This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Stowe Boyd and I awarded the ‘Open Enterprise 2009‘ award to Booz Allan Hamilton for their ‘Hello’ environment at the Boston Enterprise 2.0 Conference a year ago, and I caught up with Megan Murray of the BAH team one year on to see how their environment was progressing at this year’s Boston event. While it’s relatively [.
The media really, really, really loves to write about Apple and the iPhone these days. It reminds me of Google in 2004, when the media fell in love with the concept of search. Besides the antennae story, which I find hopelessly over reported, the latest iPhone rhapsody has been how many iPhone 4s Apple has sold - apparently, 3 million as of last Friday.
In a statement released on July 29, 2010, the UK Information Commissioner’s Office (“ICO”) has found that the information collected by Google from unsecured WiFi networks during the Street View photography capture exercise “does not include meaningful personal details that could be linked to an identifiable person.” This follows an assessment carried out by the ICO on a sample of the data in question at Google’s London offices.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Firefox just released version 3.6.7 of their excellent browser, and it fixes this: [link] This leaves 4 of the 5 major browsers with fixes (more on this in an upcoming post), which is my threshold for documenting a little tweak to exploitability. It is partially inspired by Gareth Heyes' attack on E4X using character set overrides. For interesting background reading, see: [link] Turns out, the same character set override applies to loading cross-origin CSS via the tag.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Firefox just released version 3.6.7 of their excellent browser, and it fixes this: [link] This leaves 4 of the 5 major browsers with fixes (more on this in an upcoming post), which is my threshold for documenting a little tweak to exploitability. It is partially inspired by Gareth Heyes' attack on E4X using character set overrides. For interesting background reading, see: [link] Turns out, the same character set override applies to loading cross-origin CSS via the tag.
Many airlines now offer mobile boarding passes which enable you to check in using your phone - the challenge is whether you can invoke the relevant screen on your device as you’re about to board the plane. Essentially the sequence of events is that once you check in online you can opt to send your boarding [.
I'm sure you've noticed, but there's a major battle underway for the hearts and minds of what we, in this industry, broadly call "developers." Often the term is used quite strictly, to mean actual coders who build actual software-driven applications, services, or websites. Other times the term is more loosely applied, meaning "companies that build stuff" or "partners of platform X or service Y.".
It’s been a fascinating few days for big money announcements: first Metaweb, the linked data company that is at the heart of the next generation semantic web was pulled into the Google family for an undisclosed amount, Atlassian took in $60 million of funding from Accel partners, and earlier today Jive Software announced they have [.
The fascinating history of the automobile is remarkably similar to how personal computing appears to be evolving. Less than 100 years ago there were no standards with experimental contraptions controlled by levers, pedals, handlebars, wheels and a variety of power sources. Henry Ford succeeded in rolling up the best ideas of the day and developed [.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
( image ) I just reviewed this presentation from Paul Adams , research lead for social at Google (embedded below). He works on Buzz and YouTube, and presumably, whatever is next from Google, including the rumored "Google Me.". His presentation is good, and worthy of your time if you are interested in the impact of social media on culture and business.
I've written before about my relationship with Foursquare , and I'm sure I will again. I've tweeted my complaint that the "friend" mechanism is poorly instrumented (in various ways), and I should note that this is certainly not just a Foursquare problem (more on "Friendstrimentation" shortly). But today I wanted to build on my earlier post, " My Location Is a Box of Cereal ," and Think Out Loud a bit about what I'd really like to do on Foursquare: I'd like to check into a state of mind.
Who remembers the utter gold rush that was the Facebook Platform back in 2007 , back when everyone, and honestly, really, EVERYONE, in the industry was busy answering the question "What's Your Facebook Platform strategy?". Well I sure do. At FM, we had meetings to address this question, meetings driven by me, by my staff and my senior executives, and of course, by our investors, who were asking the same question of every portfolio company they had.
I thought it meant to search ! Apparently, in this context, it means "to drop Microsoft Office and use our software!". I almost feel like a relic pointing out the obvious, but when I got my latest paper-based Fortune magazine (yes, I do subscribe to a few still), I found the image at left on the back cover. Long ago, while writing the book, I predicted that Google, long proud of the fact it never had to market its brand, would have to start marketing like a "normal" company.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Interesting investment by Google Ventures in a company called Recorded Future , a wonderful play on verb tenses and words. The company is a "temporal and predictive analysis engine." That just sounds cool. Google is co-investing with the CIA's investment arm. That's interesting, no?
For all 185K of you RSS readers out there, here are the past week or so of Signals: Monday Signal: Finally, a Slow Weekend. Sort Of. Friday Signal: Who Needs Basketball? We Have Signal. Thursday Signal: Mogul Mania. Weds. Signal: More Noise, Same Signal. Tuesday Signal: A Fourth of News. Thanks for reading, all of you. I'm still stunned at the growth of my RSS feed, from 130K or so to 185K in just a few months.
Every day I spend an hour or two curating a set of links that I find provocative, useful, or important, adding a few lines of commentary to boot. It's called Signal , and you can consume it in three ways - as an email newsletter (sign up on the Signal Home Page in the upper right hand corner), in your RSS reader , or on the web. For those of you who like to click on links, here are the last three Signals for your enjoyment: Weds Signal: Get Out There And Be Counted!
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tomorrow I will be at the Geo Loco conference in SF, interviewing Fred Wilson , partner at Union Square Ventures, investor in Twitter, Zynga, Etsy, Tumblr, Foursquare, and many others, and general good guy. Fred is great on stage, and we have a lot to talk about, given our mutual interests. But as I was preparing for the discussion, I pinged Fred and asked if he thought it'd be a good idea if I asked all of you for input.
In this overwraught essay , a novelist yearns for a time before addiction to technology slowly drained us of our humanity. I don't buy it. We can both be connected and be fulfilled. We can stop, disconnect, read a book, make love without checking our devices for updates. And we can also be connected, while still being human. In fact, being human is being connected.
For all 186K of you loverly RSS readers, here are the past five Signals: Friday Signal: Is Apple Evil? Is the Web Over? Is Privacy Dead? Is This Thing On?! Thursday Signal: Why I Love My Job, Again. Weds. Signal: The Numbers Tell The Story. Tuesday Signal: I Got Yer Policy Right Here. Monday Signal: Google Buys, Android Flys. If you squint, it almost looks like a weekly newsmagazine!
On July 27, 2010, Senator John Kerry (D-Mass.) announced his intention to introduce an online privacy bill to regulate the collection and use of consumer data. “Our counterparts in the House have introduced legislation and I intend to work with Senator Pryor and others to do the same on this side with the goal of passing legislation early in the next Congress,” Kerry said in a prepared statement.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Rite Aid has agreed to pay $1 million and implement remedial measures to resolve Department of Health and Human Services (“HHS”) and Federal Trade Commission allegations that it failed to protect customers’ sensitive health information. The FTC began its investigation following news reports about Rite Aid pharmacies using open dumpsters to discard trash that contained consumers’ personal information such as pharmacy labels and job applications.
In the latest chapter of the Federal Trade Commission’s ongoing efforts to promote consumer privacy with respect to online behavioral advertising, FTC Chairman Jon Leibowitz has reportedly suggested that the FTC may propose a Do Not Track Registry. The registry would be similar to the FTC’s popular Do Not Call Registry , which allows consumers to opt-out of many types of telemarketing calls, but registration on the Do Not Track Registry would not stop online advertisements.
On July 20, 2010, Hunton & Williams announced the release of the first edition treatise Privacy and Data Security Law Deskbook (Aspen Publishers) by lead author Lisa J. Sotto , managing partner of the firm’s New York office and head of the firm’s global Privacy and Information Management practice. The deskbook provides a detailed overview (with thousands of specific citations for the legal practitioner) of those areas of information privacy and data security law that have the greatest impac
On July 14, 2010, the Article 29 Working Party issued a press release regarding its findings on the implementation of the European Data Retention Directive ( Directive 2006/24/EC ). The findings, compiled in a report to be contributed to the European Commission’s forthcoming evaluation of the Directive, indicate that the obligation to retain all telecom and Internet traffic data is not being applied correctly or uniformly across the EU Member States.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On July 21, 2010, a coalition of 38 states sent a letter to Google demanding more information about the company’s collection of data from unsecured wireless networks by its Google Street View vehicles. The letter was sent by Connecticut Attorney General Richard Blumenthal on behalf of the executive committee of a multistate working group investigating Google Street View practices.
On June 1, 2010, Ukraine’s parliament adopted a bill on the protection of personal data which introduces a comprehensive regulatory regime for data processing in the country. The bill was signed by the President of Ukraine on June 24, 2010, and will come into force on January 1, 2011. Currently, data protection in Ukraine is governed by several laws, including the Ukrainian Constitution, the Civil Code and the Law on Information.
On July 7, 2010, the German Federal Office for Information Security, the Bundesamt für Sicherheit in der Informationstechnik (“BSI”) , published a basic paper on data security and data protection for radio-frequency identification (“RFID”) applications. The paper, Technical Guidelines RFID as Templates for the PIA-Framework , describes how to use RFID in compliance with data protection requirements, and explains the relationship between the BSI’s technical guidelines for the secure use of RFIDs
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content