This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In the past 12 hours, about ten friends (and counting) have sent me a copy of this ad on Facebook for a company called "AppSumo." I have nearly 5000 "friends" on Facebook, a problem I've written about in the past , but seeing this ad threw me. Apparently, this is *not* part of Facebook's social ads, where people can buy ads targeting friends of particular people on third party sites - after all, this appears on Facebook.com.
Google’s pivot from search to social technologies occurred last week and my early impressions of their new service Google+ are very positive, particularly around their efforts on allowing you to group your contacts. The giant global advertising company have many years experience analyzing your search and email history, and often display eerily accurate recommendations contextual [.
EDIT (Tuesday 2nd August) Microsoft Statement is available from here EDIT (Sunday 31th July) The flaw is fixed: I had a phone call with some people from Microsoft yesterday (yes on a Saturday) and they told me they fixed the problem. I will update this post with their response as soon as it is out.
Many of you have probably heard (I've said it a number of times in presentations myself) that starting with DB2 9 for z/OS "pure" sequential prefetch (what we just called sequential prefetch before dynamic prefetch came along) would only be used for table space scans. In all other situations if DB2 utilized prefetch to access pages of a database object it would be dynamic or list prefetch.
Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.
Last month, Texas Governor Rick Perry signed a health privacy bill into law that imposes new obligations exceeding the requirements in the HIPAA Privacy Rule. The law, which will become effective on September 1, 2012, incorporates the expanded definition of the term “covered entity” in Texas’s existing health privacy law and could have a broad impact on many non-HIPAA covered entities.
Back when blogging began, I scoffed, and said it wouldn't last. It seemed that blogging = bloviating. Why would anyone want to read about Samantha's average trip to the market? And comment? Yeah right! But my darling wife insisted that there was value in the medium, and she began blogging on a number of topics. Obviously, I admit she was right (try not to faint, wife).
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Back when blogging began, I scoffed, and said it wouldn't last. It seemed that blogging = bloviating. Why would anyone want to read about Samantha's average trip to the market? And comment? Yeah right! But my darling wife insisted that there was value in the medium, and she began blogging on a number of topics. Obviously, I admit she was right (try not to faint, wife).
( image ) Last night I got to throw a party, and from time to time, that's a pretty fun thing to do. To help us think through the program and theme of the Web 2 Summit this Fall, we invited a small group of influential folks in the Bay area to a restaurant in San Francisco, fed them drinks and snacks, and invited their input. (Here are some pics if you want to see the crowd.).
Like accountancy software and spreadsheets, HR Technology has been around as long as business computing. Recruiting, payroll, tracking work time, performance appraisals, employee benefits administration, managing training and learning and performance reviews and records…and of course the funeral parlor like world of ‘off boarding’ may not be the sexiest of software spaces but they form [.
While the standard technique to track users across multiples sites / visits is to use cookies this is by no means the only way to do this. Last year Samy, with his famous evercookie application, showed that in fact many browser storages (Flash, locale storage) can be used to store a unique identifier.
It takes two to innovate. ravi.kumarv@cgi.com. Fri, 07/01/2011 - 08:00. Numerous surveys of clients and suppliers all agree – collaborative innovation is important and desired. Especially in outsourcing. But why is it still not ‘business as usual’? Two research projects recently completed by the National Outsourcing Association in the UK and Warwick Business School (WBS) explored how innovation is included within outsourcing contracts and how it is subsequently managed.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
As reported in the Hunton Employment & Labor Perspectives Blog , Connecticut recently became the latest state to pass a law regulating employer use of credit reports. The law , which goes into effect on October 1, 2011, prohibits employers from requiring employees or prospective employees to consent to the employer requesting their credit report as a condition of employment.
Very recently, I upgraded to Firefox 4.0. That's why I was surprised when I began getting bugged to upgrade to Firefox 5.0. Wait, huh? Did someone fat-finger the subversion commit? It seemed to me like it was time for a minor version release, especially considering some of my favorite plugins have not been upgraded for 4.0 yet. Apparently, I'm not alone.
It's hard to not voice at least one note into the Morman Tabernacle of commentary coming out of Google's first two weeks as a focused player in the social media space. I haven't read all the commentary, but one observation that seems undervoiced is this: If Google+ really works, Google will be creating a massive amount of new "conversational media" inventory, the very kind of marketing territory currently under development over at Tumblr and Twitter.
The conventional wisdom about personally leveraging the ’social’ web has been the idea that promoting your attributes and sharing ideas will make you more visible online, and therefore attract more business success or job offers. Now that we have hit mass understanding and use of tools that make it simple to publish online, have we [.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
[With thanks to Mathias Kresin for being the first to notice] An incident, what fun! Earlier today, I was alerted that a vsftpd download from the master site (vsftpd-2.3.4.tar.gz) appeared to contain a backdoor: [link] The bad tarball is (sha256sum): 2a4bb16562e0d594c37b4dd3b426cb012aa8457151d4718a5abd226cef9be3a5 vsftpd-2.3.4.tar.gz And, of course, the GPG signature notices: $ gpg.
Way back in the day, before all this Interweb stuff made news, we had a computer hardware and software industry that was both exciting and predictable. I was a cub reporter in those days, covering an upstart company (Apple) as it did battle with two dug-in monopolists: IBM in hardware, and Microsoft in software. IBM was clearly on its way down (losing share to legions of hardware upstarts in Asia and the US), but Microsoft was an obvious - and seemingly unbeatable - winner.
I'm looking for someone with whom to work on my next book project, What We Hath Wrought. The person I'm looking for is probably impossible to find, but I'm going to try anyway. Why impossible? Because I haven't met someone like the person I'm imagining, at least not in the right context. Back when I needed a partner to help me get FM off the ground, I wrote a post looking for an office manager/person friday.
Even before I was a few pages into The Information , a deep, sometimes frustrating but nonetheless superb book by James Gleick, I knew I had to ask him to speak at Web 2 this year. Not only did The Information speak to the theme of the conference this year ( the Data Frame ), I also knew Gleick, one of science's foremost historians and storytellers, would have a lot to say to our industry.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
One last thought before I hit the hay after a long, satisfying evening with the people who gave me the chance to start FM in their garage , the Shores. And that is this: Google killed its earnings earlier this evening thanks in part to is algorithmic approach to display advertising (not that profit was easily broken out, I'm sure it contributed in the way most mature brand businesses do, which, as a mature business, must be looking way better than it did a few years ago.
I fell out of the habit, but here are the Signals from last week. If you want to get my daily roundup of stories worth paying attention to, get the RSS here , or sign up in email at the top right of the page here. Monday Signal: Is Google Too Big? Tuesday Signal: Will Big Data Save Us? We Can Pray. Weds. Signal: A Good Day for the Open Internet. Thursday Signal: So Many Links, So Little Time.
I know I've been a bit quiet here on Searchblog of late, and I've promised that will change shortly, as I ramp up on the new book. But one faction of Searchblog has not been quiet: the comment spammers. So I am turning comments off for a while, in the hopes it will make the spammers go elsewhere for a bit. I'll be redesigning the site over the summer, moving it from this antiquated (and pretty much abandoned) Moveable Type codebase to WordPress, and doing a number of other key upgrades.
Read the Dallas Business Journal’s DBJ Confidential blog post discussing Hunton & Williams partner Lisa J. Sotto’s thoughts on how companies should approach privacy issues in the United States. Sotto was interviewed while in Dallas giving a privacy law presentation for in-house counsel.
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
As reported in BNA’s Privacy Law Watch , on July 25, 2011, Russian President Dmitry Medvedev signed a new federal law amending Russia’s personal data privacy law, “On Personal Data.” The amended law, which was made public on July 27 and is effective retroactively from July 1, 2011, imposes new rules on international data transfers.
As we previously reported , the Mexican government has developed draft regulations for the implementation of Mexico’s Federal Law on the Protection of Personal Data in the Possession of Private Parties ( Ley Federal de Protección de Datos Personales en Posesión de los Particulares ). The U.S. Department of Commerce recently circulated an English translation of the draft regulations.
As reported in the Hunton Employment & Labor Perspectives Blog : The EEOC recently released an informal discussion letter suggesting that employers may be obligated to do more than just maintain a separate file for employee medical records, especially when those records are in an electronic format. Both the Americans with Disabilities Act of 1990 (“ADA”), as amended, and the Genetic Information Non-Discrimination Act of 2008 (“GINA”) require employers to maintain a confidential medical recor
As reported in BNA’s Privacy Law Watch , on July 19, 2011, President Obama announced his intention to nominate Maureen K. Ohlhausen to the Federal Trade Commission. Obama sent his official nomination to the Senate on July 21, 2011. If approved, Ohlhausen will serve a seven-year term beginning on September 26, 2011, replacing Commissioner William E. Kovacic.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
A putative class action complaint filed on June 22, 2011, in the United States District Court for the Northern District of California alleges that the popular cloud-based storage provider Dropbox, Inc. failed to secure users’ private data or to notify the vast majority of them about a data breach. According to the complaint, Dropbox announced in a blog post on its website that it had “introduced a bug” on June 19, 2011, which allowed users logged in to its system to log into other users’ accoun
The Hong Kong Privacy Commissioner has issued a document soliciting comments regarding a proposal to require a wide range of data users to submit information about their activities to the Office of the Privacy Commissioner for Personal Data. The proposal would be carried out pursuant to the Hong Kong Privacy Ordinance, which authorizes the Privacy Commissioner to require certain data users to submit data user returns.
On July 14, 2011, the U.S. House of Representatives Energy and Commerce Committee convened a joint hearing of the Subcommittee on Commerce, Manufacturing and Trade (chaired by Rep. Mary Bono Mack (R-CA)), and the Subcommittee on Communications and Technology (chaired by Rep. Greg Walden (R-OR)), to launch a comprehensive review of Internet privacy. The series of hearings began with testimony from officials representing three agencies with jurisdiction over consumer privacy issues: FTC Commissio
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content