March, 2013

article thumbnail

Who Owns The Right to Filter Your Feed?

John Battelle's Searchblog

The post Who Owns The Right to Filter Your Feed? appeared first on John Battelle's Search Blog. (image) Last week I was in Salt Lake City for the Adobe Summit, on a stage the size of a parking lot. After some opening remarks about how the world is increasingly lit with data, I brought out Adam Bain, President of Global Revenue for Twitter. (He Vined it, natch.

IT 110
article thumbnail

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

111
111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 95
article thumbnail

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Elie

Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users.

IT 62
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Access 67

More Trending

article thumbnail

Can We Bridge Data to Humanity? We Best Talk About It.

John Battelle's Searchblog

The post Can We Bridge Data to Humanity? We Best Talk About It. appeared first on John Battelle's Search Blog. The agenda for our seventh annual CM Summit is live. And it rocks. You can read all about it here. I am really looking forward to this conversation, mainly due to the quality of the folks who are coming. Oh, and the theme, of course. I won’t beat around the bush.

IT 105
article thumbnail

Disruptive digital cliques

Collaboration 2.0

We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

101
101
article thumbnail

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email. However, the Financial Times reports that Atos are making progress: "Almost two years on, zero email has not only begun to take hold within Atos, but the initiative has attracted interest from a growing number of business leaders.". (Sorry, the link above might get paywalled when you click on it).

IT 75
article thumbnail

German Law Enforcement Access to Cloud Data in Foreign Jurisdictions, Including the U.S.

Hunton Privacy

On March 8, 2013, the German government published a response to a formal inquiry from one of the German Parliament’s parties on the international security, data protection and surveillance implications of cloud computing. The response describes international cooperation between German and foreign law enforcement agencies that have used mutual legal assistance treaties to obtain cloud data in foreign jurisdictions.

Cloud 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Why? Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

article thumbnail

SXSW 2013 Highlights: Kurt Daradics & Stephen Wolfram

Daradiction

Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf extension), which he's proclaiming as the convergence of the past 30 years of his work.

Cloud 64
article thumbnail

How I “Crack” My Inbox

John Battelle's Searchblog

The post How I “Crack” My Inbox appeared first on John Battelle's Search Blog. Over on the LinkedIn Influencer network, I’ve revealed how I manage my often-overflowing inbox. It’s not exactly rocket science, but enough people have found it interesting that I thought I’d share it in a professional context. If you’re interested in stuff like this, give it a read and let me know what you think.

IT 89
article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

101
101
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Further reading on the Yammer + SharePoint roadmap

ChiefTech

If you are still trying to get your head around the deeper implications of the Yammer & SharePoint roadmap announcement , here is some further reading: Hold tight - its just a bump in the road. Jeremy Thake is one of my favourite SharePoint technologists - he's not afraid to dig into the details of SharePoint, good or bad. He still has questions he would like answered - for example: If you switch off the SharePoint Newsfeed and replace with Yammer, what happens to the actions and activity th

article thumbnail

Appeals Court Holds “Reasonable Suspicion” Required for Forensic Search of Laptop at the Border

Hunton Privacy

On March 8, 2013, a U.S. federal appeals court issued a decision in the case United States v. Cotterman , holding that the federal government must have “reasonable suspicion” of criminal activity to conduct a forensic search of laptops and similar devices in the possession of individuals attempting to cross the border. The case arose after Howard Cotterman attempted to enter the United States by car at a checkpoint on the Mexican border.

article thumbnail

Awesome archivists

Preservica

I was delighted to stumble upon the Archivists Being Awesome (ABA) Blog. Not only does it have one of the most fun mission statements I have seen for some time - “One part bragging platform, one part skill share, two parts making new friends and being inspired by the work of others, the ABA will give area archivists a chance to briefly describe exciting projects they’re involved in.” it also has some great content.

Access 40
article thumbnail

Private Sector CloudStore, anyone?

CGI

Private Sector CloudStore, anyone? ravi.kumarv@cgi.com. Mon, 03/18/2013 - 08:00. In February 2012 the Cabinet Office launched something rather revolutionary: A catalogue of IT services, available on-demand to any public sector buyer, with predictable prices, and from pre-vetted suppliers. This innovation much-simplifies normal public sector procurement process.

Sales 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

I’ve Turned Full Feeds Back On

John Battelle's Searchblog

The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog. I heard you all , and I just made my RSS feed full text and images again. Thanks for all your feedback, and we’ll just have to live with the fraudsters. Till we don’t. Which will probably be never! The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog.

71
article thumbnail

Disruptive digital cliques

Collaboration 2.0

'We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

74
article thumbnail

Three Social Workflow Patterns

ChiefTech

I'm seeing the phrase 'social workflows' being bounced around with more frequency. In the past, it was a good idea to avoid the word 'workflow' in discussions about enterprise social computing because people immediately jumped to thinking about highly structured and automated workflows that you might find in a system of record or a collaboration platform, like SharePoint or Dominio/Lotus Note.

Sales 60
article thumbnail

Department of Commerce Issues Notice of Inquiry Regarding Incentives to Adopt Improved Cybersecurity Practices

Hunton Privacy

On March 28, 2013, the Department of Commerce’s Notice of Inquiry into “Incentives to Adopt Improved Cybersecurity Practices” was published in the Federal Register (78 Fed. Reg. 18954). This Notice, which includes a series of broad questions for owners of the nation’s critical infrastructure, follows up on earlier Commerce inquiries focused on incentives for noncritical infrastructure.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The latest version of award winning technology now available

Preservica

I am excited to announce the release of the latest version award winning SDB technology, SDB4.3.1 now available. So what’s in the new in this version 4.3.1? Advanced Search Filtering allowing complex queries using metadata and content. Improved user interface for reviewing the audit trail. Generic metadata viewing to allow the use of any metadata schema.

article thumbnail

Google called before European privacy authorities

Privacy and Cybersecurity Law

In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].

Privacy 40
article thumbnail

HIPAA Final Rule: Today is Effective Date–Covered Entities and Business Associates Have 180 Days to Comply

HIPAA

March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.

article thumbnail

Not much Klout

Collaboration 2.0

'Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn''t helping.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred

ChiefTech

Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.

article thumbnail

Sotto Named Among National Law Journal’s “100 Most Influential Lawyers”

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Lisa J. Sotto , partner and head of the firm’s Global Privacy and Data Security practice , has been named to The National Law Journal’s “ The 100 Most Influential Lawyers in America ” list. Last published in 2006, this is only the eighth time this list of legal luminaries has been compiled since it was first established in 1985 as “Profiles in Power.”.

Privacy 40
article thumbnail

Wellcome Library shows the power of digitization to reveal the influence, insight and inspiration behind critical moments of scientific discovery

Preservica

It has been my pleasure to work with the digital team at Wellcome Library as they put Tessella’s SDB in place to manage and preserve their digital collections, so I was delighted to be able to attend the launch of the Wellcome Library Codebreakers: makers of modern genetics - [link]. This fascinating collection holds the papers of the pioneers of modern genetics, including Francis Crick, James D.