June, 2009

article thumbnail

English's Millionth Word: Web 2.0

John Battelle's Searchblog

For the past few days I've been focused on a final draft of an essay, co-authored with Tim O'Reilly, focusing on the theme of this year's Web 2.0 Summit. It's rewarding work, reminiscent of the early days of Wired, when I'd regularly edit or write long form pieces focusing on big ideas and the future, but grounded in real world examples from today. But writing and editing this kind of stuff is also challenging work, and I often procrastinate, as I am right now, by writing a blog post or skimming

Paper 94
article thumbnail

Collaborative Networks vs Social Networks

Collaboration 2.0

During a telephone conversation between us last week Aaron Fulkerson of MindTouch said he was going to pick up on my Collaboration Networks meme, and he has now produced a solid post on this topic. Aaron takes on the number one issue plaguing widespread adoption of broad Enterprise 2.0 strategy: piecemeal departmental use of collaboration tools, [.

80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Us Now Sydney on 9th July

ChiefTech

I know I'm repeating myself , but just a reminder that if you live in Sydney and either haven't watched the Us Now documentary yet or simply would like the chance to discuss it further, then join us on the evening of Thursday 9th July at the Australian Technology Park* for a special community screening. Its a free event, but you do need to register - and of course, don't forget to tell your friends about it.

article thumbnail

New Data Security Breach Laws in Alaska and South Carolina

Hunton Privacy

On July 1, 2009, new laws will take effect in Alaska and South Carolina that will require entities that have experienced data security breaches involving personal information to notify affected individuals of the breaches. With these additions, a total of 44 states, plus the District of Columbia, Puerto Rico and the U.S. Virgin Islands, will have active breach notification laws in place.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Innovation, from Within

Positively RIM

Historical objectivity is always difficult. I never give full credence to, for example, the American Film Institute’s lists of movie superlatives because they always seem skewed toward recent films. That’s not surprising. Can anyone born after 1940 really appreciate the impact of Charlie Chaplin’s silent films? Fully recognizing my historical subjectivity, I nonetheless suggest that Records & Information Management is evolving rapidly.

More Trending

article thumbnail

It May Be Free, But It's Sure As Hell Underwritten

John Battelle's Searchblog

There's quite a wonderful authorial kerfuffle happening between Chris Anderson, whose recent book "Free" has been the target both of plagiarism charges (from Wikipedia, of all places, oh the wonderful irony, one might think Chris actually planted the whole damn thing.) and Malcolm Gladwell, who never met a clever anecdote he couldn't convert into a well turned (and dammingly entertaining) book of his own.

IT 68
article thumbnail

Cisco Live! - CEO Chambers on Collaboration Business Value

Collaboration 2.0

The above video clips (from my handheld Flip) are from John Chambers Cisco Live! keynote address today and are specifically two edits about Cisco’s strategic perspective on collaboration and Web 2.0 technologies in the enterprise. In the second edit Chambers talks about Cisco’s business architectural re-engineering into a collaborative enterprise, which I have previously written [.

61
article thumbnail

Intranets and social computing - first mover disadvantage?

ChiefTech

As you may know, in the past I worked at Ernst & Young in their Centre for Business Knowledge , the group who are responsible for the “ KWeb ” intranet. Outside of the top tier accounting firms (who have always understood they are involved in knowledge work), I’ve yet to find any large organisations with such a cohesive or advanced intranet, so I like to track public case studies and articles about Ernst & Young ’s intranet and knowledge management program to see how it is progressing si

Risk 45
article thumbnail

Obama Proposes New Financial Services Consumer Protection Agency

Hunton Privacy

The Obama Administration today formally announced its sweeping proposal for new regulation of the financial industry. The plan proposes the formation of a new watchdog agency that would seek to protect consumers’ interests. The proposal raises a number of privacy and data security questions, such as the role of the new financial services consumer protection agency in protecting privacy and data security and the continued role of the Federal Trade Commission as the lead agency in this are

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Innovation (1)

Positively RIM

If the roots of Records & Information Management are at least 2300 years old, why is Innovation a top RIM priority in 2009? Beyond the truism, “Stagnation is death,” the answer identifies key, even vital, roles for records managers and their programs. Certainly, innovation is a hot topic. It is the cover story of the June 15th BusinessWeek and the focus of a fast-selling book, The Innovation Zone , by Delphi Group oracle Tom Koulopoulos.

article thumbnail

Bonus Safari XXE (only affecting Safari 4 Beta)

Scary Beasts Security

Here's another XXE bug for you (resulting in file theft), just to make the point that this class of bugs is well worth watching out for in client-side applications (such as a browser :) [link] The good news here is that this WebKit regression was quickly fixed by Apple -- and in time for the Safari 4 final release -- so no production browser should ever have been affected.

20
article thumbnail

Google v. Facebook? What We Learn from Twitter.

John Battelle's Searchblog

Last week I wrote a post in which I opined a bit about Facebook search. In it I wrote: Facebook is way more than its newsfeed, and its search play is key to proving that value, and extending it.No doubt building Facebook search today is akin to building Google ten years ago - bigger, most likely, in terms of data, algorithmic, and platform challenges.

IT 60
article thumbnail

Web Squared: Web 2.0's Successor?

Collaboration 2.0

Tim O’Reilly and John Battelle discussed their vision and nomenclature for the next iteration of the web in a webinar last Thursday: I believe the recording will be available online sometime this week, slides are above. With the term ‘Web 2.0′ enjoying its fifth birthday (and supposedly entering dictionaries as the millionth phrase in the English [.

IT 55
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Moving this blog to Posterous

ChiefTech

To quote myself : "I've been thinking about migrating my original blog off of blogger and on to something like a hosted Wordpress site or something similar. Since moving to a Mac in March, I've also found that blogging without Windows Live Writer just isn't the same either ;-) But then I find myself getting caught up on what theme to use, different widgets and all that complication. and all I really want is something clean and simple (I'm sure most of you only read my RSS feed anyway) where I sh

IT 40
article thumbnail

Nevada Updates Encryption Law and Mandates PCI DSS Compliance

Hunton Privacy

As of January 1, 2010, Nevada law will require businesses to use encryption when data storage devices that contain personal information are moved beyond the physical or logical controls of the business, in addition to continuing to require that personal information be encrypted if it is transferred outside the secure system of the business. The new law repeals the existing Nevada encryption law, which will remain in effect until January 1, 2010.

article thumbnail

Idol, Obama, and RIM

Positively RIM

Last March, I spoke to ARMA’s Denver Mile High Chapter about the synergy of RIM and Enterprise Content Management (ECM). Afterward, a respected colleague questioned my slogan, “Everyone is a Records Manager!” He was willing to concede that everyone touches records, but not everyone manages them. It’s true that I am given to hyperbole, and that he has a point, especially in the paper records era.

article thumbnail

Apple's Safari 4 also fixes cross-domain XML theft

Scary Beasts Security

Safari 4 also fixes an interesting cross-domain XML theft. Full technical details live here: [link] XML theft can include highly sensitive data thanks to things like XHTML, AJAX-y RPCs using XML and authenticated RSS feeds. The example I have steals XML representing a logged-in Gmail user's inbox: Safari 3 demo for users logged in to Gmail I think there's a lot more room for browser-based cross-domain leaks (sometimes called UXSS or universal XSS).

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

A Wish List for Facebook Search

John Battelle's Searchblog

(This post was swallowed whole by my Ecto software, stay tuned.).

56
article thumbnail

Siemen's Global SuccessFactors Cloud

Collaboration 2.0

The new Siemens talent managing environment being deployed by SuccessFactors is more like the entire troposphere than a cloud solution; 420k users across 80 countries in 20 languages will be linked and unified in one giant environment. Replacing existing multiple HR talent systems globally with Successfactor’s on demand software as a service performance and talent management [.

Cloud 53
article thumbnail

If it isn't broken, why fix it? (New patterns in government)

ChiefTech

These are the slides from my PublicSphere presentation yesterday: If it isn't broken, why fix it? View more Microsoft Word documents from James Dellow. BTW There is a great column in the UK's Independent newspaper by Headshift's Lee Bryant about "rebooting Britain" that reflects some of the points I made around the need to understand the potential for Government 2.0 from a different viewpoint, which naturally drives us towards a different approach to the way government and the community work tog

article thumbnail

Liability for Data Security Auditors

Hunton Privacy

A lawsuit that will soon commence in Arizona has the potential to alter the data breach liability landscape by making data security auditors liable for data breaches experienced by the companies they audit. The case, Merrick Bank Corp. v. Savvis Inc., has its origins in events that began in 2003, when Merrick Bank (“Merrick”) offered to hire CardSystems Solutions (“CardSystems”) to process credit card transactions for its merchant customers.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How Did We Get Here? Five Technologies that led to electronic records

Positively RIM

The RIM world still wrestles with the progression of paper records into electronic records, as well as the integration of the two. Paper or plastic? Isolated or federated? Local or remote? The choices are endless. To successfully address these issues, it helps to know the back-story. How did we get here from there? Until the mid-1980s, almost all business records were physical, that is, the medium that held the information was made up of atoms.

article thumbnail

Apple's Safari 4 fixes local file theft attack

Scary Beasts Security

Safari 4 was just released and among the various improvements is a range of security fixes. One of these fixes is for an XXE attack against the parsing of the XSL XML. Full technical details may be found here: [link] Or for the lazy, you can skip straight to the: Demo for Safari 3 / MacOS Demo for Safari 3 / Windows I found it interesting that Safari 3 seemed robust against XXE attacks in general -- there are a lot of places that browsers find themselves parsing XML (XmlHttpRequest, prettifying

article thumbnail

Facebook's Namespace Land Grab? Or Maybe.It's Just Useful

John Battelle's Searchblog

Much buzz over the past few days about Facebook's plans to let folks (and, ahem, brands) claim their namespaces on Facebook. IE, Starting this weekend, I should be able to claim www.facebook.com/johnbattelle, just like I already "own" www.twitter.com/johnbattelle ( sort of ). Anil Dash has a very funny send up of all this in a future forward timeline satire here.

IT 49
article thumbnail

US State Department Reschedules Twitter Maintenance Due to Iran Primetime

Collaboration 2.0

Reuters are reporting that the US State Department stepped in and asked Twitter to postpone maintenance in order not to disrupt service during Iranian daytime. Twitter, in their blog post explaining the rescheduled downtime, said …our network partners at NTT America recognize the role Twitter is currently playing as an important communication tool in Iran.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

My Enterprise 2.0 Experts Profile on Enterprise2Open

ChiefTech

Martin Koser (aka Frogpond) has posted an experts profile about me on the Enterprise2Open blog. It covers my views on: The core concept of the Enterprise 2.0 idea; The potential of the Enterprise 2.0; Challenges, threads and issues. Tags: Enterprise 2.

IT 40
article thumbnail

UK Information Commissioner Initiates Dialogue on Online Privacy

Hunton Privacy

The UK Information Commissioner is initiating a consultation to develop a code of practice that will help companies address online privacy issues. It is anticipated that the code will provide guidance on the following matters: Operating a privacy-friendly website. Rights and protections for individuals. Privacy choices and default settings. Cyberspace and territoriality.

Privacy 40
article thumbnail

Twitter Trust #Fails

Collaboration 2.0

There’s a big difference between a ‘Trust Fall‘ and a ‘Trust #Fail‘ to use the increasingly tiresome valleygirl slang #word Twitter users assign to stuff that doesn’t meet their high standards. A ‘Trust Fall’ is a trust-building exercise often conducted in turns in a group, in which a person deliberately allows himself to fall, relying on [.

45