This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The bulk of the German Army-the dough feet of the normal infantry divisions-moved on shank’s mare. The rifle companies’ transport consisted of three-horse wagons, on which the troops loaded their packs, as did this outfit on campaign in Russia in the summer of 1941. Lone Sentry.com Not many people know that the greatest use of horses [.
Perhaps the best example of a company leveraging new media to turn nasty customer complaints into happy customer evangelists is Comcast. Yes, you read that right, Comcast. This nifty piece of conversational jujitsu has been accomplished in large part by Frank Eliason, better known by his handle @comcastcares on Twitter. I've been following Frank's work on Twitter for a while, it seemed he was always listening to what folks were saying, and when folks (inevitably) ranted about Comcast service, he
Living in Australia, I crossed into 2009 many hours ago. For those of you still in 2008 I can tell you that this morning at least, its looking pretty good over on this side. Of course, this is also a reminder for me about the limitations of all this wonderful communication and collaboration technology we have - we can compress distance, but alas not time.
On October 1, 2008, the Article 29 Working Party issued a toolkit on Binding Corporate Rules (BCRs) aimed at promoting them as a mechanism for transferring data to countries without an adequate level of data protection. The toolkit includes: (1) a table highlighting the elements and principles to be found in BCRs (WP 153); (2) a document setting up a framework for the structure of BCRs (WP 154); and (3) a revised version of the FAQs on BCRs (WP 155).
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Legal Information Management have just published my paper titled, The Future of Information Work: Designing Library and Information Courses for the Digital Age. It is based on a talk I gave at the British and Irish Association of Law Librarians (BIALL) annual conference in Dublin earlier this year. While the paper describes some of the work we have done in Brighton developing our new courses, it also reflects on some of the broader issues facing the profession.
and a reappearance of the "302 redirect trick". Here's the second bug from my PacSec presentation, and it's another Firefox one; kudos to the Firefox security team for their responsiveness. It's fixed in the recent 2.0.0.19 and 3.0.5 releases. It involves, yes, a cross-domain tag. These remain a horrible wart in web app security; you have to make sure that any authenticated resource on your domain either does not have any side effects when parsed / executed as JavaScript, or is CSRF protected.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
and a reappearance of the "302 redirect trick". Here's the second bug from my PacSec presentation, and it's another Firefox one; kudos to the Firefox security team for their responsiveness. It's fixed in the recent 2.0.0.19 and 3.0.5 releases. It involves, yes, a cross-domain tag. These remain a horrible wart in web app security; you have to make sure that any authenticated resource on your domain either does not have any side effects when parsed / executed as JavaScript, or is CSRF protected.
Collaboration initiatives are all about streamlining business processes, and the interfaces between legacy closed systems and open source stacks are an increasingly common place to find business collaboration environments. According to research firm Gartner, open source software is present in 85% of enterprises and the remainder expect to deploy it in the next year.
Pete Spande, who runs the East for FM and therefore toward whom I am favorably inclined, has written a brief but very true post on the myth that marketing in social media should somehow be free. It's not free, just like throwing a great social event isn't free, but it can be very efficient and it can certainly help get marketers to their goals, if done right.
In CIO magazine online, Rich Levin writes that: " Today there's a bumper crop of worthy Office alternatives. None of this has been missed by Microsoft, which debuted a revamped Office Professional 2007 last year in an effort to clearly differentiate its cash cow from the bulging mass of Office me-toos, and now is promising a new version that's cloud-enabled.
For the third year in a row, Hunton & Williams LLP has been named the top firm for privacy by Computerworld magazine. In its third annual report on top privacy advisers, the poll surveyed corporate privacy leaders in North America and Europe. The firm was ranked #1 by the respondents overall and by those in the Fortune 1000. When respondents were broken out by industry, Hunton & Williams topped the list as “providing the best privacy advice” in every industry category, including the fina
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Andrew McAfee of Harvard Business School, who coined the term Enterprise 2.0 and with whom I am on the advisory board for the conference of that name, wrote a fascinating blog post earlier this month: ‘The Enterprise 2.0 Recovery Plan’ It’s a long post, and posits the theoretical question of rescuing a big three automotive company [.
Tokyo is currently the largest city of origin of Twitter messages in the world, more than twice that of second placed San Francisco and New York in the USA as of this summer. (Incidentally, while the Japanese Kanji language Twitter service, which only launched in April of this year, contains advertising, the rest of the planet’s [.
Venture capitalist Fred Wilson of Union Square Ventures, an early stage fund specializing in investing in IT enabled services ‘that have the potential to change the structure of markets’, blogged ideas yesterday about the internet’s disruption of retail. This is epitomized by the sad state of ‘bricks and mortar’ (shopping in actual shops) retail this [.
In a month’s time Barack Obama will be inaugurated in Washington DC as the 44th US President-elect. It seems likely that a president elected largely as a result of a hugely successful online campaign notable for its transparency will have to give up his Blackberry and email - the US Presidential Records Act is currently not [.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
There is an interesting book and associated US public television series I’m intrigued by entitled ‘Leading with Kindness: How good people consistently get better results‘ The two authors are. William F. Baker, Ph.D., (Chief Executive Officer of Educational Broadcasting Corp Thirteen/WNET and WL1W21, (who made the TV program) is also ‘Executive in Residence’ at Columbia [.
In my previous post I discussed how historically railways were the supply chain backbone of the US economy (as was the case with many other nations) 120 years ago. Globally the internet is remarkably similar today: although we tend to think of it as a “network of networks&# consisting of millions of private, public, business, [.
We are heading into the eye of a financial storm that has been threatening for months, and inconceivably large amounts of bailout money is being bandied around by the powers that be in the USA, with similar actions taking place in other countries around the world. Most revenue is generated by small business in the USA [.
Corporations are like sharks, who have to keep moving forward to breathe…or they sink and die. I recently participated in Cisco’s ‘C-Scape’ first virtual forum online; a surprisingly basic attempt at allowing remote attendance to their San Jose California briefing given the sophistication of Cisco’s technology (The higher level sessions are archived here).
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
There’s some great TalkBack comments on my previous post about WWII German strategy: Justin James for example believes: …The secret of the Wehrmacht’s success in the field has much to do with the education of what can be described as their executive and middle management layers. For example, sergeants in the German army performed the [.
Jevon McDonald, someone whose opinions I rate highly, has posted a stellar piece on ‘The uncertain future of Blogging‘ today. The idea of user-generated content was once almost exclusively owned by blogging. Blogging was the conversation, blogging was the vehicle, blogging was the network. Now blogging plays a very small role in all of those things.
I first posited this back in January. The idea is back. From the Deal: As the New York Times Co. is negotiating with lenders over its debt, speculation has been floating around the blogosphere, pushing the premise that Google Inc. should acquire the beleaguered Gray Lady. The thesis (or, rumor, as some would put it) has been around since the beginning of the year, with SpliceToday on Thursday reintroducing the idea of the unorthodox union of the stalwart of old media with the scion of new media.
From the wonderful Kevin Kelly : While we have not yet made anything as complex as a human mind, we are trying to. The question is, what would be more complex than a human mind? What would we make if we could? What would such a thing do? In the story of technological evolution – or even biological evolution – what comes after minds? The usual response to “what comes after a human mind” is better, faster, bigger minds.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
I'd like to know: Do YOU trust Google? Let me know in the comments below. Regardless, it's clear that citizens are realizing that Google has a lot of power. The worm inexorably turns. Hence, t his was predictable.
No, really. Check it out from Weisel (pdf download): Estimate Changes: Since the end of 3Q the currency picture has added to an already volatile consumer situation. Specifically indexing 3Q at 100, 4Q results would be 92.7 just based on currency shifts alone. That coupled with a more muted consumer outlook causes us to lower our 4Q and 2009 estimates.
One of my readers noted that I've written a lot of off-blog stuff, and I'm rather proud of it. And I've noted (in my " How did I do 2008 " post) that I did not really make the progress I wish I had on my book. But working with partners like Amex, I wrote nearly 20 column-sized pieces - around 15,000 words - and nearly all of them are sketches toward the book I hope to write.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Related: 2007 Predictions. 2007 How I Did. 2006 Predictions. 2006 How I Did. 2005 Predictions. 2005 How I Did. 2004 Predictions. 2004 How I Did. Reading over my predictions for 2008 , I was struck with one thing: It wasn't a list. It was more of a narrative, making decoding how I did that much more difficult. After the narrative, I focused on the biggies - Google, Yahoo, Facebook, Microsoft, AOL, and Newscorp/FIM.
Here are top posts of 08 for Searchblog, judged by comments. As I review them, I realize that despite my endless complaining about not having time to write this year, I did get some riffs in. Not all of them made the top ten, so I added some of my personal faves at the end. 1. Considering Heresy: Buying a PC. I have an update on this coming, yes, I did buy a PC.
Somehow I missed this - came out earlier in the month. Google took a global approach this year, interesting to see top rising results I've never heard of before. Wish they were natively linked by Google, but they were not. Fastest Rising (Global). 1. sarah palin 2. beijing 2008 3. facebook login 4. tuenti 5. heath ledger 6. obama 7. nasza klasa 8. wer kennt wen 9. euro 2008 10. jonas brothers.
40
40
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content