This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
During a telephone conversation between us last week Aaron Fulkerson of MindTouch said he was going to pick up on my Collaboration Networks meme, and he has now produced a solid post on this topic. Aaron takes on the number one issue plaguing widespread adoption of broad Enterprise 2.0 strategy: piecemeal departmental use of collaboration tools, [.
For the past few days I've been focused on a final draft of an essay, co-authored with Tim O'Reilly, focusing on the theme of this year's Web 2.0 Summit. It's rewarding work, reminiscent of the early days of Wired, when I'd regularly edit or write long form pieces focusing on big ideas and the future, but grounded in real world examples from today. But writing and editing this kind of stuff is also challenging work, and I often procrastinate, as I am right now, by writing a blog post or skimming
I know I'm repeating myself , but just a reminder that if you live in Sydney and either haven't watched the Us Now documentary yet or simply would like the chance to discuss it further, then join us on the evening of Thursday 9th July at the Australian Technology Park* for a special community screening. Its a free event, but you do need to register - and of course, don't forget to tell your friends about it.
On July 1, 2009, new laws will take effect in Alaska and South Carolina that will require entities that have experienced data security breaches involving personal information to notify affected individuals of the breaches. With these additions, a total of 44 states, plus the District of Columbia, Puerto Rico and the U.S. Virgin Islands, will have active breach notification laws in place.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Historical objectivity is always difficult. I never give full credence to, for example, the American Film Institute’s lists of movie superlatives because they always seem skewed toward recent films. That’s not surprising. Can anyone born after 1940 really appreciate the impact of Charlie Chaplin’s silent films? Fully recognizing my historical subjectivity, I nonetheless suggest that Records & Information Management is evolving rapidly.
I've just noticed that a Google search for "clusterfuzzing" (including the quotes) has no hits. Therefore, I'm reserving the term :) All I need now is a new fuzzing angle and then I've got all the makings of a great presentation! Actually, I do have a new twist on fuzzing. All I need is the bugs. Watch this space!
20
20
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
I've just noticed that a Google search for "clusterfuzzing" (including the quotes) has no hits. Therefore, I'm reserving the term :) All I need now is a new fuzzing angle and then I've got all the makings of a great presentation! Actually, I do have a new twist on fuzzing. All I need is the bugs. Watch this space!
The above video clips (from my handheld Flip) are from John Chambers Cisco Live! keynote address today and are specifically two edits about Cisco’s strategic perspective on collaboration and Web 2.0 technologies in the enterprise. In the second edit Chambers talks about Cisco’s business architectural re-engineering into a collaborative enterprise, which I have previously written [.
There's quite a wonderful authorial kerfuffle happening between Chris Anderson, whose recent book "Free" has been the target both of plagiarism charges (from Wikipedia, of all places, oh the wonderful irony, one might think Chris actually planted the whole damn thing.) and Malcolm Gladwell, who never met a clever anecdote he couldn't convert into a well turned (and dammingly entertaining) book of his own.
As you may know, in the past I worked at Ernst & Young in their Centre for Business Knowledge , the group who are responsible for the “ KWeb ” intranet. Outside of the top tier accounting firms (who have always understood they are involved in knowledge work), I’ve yet to find any large organisations with such a cohesive or advanced intranet, so I like to track public case studies and articles about Ernst & Young ’s intranet and knowledge management program to see how it is progressing si
The Obama Administration today formally announced its sweeping proposal for new regulation of the financial industry. The plan proposes the formation of a new watchdog agency that would seek to protect consumers’ interests. The proposal raises a number of privacy and data security questions, such as the role of the new financial services consumer protection agency in protecting privacy and data security and the continued role of the Federal Trade Commission as the lead agency in this are
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
If the roots of Records & Information Management are at least 2300 years old, why is Innovation a top RIM priority in 2009? Beyond the truism, “Stagnation is death,” the answer identifies key, even vital, roles for records managers and their programs. Certainly, innovation is a hot topic. It is the cover story of the June 15th BusinessWeek and the focus of a fast-selling book, The Innovation Zone , by Delphi Group oracle Tom Koulopoulos.
Here's another XXE bug for you (resulting in file theft), just to make the point that this class of bugs is well worth watching out for in client-side applications (such as a browser :) [link] The good news here is that this WebKit regression was quickly fixed by Apple -- and in time for the Safari 4 final release -- so no production browser should ever have been affected.
Tim O’Reilly and John Battelle discussed their vision and nomenclature for the next iteration of the web in a webinar last Thursday: I believe the recording will be available online sometime this week, slides are above. With the term ‘Web 2.0′ enjoying its fifth birthday (and supposedly entering dictionaries as the millionth phrase in the English [.
Last week I wrote a post in which I opined a bit about Facebook search. In it I wrote: Facebook is way more than its newsfeed, and its search play is key to proving that value, and extending it.No doubt building Facebook search today is akin to building Google ten years ago - bigger, most likely, in terms of data, algorithmic, and platform challenges.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
To quote myself : "I've been thinking about migrating my original blog off of blogger and on to something like a hosted Wordpress site or something similar. Since moving to a Mac in March, I've also found that blogging without Windows Live Writer just isn't the same either ;-) But then I find myself getting caught up on what theme to use, different widgets and all that complication. and all I really want is something clean and simple (I'm sure most of you only read my RSS feed anyway) where I sh
As of January 1, 2010, Nevada law will require businesses to use encryption when data storage devices that contain personal information are moved beyond the physical or logical controls of the business, in addition to continuing to require that personal information be encrypted if it is transferred outside the secure system of the business. The new law repeals the existing Nevada encryption law, which will remain in effect until January 1, 2010.
Last March, I spoke to ARMA’s Denver Mile High Chapter about the synergy of RIM and Enterprise Content Management (ECM). Afterward, a respected colleague questioned my slogan, “Everyone is a Records Manager!” He was willing to concede that everyone touches records, but not everyone manages them. It’s true that I am given to hyperbole, and that he has a point, especially in the paper records era.
Safari 4 also fixes an interesting cross-domain XML theft. Full technical details live here: [link] XML theft can include highly sensitive data thanks to things like XHTML, AJAX-y RPCs using XML and authenticated RSS feeds. The example I have steals XML representing a logged-in Gmail user's inbox: Safari 3 demo for users logged in to Gmail I think there's a lot more room for browser-based cross-domain leaks (sometimes called UXSS or universal XSS).
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The new Siemens talent managing environment being deployed by SuccessFactors is more like the entire troposphere than a cloud solution; 420k users across 80 countries in 20 languages will be linked and unified in one giant environment. Replacing existing multiple HR talent systems globally with Successfactor’s on demand software as a service performance and talent management [.
These are the slides from my PublicSphere presentation yesterday: If it isn't broken, why fix it? View more Microsoft Word documents from James Dellow. BTW There is a great column in the UK's Independent newspaper by Headshift's Lee Bryant about "rebooting Britain" that reflects some of the points I made around the need to understand the potential for Government 2.0 from a different viewpoint, which naturally drives us towards a different approach to the way government and the community work tog
A lawsuit that will soon commence in Arizona has the potential to alter the data breach liability landscape by making data security auditors liable for data breaches experienced by the companies they audit. The case, Merrick Bank Corp. v. Savvis Inc., has its origins in events that began in 2003, when Merrick Bank (“Merrick”) offered to hire CardSystems Solutions (“CardSystems”) to process credit card transactions for its merchant customers.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The RIM world still wrestles with the progression of paper records into electronic records, as well as the integration of the two. Paper or plastic? Isolated or federated? Local or remote? The choices are endless. To successfully address these issues, it helps to know the back-story. How did we get here from there? Until the mid-1980s, almost all business records were physical, that is, the medium that held the information was made up of atoms.
Safari 4 was just released and among the various improvements is a range of security fixes. One of these fixes is for an XXE attack against the parsing of the XSL XML. Full technical details may be found here: [link] Or for the lazy, you can skip straight to the: Demo for Safari 3 / MacOS Demo for Safari 3 / Windows I found it interesting that Safari 3 seemed robust against XXE attacks in general -- there are a lot of places that browsers find themselves parsing XML (XmlHttpRequest, prettifying
Reuters are reporting that the US State Department stepped in and asked Twitter to postpone maintenance in order not to disrupt service during Iranian daytime. Twitter, in their blog post explaining the rescheduled downtime, said …our network partners at NTT America recognize the role Twitter is currently playing as an important communication tool in Iran.
Much buzz over the past few days about Facebook's plans to let folks (and, ahem, brands) claim their namespaces on Facebook. IE, Starting this weekend, I should be able to claim www.facebook.com/johnbattelle, just like I already "own" www.twitter.com/johnbattelle ( sort of ). Anil Dash has a very funny send up of all this in a future forward timeline satire here.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Martin Koser (aka Frogpond) has posted an experts profile about me on the Enterprise2Open blog. It covers my views on: The core concept of the Enterprise 2.0 idea; The potential of the Enterprise 2.0; Challenges, threads and issues. Tags: Enterprise 2.
The UK Information Commissioner is initiating a consultation to develop a code of practice that will help companies address online privacy issues. It is anticipated that the code will provide guidance on the following matters: Operating a privacy-friendly website. Rights and protections for individuals. Privacy choices and default settings. Cyberspace and territoriality.
There’s a big difference between a ‘Trust Fall‘ and a ‘Trust #Fail‘ to use the increasingly tiresome valleygirl slang #word Twitter users assign to stuff that doesn’t meet their high standards. A ‘Trust Fall’ is a trust-building exercise often conducted in turns in a group, in which a person deliberately allows himself to fall, relying on [.
108
108
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content