This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler'
'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team
I was lucky enough to get the new 2013 high-end Macbook Pro Retina (15in) yesterday and started wondering about how it compares to the mid-2012 Retina (15in) model. On a personal level, I'm also pretty interested in how its gaming performance compares with its predecessor's.
For several decades I've enjoyed reading the comic strip, B.C. , about a bunch of cavemen. In one strip published long ago (I may be assigning quotes to the wrong characters, but you'll get the point), B.C. asks one of his compadres, "Thor, how far can you see?" Thor responds, "Well, I can see that cave over there, and it's about a mile away, so I guess I can see about a mile.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. What do you need to know, where to start? (Reprinted from KME Internet Marketing - Northern Virginia and Loudoun Datacenter CoLocation Retail Providers – please send your updated contact information to us if we don’t already have it, for more i
Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law.
'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge - but perseverance is well worth it to make work lives simpler'
'The post What Do Drones Mean for Humanity? appeared first on John Battelle's Search Blog. ( Image ) One of the “artifacts” that Sara and I are paying close attention to as we work on the book is “the drone.” Drones ply the liminal space between the physical and the digital – pilots fly them, but aren’t in them.
Will Postal Services Stand and Deliver? ravi.kumarv@cgi.com. Thu, 10/31/2013 - 08:50. The recent announcement from eBay and Argos regarding their joined up delivery service looks to address one of the most visible obstacles in B2C commerce; The Last Leg. Companies across Europe have invested millions in recent years developing integrated, multi-channel systems that make the purchasing of products a simple and instant task.
Here's something I imagine a lot of you (or programs written by you) do all the time: issue DB2 for z/OS-accessing SQL statements that contain character string literal values. Below is a query that I issued from Data Studio earlier today, targeting a table that I'd created on one of our test DB2 subsystems: SELECT PRODUCT_ID, UNIT_SALES FROM PRODUCT_SALES WHERE PRODUCT_ID = 'A12345'; Now, a question for you: is that character string literal value, 'A12345', fixed-length or varying-length?
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On October 25, 2013, the Standing Committee of the National People’s Congress of the People’s Republic of China passed an amendment to the P.R.C. Law on the Protection of Consumer Rights and Interests (the “Amendment”). The Amendment, which was adopted after three readings and will take effect on March 15, 2014, adds provisions designed to respond to the recent boom in online shopping and focuses on improving protections in the area of consumer rights and interests by: increasing penalties for v
The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.” Complete compliance with HIPAA guidelines requires implementation of basic a
'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.
'The post Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook? appeared first on John Battelle's Search Blog. Twitter’s S-1 filing is now public, you can read it here. There’s no dearth of coverage, just Google News it. I’m interested in a few metrics compared to its most likely comparables, namely Google and Facebook.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Information Architecture – “the battery in the toy”. ravi.kumarv@cgi.com. Tue, 10/29/2013 - 09:00. You know the scene. Xmas morning, a child’s delight as the shiny new toy emerges from the wrapping paper, the disappointment as the realisation dawns that it doesn’t work, followed by the recriminations as the parents argue about who was supposed to buy the batteries; whilst in the background the toys really are thrown out of the pram!
'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.
'The post Poll: What’s On the Google Barge? appeared first on John Battelle's Search Blog. ( image USA Today ) I’m fascinated by this “Google Barge” story. It reminds me of the Google container stories of years past, which first sparked all manner of speculation, but turned out to be pretty mundane – a portable, water cooled data center, as I recall.
'The post A World Lit, Literally, By Data appeared first on John Battelle's Search Blog. As you work on a book, even one as slow to develop as if/then , certain catch phrases develop. People ask you what the book is about, or the shape of its core argument, and some of the descriptions start to stand out and hit home. One of those is “a world lit by data,” an idea I’ve been toying with for some time now.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The post else 10.28: “Merging with the technology” appeared first on John Battelle's Search Blog. This week in our news round up: artists play with the possibilities of the 3-D printing medium, the lines between the digital world and the physical world of drones and dating blur, and Silicon Valley is getting more overtly political.
'The post else 10.7: A Dread Pirate Gives Up His Bitcoins appeared first on John Battelle's Search Blog. Anonymity on the web becomes increasingly fractious as Tor and Bitcoin come into question with recent headline-grabbing stories. A quick scan of this weekend’s NYTimes reveals three big articles on the novel ways our digital histories stay with us.
'The post else 10.21: Are Drones Over Burning Man “Evil”? appeared first on John Battelle's Search Blog. This week we pondered how Google defines norms, how we understand ourselves through technology, and how our present technical reality moves faster than speculative fiction. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
'The post else 10.14: “Drones don’t feel” – But the people who see them do. appeared first on John Battelle's Search Blog. Between OpenCo, the Quantified Self conference, and our visit to Google , it was a busy week for the book. From around the web: drones get the critical treatment, sensors develop new capabilities, the internet of things gets more connected, and our twitter streams start speaking for themselves.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Be Assured. ravi.kumarv@cgi.com. Fri, 10/25/2013 - 08:00. I’ll let you into a little secret: I don’t know everything about IT. And here’s another one: In most of the areas where I do know something, I’m still far from expert. The same goes for you I’m afraid. And indeed, for everyone else. So no wonder that IT assurance is becoming increasingly popular.
On October 22, 2013, the Federal Trade Commission announced a proposed settlement with Aaron’s, Inc. (“Aaron’s”) stemming from allegations that it knowingly assisted its franchisees in spying on consumers. Specifically, the FTC alleged that Aaron’s facilitated its franchisees’ installation and use of software on computers rented to consumers that surreptitiously tracked consumers’ locations, took photographs of consumers in their homes, and recorded consumers’ keystrokes in order to capture logi
On October 19, 2013, the Center for Internet and Society (“CIS”), the Federation of Indian Chambers of Commerce and Industry , and the Data Security Council of India held a Privacy Roundtable in New Delhi , the last in a series of roundtables that began in April 2013. The events were designed to elicit comments on a draft Privacy Protection Bill , proposed legislation for a privacy and personal data protection regime in India.
On October 21, 2013, the European Parliament approved its Compromise Text of the proposed EU General Data Protection Regulation (the “Proposed Regulation”). The approval follows months of negotiations between the various parliamentary committees. The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”) has been in charge of working toward an agreement on the Compromise Text in the European Parliament.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On October 12, 2013, California Governor Jerry Brown vetoed an electronic communications privacy bill. The bill, SB 467 , would have compelled law enforcement to obtain a search warrant before seeking to access any email or other electronic communication maintained by service providers. The bill went beyond the scope of the federal Electronic Communications Privacy Act, which obligates law enforcement to obtain search warrants only for electronic communications that are unopened or stored by ser
On October 7, 2013, the United States District Court for the Central District of California held that a general liability insurance policy covered data breach claims alleging violations of California patients’ right to medical privacy. Hartford Casualty Insurance Co. v. Corcino & Associates , CV 13-03728-GAF (C.D. Cal. Oct. 7, 2013). The court rejected the insurer’s argument that coverage was negated by an exclusion for liabilities resulting from a violation of rights created by state or fed
On October 16, 2013, the Federal Communications Commission’s revisions to its Telephone Consumer Protection Act rules go into effect. As we previously reported , the revisions require that businesses obtain “express written consent” prior to advertising or telemarketing through (1) autodialed calls or text messages, or prerecorded calls to consumers’ mobile numbers, and (2) prerecorded calls to consumers’ residential lines.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content