This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
nGenera relaunched their company and software packages this week, renaming themselves ‘Moxie Software‘ (with ‘nGenera Insights‘, their research and consulting arm, continuing as a sub brand). We’re in the thick of the fall conference season now, and this announcement was probably timed to coincide with Jive Software’s ‘Jive World‘ social business customer conference.
( image ) Today I landed from a trip to the world of the non-tech obsessed (PA and OH) to find my newsfeed was full of speculation that Google MUST buy Twitter , or be damned to obscurity in a race its already losing to Facebook. Not so fast. Here's my simple reasoning for why Google won't buy Twitter: Twitter won't sell. Those who decide whether Twitter goes to Google pretty much come down to a handful of folks: Founders Evan Williams, Jack Dorsey, and Biz Stone, with COO Dick Costolo and Twitt
The UK Information Commissioner’s Office (the “ICO”) has indicated that UK law firm ACS:Law could face a maximum penalty of £500,000 following a major data breach. Personal information, including names and addresses, of over 8,000 Sky broadband subscribers and 400 PlusNet users was made publicly available following an apparent attack on ACS:Law’s website.
A few weeks back, I published a demo that uses a serious Internet Explorer cross-origin violation to permit a malicious web page to force the visitor to make unwarranted tweets: [link] The post was light on technical details of how the attack works, so they will be filled in below. In addition, I'll quickly take care of the FAQ: Q) Does this attack affect earlier versions of Internet Explorer, such as IE6?
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
It’s ten years since the dot com bubble began to seriously deflate; the financial climax had its high water mark on March 10, 2000 when the NASDAQ peaked at 5132.52. By September of that year people were starting to feel a lot less financially irrationally exuberant and started heading for the [.
A recording of a Skype conversation with Bill Kutik, the eminent independent Human Resources technology analyst who co-chairs the upcoming September 29 annual HR Technology Conference in Chicago. As chair of the HR track for the upcoming November Enterprise 2.0 conference I wanted to tap Bills’ expertise, and to discuss the state of the market.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
A recording of a Skype conversation with Bill Kutik, the eminent independent Human Resources technology analyst who co-chairs the upcoming September 29 annual HR Technology Conference in Chicago. As chair of the HR track for the upcoming November Enterprise 2.0 conference I wanted to tap Bills’ expertise, and to discuss the state of the market.
Struggling to find a consistent voice online, or not sure about how to achieve appropriate language usage? Here’s Chris Barr discussing his Yahoo Style Guide, a book and online resource which helps demystify how to communicate effectively and consistently in this digital age. The Twitter era of ever faster and more fragmented real time information nuggets, [.
It's been nearly a month since Demand filed its S1 , and I promised you all a longer look after my initial posting. Here are some thoughts now that I've had a chance to digest the document. A caveat: I know Demand CEO Richard Rosenblatt well, and consider him a friend. And one of his investors, Oak, is an investor in my company, Federated Media. However, neither Oak nor Richard participated in the preparation of this post.
as far as I can tell, they in fact don't ever meet. You can't leverage your networks on Facebook and Twitter in Ping. It's another closed Apple system, another Apple universe in a gilded gift box. It's not that Apple hates the web, it's just that Apple is better than the web. Apple doesn't need it. It seems Apple has it all figured out. I am sure Ping will get traction because it'll be fun, and if it truly helps folks discover more music, so much the better for all (especially iTunes sales).
I'm very proud of a new platform launched today by American Express: Currency. Sometimes when a brand embraces the concept of truly being a publisher, they align with strong voices around the web, underwriting existing properties and helping them create new sections or services. But every once in a while, a brand realizes that its marketing goals align with a very real need in the marketplace, one that for whatever reason hasn't been addressed.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Earlier this week I mused out loud about retargeting, suggesting that perhaps it's time for marketers to not just chase folks around the web in hopes they might irritate us into submission , but rather offer us the chance to politely say "Not right now, thanks.". One of Searchblog's readers turned out to be Josh McFarland, CEO of remarketing startup TellApart.
Google today introduced what many are calling a major evolution in search interface today, sparking a landslide of commentary about the impact on SEO, mobile, competitors, search share, revenue, you name it. It's a lot to digest, and as much as I'd like to have a definitive statement on Google's move to "instant search," I don't. Yet. I prefer to use it for a while, and think on it a bit more.
Google is 12 today , as Sept. 27 marks the anniversary of the company's actual incorporation. Of course the company has roots prior to the date, but ya gotta pick a date. Happy birthday Google, as they say in China, may you live in interesting times.
I'm very proud to announce the initial 2010 Web 2.0 Summit program. You can see the lineup on the Summit site here. Our 2010 theme Points of Control , helped us create a lineup that is truly remarkable, full of industry titans and insurgents alike. Alongside policy leaders such as Julius Genachowski , Chairman of the FCC, we'll hear from the Internet's most powerful CEOs: Google's Eric Schmidt , perhaps the most active player in our points of control map -- defending the company's home turf of s
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Way back in January, I predicted (see #8) that Microsoft's Bing would overtake Yahoo in share to become #2 in search. Today, at least one measurement service seems to have validated that claim, which at the time was a bit far-fetched, given the nearly seven point gap in share between the two companies. These figures do not consider the Yahoo/Bing's search deal.
Fred points out apps and services that are " Mobile First Web Second." I don't like the distinction. To me, it's all the web. It's this kind of thinking that leads to Wired's ill-considered proclamation that "the Web is dead." (I debate that in the second half of this thread here ). What, after all, is the web, really? To me, it's a set of standards that allow for interconnection, sharing of experience and data, navigation between experiences, and a level playing field for anyone to create value
Comscore's search results are out for August , and unlike Nielsen , they do not show Bing as beating Yahoo. On the contrary, Yahoo gained the most ground, Google lost share (by not growing as quickly), and Microsoft grew only slightly.
One of the best cards in AOL's difficult hand has been its search deal with Google, which was up for renewal this year. This morning the two companies announced (ahead of a December deadline) that they were staying together, though I can only imagine the folks at Bing didn't make it easy. At the moment, only three parties know what Google paid - Google, AOL, and Microsoft, which knows at least what Google must have topped to win the deal.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
For those of you in RSS land who often ask, here are last week's Signal roundups - a daily dose of what I'm reading and thinking about each day, posted on the FM site, usually late at night. You can get the RSS feed here , or get it via email here. Monday Signal: This Is Only An Eye Test. Friday Signal: All Is True, And Quite Fictional. Thurs. Signal: Bubble, No Bubble, Toil and Trouble.
Back in the day, it was news when Google used its massive home page distribution to push its new Chrome browser. Google putting ads on its home page?! A big deal, even if they were for Google's own products. It spoke to an ongoing creep inside the company of leveraging its position in search to help it win in other markets, and to some, it felt like a violation of Google's own principles in the process.
David Vladeck, the head of the Bureau of Consumer Protection at the Federal Trade Commission, shared his vision for consumer privacy protection with an audience at the IAPP’s Privacy Academy on September 30, 2010. Mr. Vladeck began by reminding the audience that the FTC is aggressively enforcing on privacy and data security matters, having brought 29 cases to date.
Please join us at these great events coming up this fall. Several members of Hunton & Williams’ Privacy and Information Management team are presenting at these events to discuss the current and evolving privacy and data security issues occurring around the world. Internet Rights and Technology: A Practical Legal Guide to Doing Business on the Internet – New York City Bar.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The United States Federal Trade Commission (“FTC”) recently joined forces with privacy authorities from eleven other countries to launch the Global Privacy Enforcement Network (“GPEN”), which aims to promote cross-border information sharing and enforcement of privacy laws. On September 21, 2010, GPEN unveiled its new website, www.privacyenforcement.net , designed to educate the public about the network.
The Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (generally referred to as “Convention 108”), enacted in 1981, is the only legally-binding international treaty dealing with privacy and data protection. The Convention is also of fundamental importance in providing the underlying legal framework for instruments such as the EU Data Protection Directive 95/46.
On September 15, 2010, New York State Attorney General Andrew Cuomo announced a $100,000 settlement with EchoMetrix, a developer of parental control software that monitors children’s online activity. The settlement comes one year after the Electronic Privacy Information Center (“EPIC”) alleged in a complaint to the Federal Trade Commission that EcoMetrix was deceptively collecting and marketing children’s information.
The United States Court of Appeals for the Seventh Circuit has rejected a defendant’s argument that the Wiretap Act’s prohibition on interception of communications applies only to an acquisition that is contemporaneous with the communication. In United States v. Szymuszkiewicz , No. 07-CR-171 (7th Cir. Sept. 9, 2010) , the defendant faced criminal charges under the Wiretap Act for having implemented an automatic forwarding rule in his supervisor’s Outlook email program that caused the workplace
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
The United States Congress is currently considering several bills addressing cybersecurity issues. Below are brief summaries of four such bills. The Grid Reliability and Infrastructure Defense (“GRID”) Act. The GRID Act was passed by the House of Representatives on June 9, 2010. This bill would amend the Federal Power Act to grant the Federal Energy Regulatory Commission (“FERC”) authority to issue emergency orders requiring critical infrastructure facility operators to take actions necessary t
On September 2, 2010, police in New Zealand issued a statement to confirm that there was no evidence Google committed a criminal offense in relation to the data it collected from unsecured WiFi networks during the Street View photography capture exercise. The case has now been referred back to the New Zealand Privacy Commissioner. A spokesperson from the New Zealand police force took the opportunity to underline the need for Internet users to make sure that security measures are properly imple
On August 18, 2010, the Connecticut Insurance Department (the “Department”) issued Bulletin IC-25 , which requires entities subject to its jurisdiction to notify the Department in writing of any “information security incident” within five calendar days after an incident is identified. In addition to providing detailed procedures and information to be included in the notification, the Bulletin states that the Department “will want to review, in draft form, any communications proposed to be made”
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content