4D printing - the new frontier
Collaboration 2.0
MARCH 14, 2013
Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials
Collaboration 2.0
MARCH 14, 2013
Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials
John Battelle's Searchblog
MARCH 9, 2013
The post Who Owns The Right to Filter Your Feed? appeared first on John Battelle's Search Blog. (image) Last week I was in Salt Lake City for the Adobe Summit, on a stage the size of a parking lot. After some opening remarks about how the world is increasingly lit with data, I brought out Adam Bain, President of Global Revenue for Twitter. (He Vined it, natch.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ChiefTech
MARCH 13, 2013
Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.
Daradiction
MARCH 28, 2013
Eversince I read Kalle Lasn's (Adbusters Founder) book "Culture Jam: The Uncooling of America" I've been fascinated with his anti consumer stance. Idealism aside, this set of images from his most recent book "Meme Wars: The Creative Destruction of Neoclassical Econmics" paints a stark contrast to business as usual.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Robert's Db2
MARCH 25, 2013
In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
MARCH 27, 2013
We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.
John Battelle's Searchblog
MARCH 25, 2013
The post Can We Bridge Data to Humanity? We Best Talk About It. appeared first on John Battelle's Search Blog. The agenda for our seventh annual CM Summit is live. And it rocks. You can read all about it here. I am really looking forward to this conversation, mainly due to the quality of the folks who are coming. Oh, and the theme, of course. I won’t beat around the bush.
ChiefTech
MARCH 13, 2013
Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email. However, the Financial Times reports that Atos are making progress: "Almost two years on, zero email has not only begun to take hold within Atos, but the initiative has attracted interest from a growing number of business leaders.". (Sorry, the link above might get paywalled when you click on it).
Daradiction
MARCH 20, 2013
Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf extension), which he's proclaiming as the convergence of the past 30 years of his work.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Robert's Db2
MARCH 16, 2013
At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Why? Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.
Hunton Privacy
MARCH 29, 2013
On March 8, 2013, the German government published a response to a formal inquiry from one of the German Parliament’s parties on the international security, data protection and surveillance implications of cloud computing. The response describes international cooperation between German and foreign law enforcement agencies that have used mutual legal assistance treaties to obtain cloud data in foreign jurisdictions.
Collaboration 2.0
MARCH 14, 2013
'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.
John Battelle's Searchblog
MARCH 24, 2013
The post How I “Crack” My Inbox appeared first on John Battelle's Search Blog. Over on the LinkedIn Influencer network, I’ve revealed how I manage my often-overflowing inbox. It’s not exactly rocket science, but enough people have found it interesting that I thought I’d share it in a professional context. If you’re interested in stuff like this, give it a read and let me know what you think.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
ChiefTech
MARCH 25, 2013
If you are still trying to get your head around the deeper implications of the Yammer & SharePoint roadmap announcement , here is some further reading: Hold tight - its just a bump in the road. Jeremy Thake is one of my favourite SharePoint technologists - he's not afraid to dig into the details of SharePoint, good or bad. He still has questions he would like answered - for example: If you switch off the SharePoint Newsfeed and replace with Yammer, what happens to the actions and activity th
Preservica
MARCH 26, 2013
I was delighted to stumble upon the Archivists Being Awesome (ABA) Blog. Not only does it have one of the most fun mission statements I have seen for some time - “One part bragging platform, one part skill share, two parts making new friends and being inspired by the work of others, the ABA will give area archivists a chance to briefly describe exciting projects they’re involved in.” it also has some great content.
Privacy and Cybersecurity Law
MARCH 21, 2013
What is Big Data? Big Data is about using mathematical models to spot patterns or “footprints” in large datasets. The […].
Hunton Privacy
MARCH 28, 2013
On March 8, 2013, a U.S. federal appeals court issued a decision in the case United States v. Cotterman , holding that the federal government must have “reasonable suspicion” of criminal activity to conduct a forensic search of laptops and similar devices in the possession of individuals attempting to cross the border. The case arose after Howard Cotterman attempted to enter the United States by car at a checkpoint on the Mexican border.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Collaboration 2.0
MARCH 5, 2013
'Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn''t helping.
John Battelle's Searchblog
MARCH 9, 2013
The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog. I heard you all , and I just made my RSS feed full text and images again. Thanks for all your feedback, and we’ll just have to live with the fraudsters. Till we don’t. Which will probably be never! The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog.
ChiefTech
MARCH 6, 2013
I'm seeing the phrase 'social workflows' being bounced around with more frequency. In the past, it was a good idea to avoid the word 'workflow' in discussions about enterprise social computing because people immediately jumped to thinking about highly structured and automated workflows that you might find in a system of record or a collaboration platform, like SharePoint or Dominio/Lotus Note.
CGI
MARCH 18, 2013
Private Sector CloudStore, anyone? ravi.kumarv@cgi.com. Mon, 03/18/2013 - 08:00. In February 2012 the Cabinet Office launched something rather revolutionary: A catalogue of IT services, available on-demand to any public sector buyer, with predictable prices, and from pre-vetted suppliers. This innovation much-simplifies normal public sector procurement process.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Preservica
MARCH 15, 2013
I am excited to announce the release of the latest version award winning SDB technology, SDB4.3.1 now available. So what’s in the new in this version 4.3.1? Advanced Search Filtering allowing complex queries using metadata and content. Improved user interface for reviewing the audit trail. Generic metadata viewing to allow the use of any metadata schema.
Hunton Privacy
MARCH 28, 2013
On March 28, 2013, the Department of Commerce’s Notice of Inquiry into “Incentives to Adopt Improved Cybersecurity Practices” was published in the Federal Register (78 Fed. Reg. 18954). This Notice, which includes a series of broad questions for owners of the nation’s critical infrastructure, follows up on earlier Commerce inquiries focused on incentives for noncritical infrastructure.
Collaboration 2.0
MARCH 5, 2013
Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn't helping.
Privacy and Cybersecurity Law
MARCH 1, 2013
In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
ChiefTech
MARCH 29, 2013
Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.
HIPAA
MARCH 26, 2013
March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.
Preservica
MARCH 6, 2013
It has been my pleasure to work with the digital team at Wellcome Library as they put Tessella’s SDB in place to manage and preserve their digital collections, so I was delighted to be able to attend the launch of the Wellcome Library Codebreakers: makers of modern genetics - [link]. This fascinating collection holds the papers of the pioneers of modern genetics, including Francis Crick, James D.
Let's personalize your content