October, 2013

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler'

IT 222
article thumbnail

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High-end macbook pro retina (late 2013, 15in) benchmark

Elie

I was lucky enough to get the new 2013 high-end Macbook Pro Retina (15in) yesterday and started wondering about how it compares to the mid-2012 Retina (15in) model. On a personal level, I'm also pretty interested in how its gaming performance compares with its predecessor's.

IT 48
article thumbnail

DB2 for z/OS: How Big is Big?

Robert's Db2

For several decades I've enjoyed reading the comic strip, B.C. , about a bunch of cavemen. In one strip published long ago (I may be assigning quotes to the wrong characters, but you'll get the point), B.C. asks one of his compadres, "Thor, how far can you see?" Thor responds, "Well, I can see that cave over there, and it's about a mile away, so I guess I can see about a mile.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. What do you need to know, where to start? (Reprinted from KME Internet Marketing - Northern Virginia and Loudoun Datacenter CoLocation Retail Providers – please send your updated contact information to us if we don’t already have it, for more i

IT 45

More Trending

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge - but perseverance is well worth it to make work lives simpler'

IT 222
article thumbnail

What Do Drones Mean for Humanity?

John Battelle's Searchblog

'The post What Do Drones Mean for Humanity? appeared first on John Battelle's Search Blog. ( Image ) One of the “artifacts” that Sara and I are paying close attention to as we work on the book is “the drone.” Drones ply the liminal space between the physical and the digital – pilots fly them, but aren’t in them.

IT 109
article thumbnail

Will Postal Services Stand and Deliver?

CGI

Will Postal Services Stand and Deliver? ravi.kumarv@cgi.com. Thu, 10/31/2013 - 08:50. The recent announcement from eBay and Argos regarding their joined up delivery service looks to address one of the most visible obstacles in B2C commerce; The Last Leg. Companies across Europe have invested millions in recent years developing integrated, multi-channel systems that make the purchasing of products a simple and instant task.

B2C 40
article thumbnail

DB2 for z/OS: Something You Might Not Know About Character String Literal Values

Robert's Db2

Here's something I imagine a lot of you (or programs written by you) do all the time: issue DB2 for z/OS-accessing SQL statements that contain character string literal values. Below is a query that I issued from Data Studio earlier today, targeting a table that I'd created on one of our test DB2 subsystems: SELECT PRODUCT_ID, UNIT_SALES FROM PRODUCT_SALES WHERE PRODUCT_ID = 'A12345'; Now, a question for you: is that character string literal value, 'A12345', fixed-length or varying-length?

IT 48
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

China Passes Amendment to Consumer Protection Law

Hunton Privacy

On October 25, 2013, the Standing Committee of the National People’s Congress of the People’s Republic of China passed an amendment to the P.R.C. Law on the Protection of Consumer Rights and Interests (the “Amendment”). The Amendment, which was adopted after three readings and will take effect on March 15, 2014, adds provisions designed to respond to the recent boom in online shopping and focuses on improving protections in the area of consumer rights and interests by: increasing penalties for v

Privacy 40
article thumbnail

Gmail, Google Apps for Business HIPAA Business Associate Agreements

HIPAA

The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.” Complete compliance with HIPAA guidelines requires implementation of basic a

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 100
article thumbnail

Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook?

John Battelle's Searchblog

'The post Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook? appeared first on John Battelle's Search Blog. Twitter’s S-1 filing is now public, you can read it here. There’s no dearth of coverage, just Google News it. I’m interested in a few metrics compared to its most likely comparables, namely Google and Facebook.

Marketing 109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Information Architecture – “the battery in the toy”

CGI

Information Architecture – “the battery in the toy”. ravi.kumarv@cgi.com. Tue, 10/29/2013 - 09:00. You know the scene. Xmas morning, a child’s delight as the shiny new toy emerges from the wrapping paper, the disappointment as the realisation dawns that it doesn’t work, followed by the recriminations as the parents argue about who was supposed to buy the batteries; whilst in the background the toys really are thrown out of the pram!

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 100
article thumbnail

Poll: What’s On the Google Barge?

John Battelle's Searchblog

'The post Poll: What’s On the Google Barge? appeared first on John Battelle's Search Blog. ( image USA Today ) I’m fascinated by this “Google Barge” story. It reminds me of the Google container stories of years past, which first sparked all manner of speculation, but turned out to be pretty mundane – a portable, water cooled data center, as I recall.

IT 99
article thumbnail

A World Lit, Literally, By Data

John Battelle's Searchblog

'The post A World Lit, Literally, By Data appeared first on John Battelle's Search Blog. As you work on a book, even one as slow to develop as if/then , certain catch phrases develop. People ask you what the book is about, or the shape of its core argument, and some of the descriptions start to stand out and hit home. One of those is “a world lit by data,” an idea I’ve been toying with for some time now.

Retail 92
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

else 10.28: “Merging with the technology”

John Battelle's Searchblog

'The post else 10.28: “Merging with the technology” appeared first on John Battelle's Search Blog. This week in our news round up: artists play with the possibilities of the 3-D printing medium, the lines between the digital world and the physical world of drones and dating blur, and Silicon Valley is getting more overtly political.

Retail 86
article thumbnail

else 10.7: A Dread Pirate Gives Up His Bitcoins

John Battelle's Searchblog

'The post else 10.7: A Dread Pirate Gives Up His Bitcoins appeared first on John Battelle's Search Blog. Anonymity on the web becomes increasingly fractious as Tor and Bitcoin come into question with recent headline-grabbing stories. A quick scan of this weekend’s NYTimes reveals three big articles on the novel ways our digital histories stay with us.

article thumbnail

else 10.21: Are Drones Over Burning Man “Evil”?

John Battelle's Searchblog

'The post else 10.21: Are Drones Over Burning Man “Evil”? appeared first on John Battelle's Search Blog. This week we pondered how Google defines norms, how we understand ourselves through technology, and how our present technical reality moves faster than speculative fiction. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 85
article thumbnail

else 10.14: “Drones don’t feel” – But the people who see them do.

John Battelle's Searchblog

'The post else 10.14: “Drones don’t feel” – But the people who see them do. appeared first on John Battelle's Search Blog. Between OpenCo, the Quantified Self conference, and our visit to Google , it was a busy week for the book. From around the web: drones get the critical treatment, sensors develop new capabilities, the internet of things gets more connected, and our twitter streams start speaking for themselves.

IT 73
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Be Assured

CGI

Be Assured. ravi.kumarv@cgi.com. Fri, 10/25/2013 - 08:00. I’ll let you into a little secret: I don’t know everything about IT. And here’s another one: In most of the areas where I do know something, I’m still far from expert. The same goes for you I’m afraid. And indeed, for everyone else. So no wonder that IT assurance is becoming increasingly popular.

article thumbnail

FTC Settles Spying Case Against Rent-to-Own Retailer

Hunton Privacy

On October 22, 2013, the Federal Trade Commission announced a proposed settlement with Aaron’s, Inc. (“Aaron’s”) stemming from allegations that it knowingly assisted its franchisees in spying on consumers. Specifically, the FTC alleged that Aaron’s facilitated its franchisees’ installation and use of software on computers rented to consumers that surreptitiously tracked consumers’ locations, took photographs of consumers in their homes, and recorded consumers’ keystrokes in order to capture logi

Retail 40
article thumbnail

Indian Privacy Law in the Works

Hunton Privacy

On October 19, 2013, the Center for Internet and Society (“CIS”), the Federation of Indian Chambers of Commerce and Industry , and the Data Security Council of India held a Privacy Roundtable in New Delhi , the last in a series of roundtables that began in April 2013. The events were designed to elicit comments on a draft Privacy Protection Bill , proposed legislation for a privacy and personal data protection regime in India.

Privacy 40
article thumbnail

European Parliament Approves Compromise Text on Regulation

Hunton Privacy

On October 21, 2013, the European Parliament approved its Compromise Text of the proposed EU General Data Protection Regulation (the “Proposed Regulation”). The approval follows months of negotiations between the various parliamentary committees. The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”) has been in charge of working toward an agreement on the Compromise Text in the European Parliament.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

California Governor Vetoes Electronic Communications Privacy Bill

Hunton Privacy

On October 12, 2013, California Governor Jerry Brown vetoed an electronic communications privacy bill. The bill, SB 467 , would have compelled law enforcement to obtain a search warrant before seeking to access any email or other electronic communication maintained by service providers. The bill went beyond the scope of the federal Electronic Communications Privacy Act, which obligates law enforcement to obtain search warrants only for electronic communications that are unopened or stored by ser

article thumbnail

Insurance Policy’s Statutory Rights Exclusion Does Not Apply to Data Breach Claims

Hunton Privacy

On October 7, 2013, the United States District Court for the Central District of California held that a general liability insurance policy covered data breach claims alleging violations of California patients’ right to medical privacy. Hartford Casualty Insurance Co. v. Corcino & Associates , CV 13-03728-GAF (C.D. Cal. Oct. 7, 2013). The court rejected the insurer’s argument that coverage was negated by an exclusion for liabilities resulting from a violation of rights created by state or fed

article thumbnail

Revised FCC Telephone and Text Marketing Rules Become Effective October 16, 2013

Hunton Privacy

On October 16, 2013, the Federal Communications Commission’s revisions to its Telephone Consumer Protection Act rules go into effect. As we previously reported , the revisions require that businesses obtain “express written consent” prior to advertising or telemarketing through (1) autodialed calls or text messages, or prerecorded calls to consumers’ mobile numbers, and (2) prerecorded calls to consumers’ residential lines.