October, 2013

article thumbnail

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler'

IT 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High-end macbook pro retina (late 2013, 15in) benchmark

Elie

I was lucky enough to get the new 2013 high-end Macbook Pro Retina (15in) yesterday and started wondering about how it compares to the mid-2012 Retina (15in) model. On a personal level, I'm also pretty interested in how its gaming performance compares with its predecessor's.

IT 48
article thumbnail

DB2 for z/OS: How Big is Big?

Robert's Db2

For several decades I've enjoyed reading the comic strip, B.C. , about a bunch of cavemen. In one strip published long ago (I may be assigning quotes to the wrong characters, but you'll get the point), B.C. asks one of his compadres, "Thor, how far can you see?" Thor responds, "Well, I can see that cave over there, and it's about a mile away, so I guess I can see about a mile.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. What do you need to know, where to start? (Reprinted from KME Internet Marketing - Northern Virginia and Loudoun Datacenter CoLocation Retail Providers – please send your updated contact information to us if we don’t already have it, for more i

IT 45

More Trending

article thumbnail

What Do Drones Mean for Humanity?

John Battelle's Searchblog

'The post What Do Drones Mean for Humanity? appeared first on John Battelle's Search Blog. ( Image ) One of the “artifacts” that Sara and I are paying close attention to as we work on the book is “the drone.” Drones ply the liminal space between the physical and the digital – pilots fly them, but aren’t in them.

IT 109
article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge - but perseverance is well worth it to make work lives simpler'

IT 89
article thumbnail

Will Postal Services Stand and Deliver?

CGI

Will Postal Services Stand and Deliver? ravi.kumarv@cgi.com. Thu, 10/31/2013 - 08:50. The recent announcement from eBay and Argos regarding their joined up delivery service looks to address one of the most visible obstacles in B2C commerce; The Last Leg. Companies across Europe have invested millions in recent years developing integrated, multi-channel systems that make the purchasing of products a simple and instant task.

B2C 40
article thumbnail

DB2 for z/OS: Something You Might Not Know About Character String Literal Values

Robert's Db2

Here's something I imagine a lot of you (or programs written by you) do all the time: issue DB2 for z/OS-accessing SQL statements that contain character string literal values. Below is a query that I issued from Data Studio earlier today, targeting a table that I'd created on one of our test DB2 subsystems: SELECT PRODUCT_ID, UNIT_SALES FROM PRODUCT_SALES WHERE PRODUCT_ID = 'A12345'; Now, a question for you: is that character string literal value, 'A12345', fixed-length or varying-length?

IT 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China Passes Amendment to Consumer Protection Law

Hunton Privacy

On October 25, 2013, the Standing Committee of the National People’s Congress of the People’s Republic of China passed an amendment to the P.R.C. Law on the Protection of Consumer Rights and Interests (the “Amendment”). The Amendment, which was adopted after three readings and will take effect on March 15, 2014, adds provisions designed to respond to the recent boom in online shopping and focuses on improving protections in the area of consumer rights and interests by: increasing penalties for v

Privacy 40
article thumbnail

Gmail, Google Apps for Business HIPAA Business Associate Agreements

HIPAA

The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.” Complete compliance with HIPAA guidelines requires implementation of basic a

article thumbnail

Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook?

John Battelle's Searchblog

'The post Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook? appeared first on John Battelle's Search Blog. Twitter’s S-1 filing is now public, you can read it here. There’s no dearth of coverage, just Google News it. I’m interested in a few metrics compared to its most likely comparables, namely Google and Facebook.

Marketing 109
article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Information Architecture – “the battery in the toy”

CGI

Information Architecture – “the battery in the toy”. ravi.kumarv@cgi.com. Tue, 10/29/2013 - 09:00. You know the scene. Xmas morning, a child’s delight as the shiny new toy emerges from the wrapping paper, the disappointment as the realisation dawns that it doesn’t work, followed by the recriminations as the parents argue about who was supposed to buy the batteries; whilst in the background the toys really are thrown out of the pram!

article thumbnail

Poll: What’s On the Google Barge?

John Battelle's Searchblog

'The post Poll: What’s On the Google Barge? appeared first on John Battelle's Search Blog. ( image USA Today ) I’m fascinated by this “Google Barge” story. It reminds me of the Google container stories of years past, which first sparked all manner of speculation, but turned out to be pretty mundane – a portable, water cooled data center, as I recall.

IT 99
article thumbnail

A World Lit, Literally, By Data

John Battelle's Searchblog

'The post A World Lit, Literally, By Data appeared first on John Battelle's Search Blog. As you work on a book, even one as slow to develop as if/then , certain catch phrases develop. People ask you what the book is about, or the shape of its core argument, and some of the descriptions start to stand out and hit home. One of those is “a world lit by data,” an idea I’ve been toying with for some time now.

Retail 92
article thumbnail

else 10.28: “Merging with the technology”

John Battelle's Searchblog

'The post else 10.28: “Merging with the technology” appeared first on John Battelle's Search Blog. This week in our news round up: artists play with the possibilities of the 3-D printing medium, the lines between the digital world and the physical world of drones and dating blur, and Silicon Valley is getting more overtly political.

Retail 86
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

else 10.7: A Dread Pirate Gives Up His Bitcoins

John Battelle's Searchblog

'The post else 10.7: A Dread Pirate Gives Up His Bitcoins appeared first on John Battelle's Search Blog. Anonymity on the web becomes increasingly fractious as Tor and Bitcoin come into question with recent headline-grabbing stories. A quick scan of this weekend’s NYTimes reveals three big articles on the novel ways our digital histories stay with us.

article thumbnail

else 10.21: Are Drones Over Burning Man “Evil”?

John Battelle's Searchblog

'The post else 10.21: Are Drones Over Burning Man “Evil”? appeared first on John Battelle's Search Blog. This week we pondered how Google defines norms, how we understand ourselves through technology, and how our present technical reality moves faster than speculative fiction. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 85
article thumbnail

else 10.14: “Drones don’t feel” – But the people who see them do.

John Battelle's Searchblog

'The post else 10.14: “Drones don’t feel” – But the people who see them do. appeared first on John Battelle's Search Blog. Between OpenCo, the Quantified Self conference, and our visit to Google , it was a busy week for the book. From around the web: drones get the critical treatment, sensors develop new capabilities, the internet of things gets more connected, and our twitter streams start speaking for themselves.

IT 73
article thumbnail

Be Assured

CGI

Be Assured. ravi.kumarv@cgi.com. Fri, 10/25/2013 - 08:00. I’ll let you into a little secret: I don’t know everything about IT. And here’s another one: In most of the areas where I do know something, I’m still far from expert. The same goes for you I’m afraid. And indeed, for everyone else. So no wonder that IT assurance is becoming increasingly popular.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

FTC Settles Spying Case Against Rent-to-Own Retailer

Hunton Privacy

On October 22, 2013, the Federal Trade Commission announced a proposed settlement with Aaron’s, Inc. (“Aaron’s”) stemming from allegations that it knowingly assisted its franchisees in spying on consumers. Specifically, the FTC alleged that Aaron’s facilitated its franchisees’ installation and use of software on computers rented to consumers that surreptitiously tracked consumers’ locations, took photographs of consumers in their homes, and recorded consumers’ keystrokes in order to capture logi

Retail 40
article thumbnail

NIST Issues Preliminary Cybersecurity Framework

Hunton Privacy

On October 22, 2013, the National Institute of Standards and Technology (“NIST”) issued the Preliminary Cybersecurity Framework (the “Preliminary Framework”), as required under Section 7 of the Obama Administration’s February 2013 executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”). The Preliminary Framework includes standards, procedures and processes for reducing cyber risks to critical infrastructure.

article thumbnail

European Parliament Approves Compromise Text on Regulation

Hunton Privacy

On October 21, 2013, the European Parliament approved its Compromise Text of the proposed EU General Data Protection Regulation (the “Proposed Regulation”). The approval follows months of negotiations between the various parliamentary committees. The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”) has been in charge of working toward an agreement on the Compromise Text in the European Parliament.

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

California Governor Vetoes Electronic Communications Privacy Bill

Hunton Privacy

On October 12, 2013, California Governor Jerry Brown vetoed an electronic communications privacy bill. The bill, SB 467 , would have compelled law enforcement to obtain a search warrant before seeking to access any email or other electronic communication maintained by service providers. The bill went beyond the scope of the federal Electronic Communications Privacy Act, which obligates law enforcement to obtain search warrants only for electronic communications that are unopened or stored by ser

article thumbnail

Insurance Policy’s Statutory Rights Exclusion Does Not Apply to Data Breach Claims

Hunton Privacy

On October 7, 2013, the United States District Court for the Central District of California held that a general liability insurance policy covered data breach claims alleging violations of California patients’ right to medical privacy. Hartford Casualty Insurance Co. v. Corcino & Associates , CV 13-03728-GAF (C.D. Cal. Oct. 7, 2013). The court rejected the insurer’s argument that coverage was negated by an exclusion for liabilities resulting from a violation of rights created by state or fed

article thumbnail

Revised FCC Telephone and Text Marketing Rules Become Effective October 16, 2013

Hunton Privacy

On October 16, 2013, the Federal Communications Commission’s revisions to its Telephone Consumer Protection Act rules go into effect. As we previously reported , the revisions require that businesses obtain “express written consent” prior to advertising or telemarketing through (1) autodialed calls or text messages, or prerecorded calls to consumers’ mobile numbers, and (2) prerecorded calls to consumers’ residential lines.