July, 2009

article thumbnail

New Socialtext Microblogging Appliance Signals Increased Flexibility

Collaboration 2.0

Socialtext are making available an ‘unbundled’ appliance version of their microblogging product ‘Signals‘ at an attractive $US1 per user per month, plus $1,000 per month server subscription. With the rapid increase in business use of Twitter, the hugely successful but internet based free microblogging platform, there has come an attendant focus on security concerns in [.

Security 183
article thumbnail

Questions On the Yahoo Bing Deal

John Battelle's Searchblog

Unfortunately our schedules didn't match up yesterday, and I did not get a chance to talk to the folks now responsible for the Yahoo Microsoft deal. But as I thought through the deal and its implications, a ton of questions came to mind, and it seems worth the time to write them down. Perhaps folks can answer them in this thread- I know there has been a lot of information flying around, and it's entirely likely that many of these questions have been posed and answered elsewhere.

Sales 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mad World

Daradiction

In 1997 I went to Guiena, West Africa for three months to help build some housing for some folks. What I saw there changed me forever. To this day I marvel being able to open a stocked fridge for example (we have it soo good here in America and safe to say most folks have no clue). I’m creating a possibility for a world in which everyone in my lifetime is given the opportunity to learn to read, draw, & have basic needs met.

IT 49
article thumbnail

Washington Court Rules that IP Addresses Are Not Personally Identifiable Information

Hunton Privacy

In a closely-watched case, the U.S. District Court for the Western District of Washington recently held that Internet Protocol (“IP”) addresses do not constitute personally identifiable information (“PII”). The plaintiffs in Johnson v. Microsoft Corp. brought a class action suit against Microsoft claiming that the collection of consumer IP addresses during the Windows XP installation process violated the XP End User License Agreement.

Privacy 42
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

RIM Underpins Society

Positively RIM

Last Thursday at Paddington Station, I had tea with Andrew Griffin, UK Director of the International Records Management Trust ( www.irmt.org ). Andrew had recently returned from Sierra Leone, the West African democracy only two years removed from a devastating civil war. Sierra Leone ranks dead last in the United Nations 2008 Human Development Index.

More Trending

article thumbnail

Facebook - Snatching Defeat From the Jaws of Victory?

Collaboration 2.0

What on earth are Facebook doing? Imagine going into a stationary store and buying a Filofax personal organizer and then over time filling it with personal contacts info, photos and notes. You come home one night and it’s no longer on the coffee table by the phone, instead there’s a note from Filofax saying there’s a change [.

IT 160
article thumbnail

Is Being In the Mobile Biz License to Ignore the Internet?

John Battelle's Searchblog

and by the Internet, I mean the *values* of the Internet, in particular, the values of a platform. When you build a platform that leverages the Internet, it strikes me you should act like a player in that space - IE, not acting like a monopolist, a bully, or in your own self interest at the expense of those who use your platform - like your customers and developers.

IT 49
article thumbnail

Story Crawler

Daradiction

My pal Denny Dansereau gave me beta access to his new “Story Crawler&# web app and I’m stoked, and for a few reasons. Selfishly, the tool rocks, it takes the friction out of finding the melody in a sea of stories, it’s a research/collaborators dream. Think Google Alerts on steroids with ability to push out and publish or syndicate.

article thumbnail

FTC Extends Red Flags Compliance Deadline to November 1

Hunton Privacy

On July 29, 2009, the Federal Trade Commission ("FTC") announced another three-month delay in the enforcement of the provision of Identity Theft Red Flags and Address Discrepancies Rule (the "Rule") that requires creditors and financial institutions to implement an Identity Theft Prevention Program. The FTC noted that small businesses and entities with a low risk of identity theft remain uncertain about their obligations under the Rule and pledged to "redouble" its effort

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Daily Value

Positively RIM

For those of us trying to whip a Records & Information Management program into shape every day, we may view records as objects, challenges, obstacles, risks, clutter, detriti or worse. It’s hard to stay objective about records’ real importance and value. But sooner or later, reality or exigency enters our lives, and we re-connect with the real value of the “stuff” we manage daily.

article thumbnail

Beware the little pieces you use in your web app

Scary Beasts Security

I've just released the technical details behind some recently fixed vulnerabilities in mimetex: [link] "mimetex" is a little binary (written in the C language) used to render mathematical equations based on the TeX language. It looks very nice and is a cool concept to embed it in web apps. You can use a Google search to locate places that use it: [link] Unfortunately, the binary suffered from various classic stack-based buffer overflows as well as some commands that might leak inappropriate info

IT 20
article thumbnail

Out-Innovated by Management Practice Blowback - a Video Conversation with John Hagel

Collaboration 2.0

I had the opportunity to sit down for a discussion with John Hagel of Deloitte’s Center for the Edge last week. My previous post about the ‘Shift Index 2009′ report is augmented by this video, and fellow ZDNet blogger Dennis Howlett attended the ‘‘Eastern Philosophy: Management Lessons From Emerging Markets’ Brainstorm Tech panel John and I [.

Marketing 113
article thumbnail

The Year's Half Over. So How Are My Predictions Tracking?

John Battelle's Searchblog

I like to do this exercise from time to time - asking how my predictions for the year are holding up given six months have passed since I posted them. Well, let's see, shall we? 1. We'll see an end to the recession, taken literally, by Q4 09. I think most folks agree this will happen. I'm not saying it has, just that the consensus is we're on the way there. 2.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Fast Eddy

Daradiction

Today is Fast Eddy’s 89th birthday. He passed away in 2007. He was my Grandpa, and it finally hit me today how much I miss him. He was a paratrooper in WWII (505th Parachute Infantry Regiment, 82nd Airborne Division) and jumped 9 times, including Battle of Bulge & North Africa. One thing that always made us laugh is how he’d describe himself as “tougher than cat shit and twice as nasty.&# Here’s some info about Fast Eddy from the Veterans History Project.

IT 49
article thumbnail

APEC Forum Discusses International Privacy Legislation Developments

Hunton Privacy

On July 28, 2009, the Data Privacy Subgroup meeting at the Asia-Pacific Economic Cooperation (APEC) Forum in Singapore reported a number of privacy-related legislative developments on the horizon. Among the highlights: On July 15, the Malaysian Cabinet approved privacy legislation to be enacted by the Parliament in early 2010 . Vietnam is set to enact consumer protection legislation including privacy provisions in 2010 .

Privacy 40
article thumbnail

Twitter Security Crunch

Collaboration 2.0

There’s an awful symmetry about the strategic plans of the Twitter team being published on TechCrunch today: using password discovery techniques ‘Hacker Croll’ was able to access Google and other accounts. I literally just saw on Twitter as I write this the ‘ethical line’ TechCrunch have invented for themselves questioned by Twitter founder @ev: @TechCrunch @arrington “we [.

Security 113
article thumbnail

Global Collaboration Competitive Success: Old Dogs, New Tricks & The Shift Index

Collaboration 2.0

The above CNBC video of John Hagel (Deloitte Center for the Edge) discusses the huge problem of applying old business thinking when adopting new technology, and the scary new realities around global business competitiveness. ‘Measuring the forces of long term change - the 2009 shift index‘, an important new report, addresses a major gap between the [.

113
113
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Enterprise 2.0 ROI Metrics: One Size Doesn't Fit All

Collaboration 2.0

‘The ROI of Online Customer Service communities‘ by Forrester customer experience and relationship management analyst Natalie Petouhoff is a $US 1,999 ‘Total Economic Impact™ Analysis’ (TEI) report. Mike Krigsman over at his ‘IT failures’ blog here on ZD Net seems impressed by the report’s findings, so I took a quick look at what is publicly available [.

article thumbnail

SAP's Schwarz & Sikka: The Road to More Agile Business Performance

Collaboration 2.0

Last week I had the opportunity to spend time with SAP CTO Vishal Sikka and separately SAP executive board member John Schwarz, and I’ve been ruminating on our conversations a lot since those meetings. Fortunately I was part of a group of bloggers who have been following SAP closely, and their questions and insight were [.

100
100
article thumbnail

The Movers & Shakers Conference.

Collaboration 2.0

I tend to think of Fortune Brainstorm Tech, which happened last week in Pasadena, as a conference for industry titans. Last year’s event was held amid tight security and featured the likes of Rupert Murdoch (News International) , Philippe Daulman (Viacom) and Jeff Bezos (Amazon) in a foggy northern California Half Moon Bay. This year, despite [.

Security 100
article thumbnail

IT Security: Context is King

Collaboration 2.0

One of the big blockers for enterprise collaboration uptake is ediscovery and compliance - and depending on the business entity the familiarity, processes and confidence in dealing with legal issues. This is a broad topic, but you can simplify it down into two broad camps: companies that are set up for regular subpoena around information [.

IT 100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Battling for the Mother Of All Monopolies.

Collaboration 2.0

Despite their motto ‘Don’t Be Evil‘, Google appear to be making a pretty good effort at attempting to own your online data and computing word, and all at a low, no up front cost to you. The latest Google product, an operating system, adds to the already formidable array of free offerings from the 31 [.

100
100
article thumbnail

TED Talks by Clay Shirky: How social media can make history

Daradiction

While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics. Tags: Cultural Anthropology Technology.

49
article thumbnail

Neon Indian – Deadbeat Summer

Daradiction

A new band out of Brooklyn. They’re Neon Indian, and as of right now there identity is a mystery. This tune is called “Deadbeat Summer&#. Click here to view the embedded video. Tags: Culture.

49
article thumbnail

Thinking About New Models for Search

John Battelle's Searchblog

Yesterday I spent an illuminating hour with the folks behind Wowd , a still-private-beta search upstart that is taking a new approach to, well, just about everything in search as we traditionally understand it. In a odd coincidence, this morning Venturebeat published a thoughtful piece on how search might shift when more data, in particular social data, is added to the mix.

Paper 45
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Twistory 101: It's All About Small Business

John Battelle's Searchblog

The world's abuzz this week with word that Twitter is getting serious about business - the proof point being Twitter's new subdomain " business.twitter.com " and the "Twitter 101" handbook currently living there, a white paper of sorts aimed at helping companies figure out how to leverage the sometimes befuddling service. This all reminds me of Fall 2004.

IT 45
article thumbnail

OMG! It's A New Yahoo Homepage

John Battelle's Searchblog

Yahoo has redesigned its homepage , on the same day it announced improved profits (thanks in large part to the painful cost cutting of the past few quarters). Quite directly, Yahoo says "This new launch represents the most significant change to our homepage since the company’s inception.". That's quite a statement. I've spent some time on the page, and I'm not sure it lives up to that billing.

IT 45
article thumbnail

Twitter Grows Again

John Battelle's Searchblog

The growth is back, impressive but slower than before, but it's probably quite a relief over at Twitter HQ to see no continuation of the trend from last month.

IT 45