This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I met with Bobby Yazdani, CEO & President of Saba Software earlier this week at their Redwood Shores California headquarters. A substantial global company with 1400 customers and more than 19 million users across 150 countries, Saba is the piece of the enterprise stack jigsaw puzzle that first brought training and learning into the internet [.
One of my first "big books" out of college was James Gleick's Chaos: Making a New Science and it still resonates with me, though it's been so long I think I'm due for a re-read. In any case, the next book up in my ongoing self-education is Gleick's The Information: A History, a Theory, a Flood. It's long. It's dense. It's good, so far. In fact, there's already a passage, a quote from Plato, that has struck me as germane to the ongoing threads I attempt to weave here on this site (even if all I'm
DB2 10 for z/OS, which became generally available this past October, is loaded with features and functions that can reduce the CPU cost of applications. One of my favorites is high-performance DBATs (DBATs, or database access threads, are associated with SQL statements that are issued by remote requesters using the DRDA protocol and processed via DB2's Distributed Data Facility).
In the video, Kurt Daradics, President & Co-Founder of CitySourced, shares the CitySourced vision to transform civic engagement by building mobile 311 applications on a SaaS platform.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On April 26, 2011, Sony Computer Entertainment America (“Sony”) disclosed an information security breach that may affect up to 77 million consumers. On Sony’s PlayStation blog , Patrick Seybold, Senior Director of Corporate Communications and Social Media, wrote that an unauthorized person intruded into Sony’s PlayStation Network and Qriocity streaming music and video service between April 17 and April 19, 2011, and may have obtained users’ names, addresses, email address, birthdates, passwords
Have you seen the Reusable Content list in SharePoint 2010? To get there in your SharePoint environment, go to Site Actions » View All Site Content. Or you could just go to [link] If it is activated in your site collection, you'll see "Reusable Content" under "Lists" on the all site content page. According to the description on the All Site Content page in SharePoint, Items in this list contain HTML or text content which can be inserted into web pages.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Have you seen the Reusable Content list in SharePoint 2010? To get there in your SharePoint environment, go to Site Actions » View All Site Content. Or you could just go to [link] If it is activated in your site collection, you'll see "Reusable Content" under "Lists" on the all site content page. According to the description on the All Site Content page in SharePoint, Items in this list contain HTML or text content which can be inserted into web pages.
Cisco CEO John Chambers has been bold in his experimentation with âco-ordinate and cultivateâ over âcommand and controlâ at the helm of the forty billion dollar global behemoth over the last several years, as I have previously written here. Where Chambers is taking the Cisco Network next was the subject of an internal email (now made [.
Lately in talks and private conversations, I've been thinking out loud about the role of Facebook in our lives. It's an extraordinary service (and company), and deserves its extraordinary valuation. But its approach to our "social graph" is limiting, as I and others have pointed out quite a bit. While in Mexico I had the chance to sit with a couple of entrepreneurs who have an idea I feel is deeply *right* about social networking, and it couldn't be further from how Facebook works today.
Some of my blog posts are about DB2 things that are very new ( my previous entry described the high-performance DBATs introduced with DB2 10 for z/OS), and some cover DB2 stuff that's been out there for a while. This entry is an example of the latter. Dynamic allocation of the sort work data sets used in the execution of mainframe DB2 utilities is something that goes back at least to DB2 Version 8, and a lot if DBAs have taken advantage of this feature to improve the reliability and performance
We are delighted with the new users in the US, including Family Search ( see here ) and the LoC Sponsored State Archive Pilot ( see here ). We look forward to adding a lot more US users in the near future.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On April 26, 2011, the French Data Protection Authority (the “CNIL”) issued a press release unveiling its inspection goals for the coming year. In a report adopted on March 24, 2011, the CNIL indicated that it intends to conduct at least 400 inspections in France (100 more than the 2010 goal), with a special focus on the following issues: International Data Transfers.
In the video, Kurt Daradics, President & Co-Founder of CitySourced, shares the CitySourced vision to transform civic engagement by building mobile 311 applications on a SaaS platform.
It’s been a difficult Easter for online computing services: The Amazon EC2 service failed and Sony’s Playstation network was out of service over the important holiday break and continues to be down as I write this. Much has been written about these failures already, with plenty of debate particularly from those who doubt cloud computing’s credibility. [.
I took a ride today, and it was gorgeous as usual. That's not my story, but it's certainly a part of it. As I rode I used the AllSports GPS app on my iphone to track my progress (guys, if you're reading, your upload is busted). I knew I'd be able to see the whole ride on Google Maps later, which is cool. It also tracks stuff like distance, vertical, speed, etc.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Over the past few years, there have been various high-profile incidents and concerns with the Certificate Authority-based infrastructure that underpins https connections. Various different efforts are underway to tackle the problem; many are enumerated here: [link] And in terms of things baked directly into the browser, we have things like Firefox's Certificate Patrol add-on: [link] My colleague Adam Langley summarized some features and directions we've been exploring in Chromium recently, it's
(NB: Much has been written and said on this topic, and this post is in no way complete. We'll be exploring this issue and many others related to data at the Web 2 Summit this Fall). Perhaps the largest problem blocking our industry today is the retardation of consumer-driven data sharing. We're all familiar with the three-year standoff between Google and Facebook over crawling and social graph data.
If you've been reading my musings these past few months, you may have noticed an increasing fascination with data. Who owns it (the creator, the service, both? Who has access to it - ISPs? Device makers? Marketers? The government? And how are we as an industry leveraging data to create entirely new classes of services? Well, expect a lot more musing here, because (finally!
For my next book (no really, I'm starting to work on it in my copious spare time), I've begun to read in earnest. I've got a rather long list, and I'm not sure I'll get to them all, but for those that I do read, I plan to do a quick review here, if for no other reason than to prove I read the damn thing, and had an opinion. Because the next book is a report from the future, I figured I may as well start with the NYT bestseller The Next 100 Years: A Forecast for the 21st Century by George Friedma
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
We're very excited to announce the theme and initial speaker lineup for our 6th annual Conversational Marketing Summit. The Summit will take place June 6-7th in New York City, at the Hudson Theater and Millennium Broadway Hotel. Our theme is Finding the Signal. Speakers at our annual anchor event include Laura Desmond , CEO of Starcom MediaVest, Tim Westergren , Founder of Pandora, David Karp , Founder of Tumblr, Antonio Lucio , CMO of Visa, and Judy McGrath , Chair and CEO of MTV Networks.
This headline caught my eye this morning: US VCs Raised $7.7 Billion In Q1, Highest Influx In A Decade. Of course, if you 've been following the news in our industry, you know there's a raging debate on over whether we are in "another bubble." This news will of course be interpreted as evidence that, in fact, we are back to bubbly levels.after all, one decade ago was when we had our last big hurrah, right?
I'm a Guy Kawasaki fan, so this isn't really a "review" as much as an appreciation for his new book Enchantment. I read it over this weekend, it's the kind of book you could skim in an hour, or spend a lot of time with. I fell somewhere in the middle, stopping every so often to consider his advice and apply it to situations I find myself in all the time.
Herewith and below: Friday Signal: What's Yer 20? Apple and Google Know! ». Thursday Signal: War, Death, Skynet, Pot. Weds. Signal: This Is Your Brain, On Facebook. Tuesday Signal: We Were All Sophomores, Once And Again. Monday Signal: What *Is* The Future of Media?
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Last night I had the pleasure of interviewing Steven Levy , and old colleague from Wired, on the subject of his new book: In The Plex: How Google Thinks, Works, and Shapes Our Lives. The venue was the Commonwealth Club in San Francisco, and I think they'll have the audio link up soon. Steven's interview was a lot like his book - full of previously untold anecdotes and stories that rounded out pieces of Google's history that many of us only dreamt of knowing about.
Herewith, for all you RSS readers of Searchblog, is that other thing I do every day of the work week, Signal. If it suits your information consumption goals, sign up for Signal’s email newsletter or RSS feed on the FM home page (upper right box). Monday Signal: What *Is* The Future of Media? (Today's Signal). Friday Signal: What Is the Next Facebook?
Federated Media is proud to present the sixth annual Conversational Marketing Summit, June 6-7 at the fabulous Hudson Theater in the Millennium Broadway Hotel in Times Square. The preliminary agenda is now up, more is coming, but you can get a pretty good sense of the lineup - it's amazing. This year’s CM Summit will bridge the conversations of FM's regional Signal conferences on one stage, bringing together the topics of content marketing, location services, mobile, data, and the real-time web
As part of an effort to increase penalties for violations of the country’s Personal Information Protection Act , officials in Japan plan to extend liability under that law to individual employees, according to recent reports in The Yomiuri Shimbun and The Japan Times. Currently, a company that violates the law may be fined or ordered to take remedial steps, and the company head may be imprisoned.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On April 11, 2011, the United States District Court for the Northern District of California declined to dismiss four of the nine claims in a class action lawsuit filed against RockYou, Inc. (“RockYou”), a publisher and developer of applications used on popular social media sites. The suit stems from a December 2009 security breach caused by an SQL injection flaw that resulted in the exposure of unencrypted user names and passwords of approximately 32 million RockYou users.
On April 14, 2011, the European Advertising Standards Alliance (“EASA”) and IAB Europe released complementary new self-regulatory standards for online behavioral advertising. This cross-industry initiative is aimed at enhancing European consumers’ control over their data and ensuring transparency, particularly with respect to advertisements that are delivered using third party online behavioral advertising.
On April 18, 2011, the European Commission (the “Commission”) adopted an Evaluation Report on the EU Data Retention Directive 2006/24/EC (the “Data Retention Directive”). The Data Retention Directive requires that, for law enforcement purposes, telecommunications service and network providers (“Operators”) must retain certain categories of telecommunications data (excluding the content of the communication) for not less than six months and not more than two years.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content