This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Despite the claims from LinkedIn that an IPO isn’t imminent, I wouldn’t be surprised to see that happen in 2010. Facebook on the other hand would appear to have a battle on their hands to get a credible business model organized for the IPO markets. After lagging behind Facebook in the extensibility stakes LinkedIn now has [.
Folks over estimate what they can do in a year and under estimate what they can do in ten. No doubt you’d agree how quickly this past decade has flown by. My one regret is that I wasn’t nearly as intentional about the effects I wanted to create. I didn’t find my North Star (community empowerment) until quite recently. As I reflect upon the past decade and get clear about my vision for my life by 2020 there are a few stories that I would like to share with you: Petunia Pickle
This is a big deal. Facebook is taking the final step to become more like Twitter. Thanks to RWW for pointing it out. I've been traveling and had not had a chance to read the new privacy settings, which state: we'll be recommending that you make available to everyone a limited set of information that helps people find and connect with you, information like "About Me" and where you work or go to school.
On December 7, 2009, the Business Forum for Consumer Privacy released “A Use and Obligations Approach to Protecting Privacy: A Discussion Document” at the Federal Trade Commission’s roundtable entitled “Exploring Privacy.” The roundtable was a first step in the FTC’s effort to re-examine privacy protection in light of rapid, dynamic changes in technology, advances in data analytics and increasingly ubiquitous data collection and use.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
MR. RECORDS: (sings while donning cardigan): It’s a beautiful day in the neighborhood, A beautiful day for a neighbor. Would you be mine? Could you be mine? Won’t you please …won’t you please….Please won’t you be my neighbor? MR. RECORDS: Good morning, boys and girls. I’m so glad you’re in the neighborhood today! I’m Mr. Records. What’s your name? Names are important.
Well, here's a nice little gem for the festive season. I like it for a few distinct reasons: It's one of those cases where if you look at web standards from the correct angle, you can see a security vulnerability specified. Accordingly, it affected all 5 major browsers. And likely the rest. You can still be a theft victim even with plugins and JavaScript disabled!
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Well, here's a nice little gem for the festive season. I like it for a few distinct reasons: It's one of those cases where if you look at web standards from the correct angle, you can see a security vulnerability specified. Accordingly, it affected all 5 major browsers. And likely the rest. You can still be a theft victim even with plugins and JavaScript disabled!
A huge blocker to understanding business value and usage of modern 2.0 technologies is the Facebook fiasco. The 800 pound/350 million accounts gorilla in the ’social’ space confuses the heck out of most of the planet. The latest attempt to snatch defeat from the jaws of victory: your personal information wants to be free. By default, [.
You know, I just realized I suggested that Facebook do exactly what it's doing. Read this post from back in June, deconstructing an article in Wired about the emerging Facebook v. Google battle. In it I say: I think it's a major strategic mistake to not offer [as much information on Facebook as possible] to Google (and anyone else that wants to crawl it.
On December 17, 2009, the Electronic Privacy Information Center (“EPIC”) filed a complaint with the FTC claiming that Facebook is engaging “unfair and deceptive trade practices” by changing its privacy policies. Notably, the changes allow anyone who browses the Internet to view a Facebook user’s name, profile picture, gender, geographic region and list of friends.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
I've been meaning to fiddle around with timing attacks for a while. I've had various discussions in the past about the significance of login determination attacks (including ones I found myself) and my usual response would be "it's all moot -- the attacker could just use a timing attack". Finally, here's some ammo to support that position. And -- actual cross-domain data theft using just a timing attack, as a bonus.
ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T
Written by Jolie O’Dell. By the way, our RoadTwip panel just got selected by SxSW Interactive. Ever since two friends and I staged a two-week jaunt around the Midwest to attend a great new conference earlier this year, I’ve been more and more aware of a growing trend: the social media road trip. While on the road this year, I’ve come upon long-term social media road warriors such as Mark Simonds of the Twitter Road Trip , brand ambassadors such as Sara Lopez and conference-hopp
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
From the Google Social Web Blog (I have to admit it's hard for me to see those four words together without busting out a silly grin): Today, we're bringing Twitter and Friend Connect even closer together. Now you can join one of over nine million Google Friend Connect sites using your Twitter login. Once signed in, your Twitter profile will be automatically linked and you can tweet your new site membership, share discussions from the comments gadget, and invite your friends via Twitter.
A class action complaint filed on December 9, 2009, in Illinois federal court alleges that WideOpen West, Finance, LLC ("WOW"), an Internet service provider, violated its users’ privacy by "installing spyware devices on its broadband networks." Valentine v. WideOpen West (N.D. Ill., No. 1:09-cv-07653). This action against WOW follows the October 6, 2009, dismissal by a district court in California of similar claims against six out-of-state ISP defendants (including WOW) fil
When you’re calling your important prospect with a free conference call number, you probably don’t realize the increasing chances of getting a number unobtainable message like this as digital telco disruption escalates. Conference calls are an vital part of collaboration, with millions participating in remote meetings by telephone. While the form factor of telephones hasn’t changed [.
Privacy concerns, as I discussed in my previous post, are plaguing both Facebook and the broader 2.0 web technology ecosphere it casts a shadow over. Now the latest attempts by Facebook to unlock the value in your information is meeting legal resistance. The Electronic Privacy Information Center (EPIC), joined by nine privacy and consumer organizations, today [.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
‘Social media’ seems to be becoming even more of a hindrance to the successful application of 2.0 technologies to solve specific business problems as time goes on: I finally read ‘Beware Social Media Snake Oil‘ by Stephen Baker in the December 3 issue of BusinessWeek, the ailing old media title recently bought by Bloomberg. Morten [.
Blackbox Republic, the personal relationship oriented members only community, launches on a subscription based model today. The community aims to fill the space between online dating industry sites and the online social networking world. Think of Blackbox Republic as a fashionable online ‘members-only’ club where you might expect to meet people with similar interests to your [.
Twitter and its clones seem to be growing like weeds wherever you look, and are starting to spam each other with location updates if you’re a user. Rewind back ten years to the start of the decade we’re just leaving and there’s a distinct similarity with instant messaging and the birth of XMPP standards. Instant messaging [.
Here’s a selection of links to posts I’ve written in 2009 which I feel are worth rereading… Extraordinary Collaboration Delusions and the Madness of Crowds …Comparing the ‘Idiocy of Crowds’ and groupthink to the South Sea Bubble & Madoff financial speculation disasters. Collaboration isn’t automatically the right thing to do. …Groupthink leading to a wild west of wikis [.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The mobile phones we carry today are more powerful than the desktop PC’s that revolutionized the enterprise business world during the 1980’s. The ascendancy of the desktop micro computer in that era met fierce resistance from entrenched mainframe computing professionals, who had run business on ‘big iron’ supplied by ‘IBM and the seven dwarfs‘ since [.
Two new developments in the business intelligence world today. Mindtouch announce a mid market integration with cloud data integration company Snap Logic, and Zoho’s online reporting and business intelligence application comes out of beta. These developments underscore just how fast the heartland of BI is changing, from having to commit to heavy duty, costly on-premise infrastructure to [.
SAP are proposing a ‘clear path forward’ in their marketing materials, in an opaque global economic situation. At this week’s Boston Influencers Summit financial volatility, rising customer power, sustainability, increased regulation and rapid change in technology and information were acknowledged as key influencers of the SAP supertanker.
FlipShare 5.0 software and a wifi device that delivers the flip videos on your computer hard drive to your TV screen are announced today by Cisco (see my Flip Ultra HD video above for a quick look at how the latter works). We think of disruption as being a software and media term, but the [.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Paul points it out as a failed dishwasher search. Mike complains about automated content as does RWW. And we all have experienced it: The Google ecosystem is failing more - failing to get us what we think we want. Failing to not frustrate us. Failing at the more complicated queries we are throwing at it. Failing to be the Google that we came to love back when the web was small and Facebook was a way for Harvard geeks to try to get laid.
Reading about this study using Facebook data ( original link ) gave me some hope that we may see true insights from third party academics doing high integrity fieldwork on top of the Facebook data. My wish for Facebook is that it welcome such work, create parameters and ensure privacy, but allow researchers to really dig in. Much could be learned. The linked study is internal research, however.
AT&T today released an iPhone app that reports wireless issues. It's called Mark the Spot. Very cool. This is a step toward the crowdsourced, conversational, map-driven go to market strategy I outlined here.this app was not done by AT&T marketing, but rather labs, I was told, though that is not totally confirmed.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content