November, 2009

article thumbnail

'The Purpose of a Business is to Create a Customer' - Peter Drucker Centenary

Collaboration 2.0

This month marks the centenary of Management guru Peter Drucker’s birth, and the Harvard Business Review - the Vogue magazine of management fashions - has a terrific section devoted to his legacy and ideas this month. (The paper version is a keeper). Drucker’s tremendous body of work has been distilled into the usual bumper sticker phrases [.

Paper 78
article thumbnail

Just Give Me One Modal Dialog.

John Battelle's Searchblog

Back when I was reporting the book, I remember a meeting I had with Gary Flake , then the lead technologist at Overture, now a Fellow at Microsoft running Live Labs, responsible for stuff like Seadragon, Photosynth, and now, Pivot, an experimental approach to large datasets that attempts to rethink some fundamental approaches to what we understand search to be today.

IT 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Darrell Smith – Pedal Steel Vibe

Daradiction

Darrell Smith is one of my favorite people on the planet, plus he’s playing one of my all time favorite tones (something he says he made for me, but I hardly believe him). What I love about Darrell is he brings out the best version of me. Truly a hero of mine, and so I’m honored to call him a friend. So take a listen and dive in to some deep tone and check out what the M13 box can do.

Mining 54
article thumbnail

Federation of German Consumer Organisations Successful against Social Networks – Providers Intend to Discontinue Use of Certain Data Protection Provisions

Hunton Privacy

On November 12, 2009, the Federation of German Consumer Organisations (Verbraucherzentrale Bundesverband e.V., “vzbv”), a non-governmental organization acting as an umbrella for 41 German consumer associations announced that the social networks Xing, MySpace, Facebook, Lokalisten, Wer-kennt-Wen and StudiVZ signed undertakings that they would discontinue use of certain terms and conditions and data protection provisions.

Paper 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Esoteric No More

Positively RIM

My whirlwind visit to the Greater Anchorage Chapter of ARMA last week opened my eyes to the widespread thirst and need for understanding our discipline, Records and Information Management. As the Chapter convened under the able leadership of President Toby Allen, I saw that the attending practitioners sense that thirst in their organizations, and they came for tools to quench it.

More Trending

article thumbnail

Dark Internet Fundamentals

Collaboration 2.0

We all think we know the internet - the service that has magically transmitted these words from my keyboard to your eyeballs - but how much do you know of the fundamentals? As I wrote about last year, the plumbing of the internet is surprisingly basic. “ although we tend to think of it as a “network of [.

IT 66
article thumbnail

I Have A Kindle Now. But I Won't Read A Book On It. Discuss.

John Battelle's Searchblog

I had a birthday a few weeks ago and to mark the occasion, my wife bought me a Kindle. OK, yes, I'm a pretty digital guy, and despite writing my 1992 Berkeley Master's thesis on "The Future of Print in the Age of Interactivity" - a thesis that celebrated the rise of a digital tablet fed by a world wide network - I didn't run out and buy a Kindle as soon as they came on the market.

IT 67
article thumbnail

Charity Water – Scott Harrison’s Story

Daradiction

If you don’t yet know about Charity Water, it’s an amazing story. In just three years it’s blossomed to an international movement to provide clean water to folks that need it. This year they raised $12M so far is the word on the street. Truly and inspiring story from Charity Water founder Scott Harrison, also video below: ——————-.

Access 49
article thumbnail

Changes to e-Privacy Directive Approved by European Parliament

Hunton Privacy

On November 24, 2009, the European Parliament formally approved the European Union’s telecoms reform package. This reform proposed by the European Commission in November 2007 consists of various different EU Directives that set-up the legal framework applicable to the electronic communications sector (telecoms) and includes a new e-Privacy Directive.

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Is Google the Center of the Universe?

Collaboration 2.0

It’s not even a year since the triumphalism of Jeff Jarvis’s Google ‘reverse engineering’ book ‘What Would Google Do?’ hit the book shelves, but it seems an age ago now. Jarvis’s publisher Harper Collins claims this book is ‘all about you‘ in their promo blurb - how you can apply Google thinking to your business [.

IT 53
article thumbnail

The Enterprise 2.0 Value Propositions Agenda

Collaboration 2.0

Time is Money: Where’s the Beef? The now biannual US ‘Enterprise 2.0‘ conference is a wrap, but disappointingly there is still little business understanding of what the term means or what the value propositions and benefits are. The general 2.0 suffix is well understood by technology enthusiasts but in the world of the enterprise - [.

53
article thumbnail

Thanks For Flying With Us. Please Give Us All Your Money.

John Battelle's Searchblog

Today I had quite an experience with United Airlines. It has very little to do with much of anything I usually write about here, save one key element: I have posited that to succeed in what I've been calling the Conversation Economy , companies must learn to have conversations with their customers at scale. Well, here's a tale of one company failing miserably at doing just that, even while, in the end, due to my own insistence (and most likely, the rising level of anger in my voice), it kind of,

IT 53
article thumbnail

Why Did Google Buy AdMob?

John Battelle's Searchblog

Look. Sure, it's a mobile ad platform, and sure, Google wants to play there, more than they already are. OK. Fine. But really. What's the play? Droid. Data. Droid. Iphone App Data. Droid. K? Data. Just to be clear. Data. About what works, on iPhone apps, so they can leverage it.for Droid. K.

IT 49
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Making Money with Twitter

Collaboration 2.0

Twitter Japan (Digital Garage), which is already advertising supported, are experimenting with a pay per tweet model. Media.asia are reporting According to local reports, the plan will allow audiences to view some text on all tweets but will charge a fee to unlock access to certain images, external URLs and text. Users willing to pay to view [.

Access 45
article thumbnail

AOL/Facebook in the Enterprise

Collaboration 2.0

In 1994 America Online trailed Compuserve and Prodigy, a third subscription option in how you hooked your modem up to the internet to go cyber surfing. What propelled AOL to global dominance by the end of that decade was their proprietary ‘rainman’ platform, which enabled partners to build out their anchor stores in the massive [.

45
article thumbnail

Understanding Enterprise 2.0 Tolerances & Scale

Collaboration 2.0

We’re at an interesting intersection in the collaboration world where projects both large and small tend to be discussed with the same terms. This can be very confusing to the lay person since it’s hard to know what sort of scale is being described. Small and medium business needs are typically very different to ‘enterprise’, which [.

IT 45
article thumbnail

Arguing About the Collaboration Toolkit: Cisco's Enterprise Collaboration Platform

Collaboration 2.0

In the aftermath of last week’s San Francisco Enterprise 2.0 conference there’s been some lively debate about what constitutes ‘2.0′, including some great comments on my previous post. Meanwhile Cisco have literally just announced their Enterprise Collaboration Platform, which will be broad set of new tools for instant messaging, e-mail, social networking, videoconferencing, document and video [.

45
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

"WuzUp?"

John Battelle's Searchblog

From Biz' post on Twitter's shift : Twitter helps you share and discover what's happening now among all the things, people, and events you care about. "What are you doing?" isn't the right question anymore—starting today, we've shortened it by two characters. Twitter now asks, "What's happening?". Well, regardless of spin, this is a major shift, to my mind.

Mining 45
article thumbnail

I Love It When.

John Battelle's Searchblog

You imagine something out loud in a book, and then it starts to happen. I am sure many of you have heard of RedLaser, but I hadn't until today. I love it! Here's the text from my blog post , written in 2004 (pre iPhone, so I used a Treo.) which I rewrote into the book: What to do? Not to worry, you’ve got Google Mobile Shop installed on your phone. You whip out your Treo 950, the one with the infrared UPC reader installed, and you wand it over that bottle of 2001 Clos Du Val now lovingly cradled

IT 45
article thumbnail

Hey Mr. Murdoch: It Doesn't Have to Be Black and White

John Battelle's Searchblog

Sheesh. Just give Google summary text and headlines to index (like the WSJ does now). Then do your best to convert would be readers to your paid model. That's it. What's the big deal? The rest is bluster.

IT 45
article thumbnail

Twitter Incorporates Retweeting (Beta Launch)

John Battelle's Searchblog

Saw this greeting me whilst on Twitter.com today (gotta love WiFi on a plane): Nice to see Twitter rolling out so many new things, like Lists, which seems to be taking off (though I find the lack of a discovery interface vexing, for now). Retweeting is integrated in an elegant way, tweets that have been retweeted have a little cycled arrow icon, which identifies tweets that folks you've followed have retweeted.

IT 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Twitter Lists

John Battelle's Searchblog

There's much to say about Twitter's slow to roll out but much discussed Lists feature. I'm a fan of it, in short, for many reasons. Lists is a pretty simple idea - it lets anyone make and share a list of folks on Twitter. But it's also a powerful new signal that will help Twitter solve two of its most vexing problems - first, that of discovery, and second, that of authority.

IT 45
article thumbnail

Flipping Fantastic

Collaboration 2.0

Getting the most out of Flip video cameras The picture above (a still from a Flip video) is of my venerable old three chip Sony VX1000 video camera, Frezzi light and associated 10 pound battery belt. In the foreground is a Flip video camera. If you aren’t aware of Flip cameras yet they are essentially high quality [.

40
article thumbnail

European Commission Pursues Infringement Proceedings Against UK

Hunton Privacy

On October 29, 2009, the European Commission (the “Commission”) proceeded to the second phase of infringement proceedings against the UK relating to the UK’s implementation of EU e-privacy and personal data protection laws. EU Member States must ensure the confidentiality of communications by prohibiting interception and surveillance without user’s consent.

article thumbnail

French Senate Issues New Legislation to Amend Data Protection Act: Provisions Include Breach Notice Obligation and Consent for Use of Cookies

Hunton Privacy

On November 6, 2009, the French Senate proposed a new draft law to reinforce the right to privacy in the digital age (“Proposition de loi visant à garantir le droit à la vie privée à l’heure du numérique”) (the “Draft Law”). Following a Report on the same topic issued last spring, the Senate made concrete proposals with this Draft Law to amend the Data Protection Act.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Agencies Issue Final Gramm-Leach-Bliley Act Model Privacy Notice

Hunton Privacy

Today, eight federal financial regulatory agencies issued a final Gramm-Leach-Bliley Act (“GLBA”) model privacy notice. The final model notice incorporates financial institutions’ required disclosures pursuant to Section 503 of the GLBA. The GLBA requires, in relevant part, that financial institutions provide consumers with information regarding their collection and sharing of nonpublic personal information.

Privacy 40
article thumbnail

Observations on Standards Document Adopted by 31st International Conference of Data Protection and Privacy Commissioners

Hunton Privacy

In a closed session on November 5, 2009, the 31st International Conference of Data Protection and Privacy Commissioners adopted the International Standards on the Protection of Personal Data and Privacy (the “Standards”). Although the document is advisory in nature and is not legally binding, it offers guidance to States that have not yet adopted comprehensive data protection laws.

Privacy 40
article thumbnail

Connecticut Attorney General Investigation Sheds Light on Meaning of “Unreasonable Delay” in Data Breach Context

Hunton Privacy

On November 9, 2009, Connecticut’s Attorney General, Richard Blumenthal, announced an investigation of whether Blue Cross and Blue Shield (“BCBS”) violated Connecticut’s data breach notification law by waiting until two months after a data breach had occurred to notify affected Connecticut residents. The data breach, which Attorney General Blumenthal called “one of the most sizable and significant in Connecticut’s history,” involved the theft of a laptop containing confidential unencrypted data