IG was inescapable. Traditionalists may bemoan the blurring focus, seeing it as a dilution of discipline or a paean to fashionable modernity.
'The post My Picks for NewCo Silicon Valley appeared first on John Battelle's Search Blog. We’re more than halfway through the NewCo festival season, with Amsterdam, San Francisco, Detroit, New York, and London/UK behind us, and Silicon Valley, Boulder, and Los Angeles coming up. Next up is Silicon Valley , which goes off Oct. 21 – 23, centered on the axis of Palo Alto.
'The post Living Systems and The Information First Company appeared first on John Battelle's Search Blog. A map tracing the information flows within Uber’s San Francisco market. One of the great joys of my career is the chance to speak at gatherings of interesting people. Sometimes it’s an unscripted, wide ranging conversation (like during Advertising Week , for example), but other times it’s a formal presentation, which means many hours of preparation and reportage.
'The post Around The Kitchen Table, a Better Way To Finance “Secondaries” Is Born appeared first on John Battelle's Search Blog. Nearly a decade ago I was two years into starting a new company, one that was growing quickly, but at the same time struggling with all the classic problems of a startup. We needed to raise more capital, we needed to hire more of the right people, and we needed to retain and motivate the people we already had brought onboard.
'The post “Peak Google”? Maybe, But Is “Native” The Reason? appeared first on John Battelle's Search Blog. From Thompson’s “Peak Google” post. I love Ben Thompson’s Stratechery site, so much in fact that I’m writing a response to his recent “ Peak Google ” post, even though these days most of us limit our bloggy commentary to the 140-character windows of Twitter.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
'The post My NewCo Los Angeles Picks appeared first on John Battelle's Search Blog. I love LA. There, I said it. Yes, I made my entire career and life up here in the Bay Area, and the Dodgers bother me immensely. But I was born in LA, I grew up there, and every time I get back, I get homesick for the light, the warm air, the heady nonsense, and – lately – the extraordinary business culture that’s been brewing these past five or ten years.
'The post Else 10.13.14: Smiling Happy Facebook People (Not Teens, Though) appeared first on John Battelle's Search Blog. Now you can buy real, smiling, happy shiny people all over the web, courtesy Facebook. Today’s summary covers the past two weeks of worthy reads, with a strong dose of the Internet’s twin titans Facebook and Google.
'The post Else 10.27.14 – Assange Takes on Google appeared first on John Battelle's Search Blog. ( image ) So what are the most powerful, important, noteworthy stories of the past ten or so days? Read on to find out… Assange: Google Is Not What It Seems – Newsweek. Julian Assange veers between wild eyed conspiracy theory and, well, level-headed conspiracy theory in this rather factless but quite compelling read.
Recently, a mainframe DB2 DBA put a question to me: when should DB2 for z/OS native SQL procedures be used versus Java stored procedures, and vice versa? Why he asked: the DBA worked with a group of developers who, collectively, could code both of these DB2 stored procedure types. Within this group, individuals tended to go with what they were used to.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
On October 28, 2014, the Federal Communications Commission announced that it has joined the Global Privacy Enforcement Network (“GPEN”), a network of approximately 50 privacy enforcement authorities from around the world. The FCC is the second U.S. privacy enforcement authority to join GPEN. The other U.S. member, the Federal Trade Commission, helped establish the network in 2010.
The UK government has announced proposals designed to make it easier for the Information Commissioner’s Office (“ICO”) to fine companies responsible for nuisance calls and text messages. Under the proposals, the current maximum fine of £500,000 would remain unchanged, but the threshold for imposing fines would be lowered. The rules regarding nuisance calls and texts in the UK are contained in the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) and are enforced by t
The Council of the European Union has published proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the forthcoming EU General Data Protection Regulation (“Regulation”). This proposal was led by the current Italian Presidency and the revisions reflect input from representatives of the national governments of the EU Member States.
ARMA 2014 – the conference and expo – met in San Diego this week. Here's my initial impression and a differentiator from past meetings: More devotees of Records & Information Management/Governance now recognize that their efforts must enhance and support movement toward their organizations’ goals. In the private sector, that generally means contributing to black ink on the balance sheet.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
On October 22, 2014, the Federal Trade Commission announced that several interrelated online marketing and advertising companies (“Stipulating Defendants”) agreed to pay nearly $10 million to settle allegations that they engaged in a pattern of text message spamming, robocalling and mobile cramming practices in violation of Section 5 of the FTC Act, the Telemarketing and Consumer Fraud and Abuse Prevention Act, and the Telemarketing Sales Rule.
On October 10, 2014, TD Bank, N.A. entered into an assurance of voluntary compliance (“Assurance”) with a multistate group of nine attorneys general to settle allegations that the company violated state consumer protection and personal information safeguards laws in connection with a 2012 data breach. The breach involved the loss of two unencrypted backup tapes containing the personal information of approximately 260,000 customers.
On October 20, 2014, the Consumer Financial Protection Bureau (“CFPB”) announced a finalized rule that enables certain financial institutions to comply with the Gramm-Leach-Bliley Act (“GLB”) by publishing their financial privacy notices online instead of mailing them to their customers. The GLB Privacy Rule requires financial institutions to provide privacy notices to their customers on an annual basis.
On October 9, 2014, the 88th Conference of the German Data Protection Commissioners concluded in Hamburg. This biannual conference provides a private forum for all German state data protection authorities (“DPAs”) and the Federal Commissioner for Data Protection and Freedom of Information to share their views on current data protection issues, discuss relevant cases and adopt resolutions aimed at harmonizing how data protection law is applied across Germany.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On October 16, 2014, the 36th International Conference of Data Protection and Privacy Commissioners in Mauritius hosted a panel including representatives from the European Data Protection Supervisor (“EDPS”) and Hunton & Williams to discuss the need for a coordinated approach to net neutrality and data protection in the EU. While there are divergent views on what net neutrality should (or should not) entail, net neutrality in the EU typically refers to the principle that all Inte
During the October 14, 2014 closed session of the 36th International Conference of Data Protection and Privacy Commissioners (the “Conference”) held in Balaclava, Mauritius, the host, the Data Protection Office of Mauritius, and member authorities of the Conference issued the “Mauritius Declaration on the Internet of Things,” and four new resolutions – a “Resolution on Accreditation” of new members, a “Resolution on Big Data,” a “Resolution on enforcement cooperation,” and a “Resolution on Priva
In October 2014, the People’s Republic of China Supreme People’s Court issued interpretations regarding the infringement of privacy and personal information on the Internet. The interpretations are entitled Provisions of the Supreme People’s Court on Several Issues concerning the Application of the Rules regarding Cases of the Infringement of Personal Rights over Information Networks (the “Provisions”) and became effective on October 10, 2014.
On October 14, 2014, rent-to-own retailer Aaron’s, Inc. (“Aaron’s”) entered into a $28.4 million settlement with the California Office of the California Attorney General related to charges that the company permitted its franchised stores to unlawfully monitor their customers’ leased laptops. The settlement stems from a complaint filed on October 7 in the Superior Court of California County of Los Angeles by the Attorney General of California.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On October 8, 2014, the Department of Homeland Security reported that over the course of several months, the network of a large critical manufacturing company was compromised. According to the ICS-CERT Monitor , the compromised company is a conglomerate that acquired multiple organizations in recent years, resulting in multiple corporate networks being merged.
On October 8, 2014, the Federal Trade Commission announced an $80 million settlement with mobile phone carrier AT&T Mobility, LLC (“AT&T”) stemming from allegations related to mobile cramming. The $80 million payment to the FTC is part of a larger $105 million settlement between AT&T and various federal and state regulators, including the Federal Communications Commission and the attorneys general of all 50 states and the District of Columbia.
On October 1, 2014, the Food and Drug Administration (“FDA”) announced that it has issued final guidance regarding cybersecurity in medical devices, entitled Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (the “Guidance”). The Guidance provides recommendations to device manufacturers for content “to include in FDA medical device premarket submissions for effective cybersecurity management.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content