This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Socialtext are making available an ‘unbundled’ appliance version of their microblogging product ‘Signals‘ at an attractive $US1 per user per month, plus $1,000 per month server subscription. With the rapid increase in business use of Twitter, the hugely successful but internet based free microblogging platform, there has come an attendant focus on security concerns in [.
Unfortunately our schedules didn't match up yesterday, and I did not get a chance to talk to the folks now responsible for the Yahoo Microsoft deal. But as I thought through the deal and its implications, a ton of questions came to mind, and it seems worth the time to write them down. Perhaps folks can answer them in this thread- I know there has been a lot of information flying around, and it's entirely likely that many of these questions have been posed and answered elsewhere.
In 1997 I went to Guiena, West Africa for three months to help build some housing for some folks. What I saw there changed me forever. To this day I marvel being able to open a stocked fridge for example (we have it soo good here in America and safe to say most folks have no clue). I’m creating a possibility for a world in which everyone in my lifetime is given the opportunity to learn to read, draw, & have basic needs met.
In a closely-watched case, the U.S. District Court for the Western District of Washington recently held that Internet Protocol (“IP”) addresses do not constitute personally identifiable information (“PII”). The plaintiffs in Johnson v. Microsoft Corp. brought a class action suit against Microsoft claiming that the collection of consumer IP addresses during the Windows XP installation process violated the XP End User License Agreement.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Last Thursday at Paddington Station, I had tea with Andrew Griffin, UK Director of the International Records Management Trust ( www.irmt.org ). Andrew had recently returned from Sierra Leone, the West African democracy only two years removed from a devastating civil war. Sierra Leone ranks dead last in the United Nations 2008 Human Development Index.
Catching up on a few items. I seem to have gotten a mention in a couple of recent Apple advisories: iPhone 3.0 security fixes Safari 4.0.2 It's one of the Safari bugs that interests me today, CVE-2009-1725 or an off-by-one heap memory corruption in Webkit. The patch says it all, really: [link] Here's the faulty code: checkBuffer(10); // ignore the sequence, add it to the buffer as plaintext *dest++ = '&'; for (unsigned i = 0; i < cBufferPos; i++) dest[i] = m_cBuffer[i]; Turns out, that 10 sho
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Catching up on a few items. I seem to have gotten a mention in a couple of recent Apple advisories: iPhone 3.0 security fixes Safari 4.0.2 It's one of the Safari bugs that interests me today, CVE-2009-1725 or an off-by-one heap memory corruption in Webkit. The patch says it all, really: [link] Here's the faulty code: checkBuffer(10); // ignore the sequence, add it to the buffer as plaintext *dest++ = '&'; for (unsigned i = 0; i < cBufferPos; i++) dest[i] = m_cBuffer[i]; Turns out, that 10 sho
What on earth are Facebook doing? Imagine going into a stationary store and buying a Filofax personal organizer and then over time filling it with personal contacts info, photos and notes. You come home one night and it’s no longer on the coffee table by the phone, instead there’s a note from Filofax saying there’s a change [.
and by the Internet, I mean the *values* of the Internet, in particular, the values of a platform. When you build a platform that leverages the Internet, it strikes me you should act like a player in that space - IE, not acting like a monopolist, a bully, or in your own self interest at the expense of those who use your platform - like your customers and developers.
My pal Denny Dansereau gave me beta access to his new “Story Crawler&# web app and I’m stoked, and for a few reasons. Selfishly, the tool rocks, it takes the friction out of finding the melody in a sea of stories, it’s a research/collaborators dream. Think Google Alerts on steroids with ability to push out and publish or syndicate.
On July 29, 2009, the Federal Trade Commission ("FTC") announced another three-month delay in the enforcement of the provision of Identity Theft Red Flags and Address Discrepancies Rule (the "Rule") that requires creditors and financial institutions to implement an Identity Theft Prevention Program. The FTC noted that small businesses and entities with a low risk of identity theft remain uncertain about their obligations under the Rule and pledged to "redouble" its effort
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
For those of us trying to whip a Records & Information Management program into shape every day, we may view records as objects, challenges, obstacles, risks, clutter, detriti or worse. It’s hard to stay objective about records’ real importance and value. But sooner or later, reality or exigency enters our lives, and we re-connect with the real value of the “stuff” we manage daily.
I've just released the technical details behind some recently fixed vulnerabilities in mimetex: [link] "mimetex" is a little binary (written in the C language) used to render mathematical equations based on the TeX language. It looks very nice and is a cool concept to embed it in web apps. You can use a Google search to locate places that use it: [link] Unfortunately, the binary suffered from various classic stack-based buffer overflows as well as some commands that might leak inappropriate info
I had the opportunity to sit down for a discussion with John Hagel of Deloitte’s Center for the Edge last week. My previous post about the ‘Shift Index 2009′ report is augmented by this video, and fellow ZDNet blogger Dennis Howlett attended the ‘‘Eastern Philosophy: Management Lessons From Emerging Markets’ Brainstorm Tech panel John and I [.
I like to do this exercise from time to time - asking how my predictions for the year are holding up given six months have passed since I posted them. Well, let's see, shall we? 1. We'll see an end to the recession, taken literally, by Q4 09. I think most folks agree this will happen. I'm not saying it has, just that the consensus is we're on the way there. 2.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Today is Fast Eddy’s 89th birthday. He passed away in 2007. He was my Grandpa, and it finally hit me today how much I miss him. He was a paratrooper in WWII (505th Parachute Infantry Regiment, 82nd Airborne Division) and jumped 9 times, including Battle of Bulge & North Africa. One thing that always made us laugh is how he’d describe himself as “tougher than cat shit and twice as nasty.&# Here’s some info about Fast Eddy from the Veterans History Project.
On July 28, 2009, the Data Privacy Subgroup meeting at the Asia-Pacific Economic Cooperation (APEC) Forum in Singapore reported a number of privacy-related legislative developments on the horizon. Among the highlights: On July 15, the Malaysian Cabinet approved privacy legislation to be enacted by the Parliament in early 2010 . Vietnam is set to enact consumer protection legislation including privacy provisions in 2010 .
There’s an awful symmetry about the strategic plans of the Twitter team being published on TechCrunch today: using password discovery techniques ‘Hacker Croll’ was able to access Google and other accounts. I literally just saw on Twitter as I write this the ‘ethical line’ TechCrunch have invented for themselves questioned by Twitter founder @ev: @TechCrunch @arrington “we [.
The above CNBC video of John Hagel (Deloitte Center for the Edge) discusses the huge problem of applying old business thinking when adopting new technology, and the scary new realities around global business competitiveness. ‘Measuring the forces of long term change - the 2009 shift index‘, an important new report, addresses a major gap between the [.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
‘The ROI of Online Customer Service communities‘ by Forrester customer experience and relationship management analyst Natalie Petouhoff is a $US 1,999 ‘Total Economic Impact™ Analysis’ (TEI) report. Mike Krigsman over at his ‘IT failures’ blog here on ZD Net seems impressed by the report’s findings, so I took a quick look at what is publicly available [.
Last week I had the opportunity to spend time with SAP CTO Vishal Sikka and separately SAP executive board member John Schwarz, and I’ve been ruminating on our conversations a lot since those meetings. Fortunately I was part of a group of bloggers who have been following SAP closely, and their questions and insight were [.
I tend to think of Fortune Brainstorm Tech, which happened last week in Pasadena, as a conference for industry titans. Last year’s event was held amid tight security and featured the likes of Rupert Murdoch (News International) , Philippe Daulman (Viacom) and Jeff Bezos (Amazon) in a foggy northern California Half Moon Bay. This year, despite [.
One of the big blockers for enterprise collaboration uptake is ediscovery and compliance - and depending on the business entity the familiarity, processes and confidence in dealing with legal issues. This is a broad topic, but you can simplify it down into two broad camps: companies that are set up for regular subpoena around information [.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Despite their motto ‘Don’t Be Evil‘, Google appear to be making a pretty good effort at attempting to own your online data and computing word, and all at a low, no up front cost to you. The latest Google product, an operating system, adds to the already formidable array of free offerings from the 31 [.
While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics. Tags: Cultural Anthropology Technology.
A new band out of Brooklyn. They’re Neon Indian, and as of right now there identity is a mystery. This tune is called “Deadbeat Summer&#. Click here to view the embedded video. Tags: Culture.
Yesterday I spent an illuminating hour with the folks behind Wowd , a still-private-beta search upstart that is taking a new approach to, well, just about everything in search as we traditionally understand it. In a odd coincidence, this morning Venturebeat published a thoughtful piece on how search might shift when more data, in particular social data, is added to the mix.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
The world's abuzz this week with word that Twitter is getting serious about business - the proof point being Twitter's new subdomain " business.twitter.com " and the "Twitter 101" handbook currently living there, a white paper of sorts aimed at helping companies figure out how to leverage the sometimes befuddling service. This all reminds me of Fall 2004.
Yahoo has redesigned its homepage , on the same day it announced improved profits (thanks in large part to the painful cost cutting of the past few quarters). Quite directly, Yahoo says "This new launch represents the most significant change to our homepage since the company’s inception.". That's quite a statement. I've spent some time on the page, and I'm not sure it lives up to that billing.
The growth is back, impressive but slower than before, but it's probably quite a relief over at Twitter HQ to see no continuation of the trend from last month.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content