This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post A Return To Form In Media appeared first on John Battelle's Search Blog. Once upon a time, print was a vibrant medium, a platform where entrepreneurial voices created new forms of value, over and over again. I’ll admit it was my native platform, at least for a while – Wired and The Industry Standard were print-driven companies, though they both innovated online, and the same could be said for Make , which I helped early in its life.
I have been a big fan of DB2 for z/OS native SQL procedures ever since the functionality was introduced with DB2 9 , back in 1997. I have posted quite a few blog entries on the topic, the first in 1998 (written while I was working as an independent consultant) and the most recent just last month. In these blog entries, and in presentations I've delivered over the past several years (and in discussions generally), I've focused largely on performance aspects of native SQL procedures versus externa
What’s the best icon to entice people to share something through their social networks? It turns out to be the one used on Android. While this may contradict guidelines proposed by some designers, this conclusion is based on the results of a survey of 7,500 users.
Hunton & Williams LLP proudly announces that the firm’s Global Privacy and Cybersecurity practice was ranked in Tier 1 in The Legal 500 United States 2014 guide for cyber crime and data protection and privacy. Global practice chair Lisa Sotto also was ranked as a leading lawyer and partner Aaron Simpson was highlighted for his work on privacy and cybersecurity matters.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
What is a hot topic now, the international implementation of intelligent transport systems? Anonymous. Thu, 06/26/2014 - 08:00. The morning is rush hour in both Helsinki and Barcelona. Both cities are also actively discussing, among other topics, how technology can facilitate peak hour traffic, and future urban transport solutions. The tenth ITS European Congress was held in Helsinki, Finland for the first time.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
What is a hot topic now, the international implementation of intelligent transport systems? Anonymous. Thu, 06/26/2014 - 08:00. The morning is rush hour in both Helsinki and Barcelona. Both cities are also actively discussing, among other topics, how technology can facilitate peak hour traffic, and future urban transport solutions. The tenth ITS European Congress was held in Helsinki, Finland for the first time.
'The post Feels Like Apple…in 1992 appeared first on John Battelle's Search Blog. I went on Bloomberg today, ostensibly to talk about data marketing, NewCo, and anything newsworthy. Turns out, we talked (mostly) about Apple. Bloomberg’s got the video up here , and embedded below. While I understand the headline – Battelle: “Apple Failed to Be Apple” – that’s not exactly my point.
Often, there is a bit of a time lag between the introduction of a DB2 for z/OS feature and the widespread adoption of the new technology. Take universal table spaces, for example. These were introduced with DB2 9 for z/OS (almost 7 years ago), but some organizations are only now beginning to convert non-universal table spaces to the universal variety.
When researching the available types of sites and site collections that come standard with SharePoint 2013, I came across the TechNet page " Overview of sites and site collections in SharePoint 2013 ". The tables confused me a bit until I realized the rowspan of the cells in the first column was off, shifting many of the cells to the left one column (as of 6/12/2014).
The Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) has published a white paper entitled A Risk-based Approach to Privacy: Improving Effectiveness in Practice. This is the first paper in the Centre’s new multi-year Privacy Risk Framework Project. It follows the Centre’s March 2014 Risk Workshop, held in Paris with Centre members, privacy experts, regulators and other stakeholders.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Electric cars need to be supported by intelligent transport systems. Anonymous. Fri, 06/20/2014 - 10:00. It is not surprising that there is a world of expectation from electric cars. Electro-mobility is far more than replacing internal combustion engines with electric motors and tanks with batteries. It is about taking auto-IQ to an entirely new level - with thinking auto parts that avoid traffic jams, prevent collisions and are part of an intelligent traffic flow controlled by an invisible hand
'The post Why You Need to See ‘Her’ (Or, ‘Her’ Again) appeared first on John Battelle's Search Blog. A while ago I wrote a piece about Dave Egger’s latest novel The Circle. I gave the post the too-clever-by-twice title of Why You Should Read The Circle, Even If You Don’t Buy It. While the book had (to my mind) deep flaws, it was far too important to not read.
A couple of years ago, during an idle moment, I wondered what we could do if we had the hardware CPU primitive of pages with permissions execute-only (i.e. no read and write): [link] It turns out that aarch64 has exactly such support. Here's support heading in to the Linux kernel: [link] The original idea was to defeat ROP by having all of the instructions randomized a bit on a per-install basis.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
'The post Else 6.2.14: What Do We Want The Internet To Be? appeared first on John Battelle's Search Blog. So much to note over these past two weeks (I took last Monday off for Memorial Day): Google bends to the Euro and tops Apple in a key index that doesn’t really matter (much), Meeker updates her famously design-challenged Internet Trends powerpoint deck, and we continue the endless debate around what we want the Internet to be.
'The post Search and Apps – Give Consumers Back Their Links appeared first on John Battelle's Search Blog. I’ve railed against the “chicletized” world of apps for years. I’ve never been a fan of the way mobile has evolved, with dozens, if not hundreds, of segregated little “chiclets” of stovepiped apps, none of which speak to each other, all without any universal platform to unite them save the virtual walled garden of Apple or Google’s app st
'The post Else 6.16.14: Internet Ads Grow, Apple Ads Blow appeared first on John Battelle's Search Blog. Up and to the right, baby. Lots of advertising news in this issue of Signal, as the bi-annual IAB report shows strong gains (YAY, Internet!). To the links: Internet Ads Surge 19% in Just One Year – WSJ That’s strong growth for an industry working on its 21st year. ( IAB report ).
'The post Else 6.9.14: The Internet Beats Rabbit Ears appeared first on John Battelle's Search Blog. The world’s most fascinating story kept time this past week – cord cutting beat rabbit ears, Google took some punches, and billion-dollar companies pondered their fate once the bloom starts to fade. To the links… Internet-TV Delivery to Surpass Over-the-Air – Worldscreen Worth noting that more of us get TV from the Internet than get it from “over the air”
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The post Else 6.30.14: Input, Output, Kaput appeared first on John Battelle's Search Blog. This past week in tech brought Google’s I/O developer conference, and with it lots of debate on the culture of the Valley, the future of links in the mobile world, the end of the Internet (again), and the death of the IPO. To the (dead? resurgent?) links: Inside the Mirrortocracy – Carlos Buenos From time to time a commentator hits the mark when it comes to the Valley’s cultur
'The post Else 6.23.14: Questioning Valley Idols appeared first on John Battelle's Search Blog. A fascinating week of links, starting with a blast from the past (see above), but the real meat of the week came in the debates around some of the Valley’s most scared cows. For more, read on… Tech Time Warp of the Week: Watch IBM Warn Us About Glassholes 10 Years Ago- Wired I am particularly enamored with “Park Bench” – if I saw a guy doing what this guy is doing i
On June 18, 2014, the German state data protection authorities responsible for the private sector (the Düsseldorfer Kreis) issued guidelines concerning the data protection requirements for app developers and app publishers (the “Guidelines”). The Guidelines were prepared by the Bavarian state data protection authority and cover requirements in Germany’s Telemedia Act as well as the Federal Data Protection Act.
On June 25, 2014, U.S. Attorney General Eric Holder announced that the Obama Administration is looking to pass legislation that would provide EU citizens with a right to judicial redress in U.S. courts if their personal information that was shared for law enforcement purposes is later intentionally or wilfully disclosed. The announcement was made during the EU-U.S.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On June 25, 2014, the United States Supreme Court issued a unanimous opinion in Riley v. California , holding 9-0 that law enforcement personnel cannot search detained suspects’ cell phones without a warrant. Writing for the Court, Chief Justice John Roberts found that the practice of searching cell phones implicates “substantially greater” individual privacy interests than other physical objects that may be found on an arrestee and deserves heightened protections.
On June 23, 2014, the Article 29 Working Party (the “Working Party”) published its Opinion 7/2014 on the protection of personal data in Québec (the “Opinion”). In this Opinion, the Working Party provides its recommendations to the European Commission on whether the relevant provisions of the Civil Code of Québec and the Québec Act on the Protection of Personal Information in the Private Sector (the “Québec Privacy Act”) ensure an adequate level of protection for international data transfers in a
On June 19, 2014, the President’s Export Council (“PEC”) held a meeting to discuss nine key issues, including the effects of foreign laws that restrict cross-border data flows. At the meeting, the private sector members of the PEC submitted a recommendation letter to President Obama expressing their concern about the threat to American business from protectionist, cross-border data transfer restrictions imposed by foreign countries.
On June 23, 2014, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $800,000 settlement with Parkview Health System, Inc. (“Parkview”) following a complaint involving patient medical records that were dumped by Parkview employees and left unattended on a physician’s driveway. In 2008, Parkview took custody of hard copy medical records containing protected health information of several thousand patients of a retiring physician.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Cyber incidents have become more common — and more severe — in recent years. Like other federal agencies, the Securities and Exchange Commission (“Commission”) has recently been analyzing the applicability of its existing regulations relating to cybersecurity risks. The Commission’s efforts are focused on maintaining the integrity of market systems, protecting customer data and the disclosure of material information.
On June 2, 2014, the U.S. Department of Justice announced a U.S.-led multinational effort to disrupt the “Gameover Zeus” botnet and the malware known as “Cryptolocker.” The DOJ also unsealed charges filed in Pittsburgh, Pennsylvania and Omaha, Nebraska against an administrator of Gameover Zeus. Gameover Zeus, a sophisticated type of malware that first emerged in 2011, is designed to steal banking and other credentials from the computers it infects.
In response to increasing interest in a “risk-based” approach among privacy experts, including policymakers working on the proposed EU General Data Protection Regulation, the Article 29 Working Party (the “Working Party”) published a statement on the role of a risk-based approach in data protection legal frameworks (the “Statement”). The Statement confirms the Working Party’s general support for including a risk-based approach in the EU data protection framework.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content