July, 2009

article thumbnail

New Socialtext Microblogging Appliance Signals Increased Flexibility

Collaboration 2.0

Socialtext are making available an ‘unbundled’ appliance version of their microblogging product ‘Signals‘ at an attractive $US1 per user per month, plus $1,000 per month server subscription. With the rapid increase in business use of Twitter, the hugely successful but internet based free microblogging platform, there has come an attendant focus on security concerns in [.

article thumbnail

Questions On the Yahoo Bing Deal

John Battelle's Searchblog

Unfortunately our schedules didn't match up yesterday, and I did not get a chance to talk to the folks now responsible for the Yahoo Microsoft deal. But as I thought through the deal and its implications, a ton of questions came to mind, and it seems worth the time to write them down. Perhaps folks can answer them in this thread- I know there has been a lot of information flying around, and it's entirely likely that many of these questions have been posed and answered elsewhere.

Sales 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mad World

Daradiction

In 1997 I went to Guiena, West Africa for three months to help build some housing for some folks. What I saw there changed me forever. To this day I marvel being able to open a stocked fridge for example (we have it soo good here in America and safe to say most folks have no clue). I’m creating a possibility for a world in which everyone in my lifetime is given the opportunity to learn to read, draw, & have basic needs met.

IT 49
article thumbnail

Washington Court Rules that IP Addresses Are Not Personally Identifiable Information

Hunton Privacy

In a closely-watched case, the U.S. District Court for the Western District of Washington recently held that Internet Protocol (“IP”) addresses do not constitute personally identifiable information (“PII”). The plaintiffs in Johnson v. Microsoft Corp. brought a class action suit against Microsoft claiming that the collection of consumer IP addresses during the Windows XP installation process violated the XP End User License Agreement.

Privacy 42
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

RIM Underpins Society

Positively RIM

Last Thursday at Paddington Station, I had tea with Andrew Griffin, UK Director of the International Records Management Trust ( www.irmt.org ). Andrew had recently returned from Sierra Leone, the West African democracy only two years removed from a devastating civil war. Sierra Leone ranks dead last in the United Nations 2008 Human Development Index.

More Trending

article thumbnail

Facebook - Snatching Defeat From the Jaws of Victory?

Collaboration 2.0

What on earth are Facebook doing? Imagine going into a stationary store and buying a Filofax personal organizer and then over time filling it with personal contacts info, photos and notes. You come home one night and it’s no longer on the coffee table by the phone, instead there’s a note from Filofax saying there’s a change [.

IT 64
article thumbnail

Is Being In the Mobile Biz License to Ignore the Internet?

John Battelle's Searchblog

and by the Internet, I mean the *values* of the Internet, in particular, the values of a platform. When you build a platform that leverages the Internet, it strikes me you should act like a player in that space - IE, not acting like a monopolist, a bully, or in your own self interest at the expense of those who use your platform - like your customers and developers.

IT 49
article thumbnail

Fast Eddy

Daradiction

Today is Fast Eddy’s 89th birthday. He passed away in 2007. He was my Grandpa, and it finally hit me today how much I miss him. He was a paratrooper in WWII (505th Parachute Infantry Regiment, 82nd Airborne Division) and jumped 9 times, including Battle of Bulge & North Africa. One thing that always made us laugh is how he’d describe himself as “tougher than cat shit and twice as nasty.&# Here’s some info about Fast Eddy from the Veterans History Project.

IT 49
article thumbnail

FTC Extends Red Flags Compliance Deadline to November 1

Hunton Privacy

On July 29, 2009, the Federal Trade Commission ("FTC") announced another three-month delay in the enforcement of the provision of Identity Theft Red Flags and Address Discrepancies Rule (the "Rule") that requires creditors and financial institutions to implement an Identity Theft Prevention Program. The FTC noted that small businesses and entities with a low risk of identity theft remain uncertain about their obligations under the Rule and pledged to "redouble" its effort

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Daily Value

Positively RIM

For those of us trying to whip a Records & Information Management program into shape every day, we may view records as objects, challenges, obstacles, risks, clutter, detriti or worse. It’s hard to stay objective about records’ real importance and value. But sooner or later, reality or exigency enters our lives, and we re-connect with the real value of the “stuff” we manage daily.

article thumbnail

Beware the little pieces you use in your web app

Scary Beasts Security

I've just released the technical details behind some recently fixed vulnerabilities in mimetex: [link] "mimetex" is a little binary (written in the C language) used to render mathematical equations based on the TeX language. It looks very nice and is a cool concept to embed it in web apps. You can use a Google search to locate places that use it: [link] Unfortunately, the binary suffered from various classic stack-based buffer overflows as well as some commands that might leak inappropriate info

IT 20
article thumbnail

Out-Innovated by Management Practice Blowback - a Video Conversation with John Hagel

Collaboration 2.0

I had the opportunity to sit down for a discussion with John Hagel of Deloitte’s Center for the Edge last week. My previous post about the ‘Shift Index 2009′ report is augmented by this video, and fellow ZDNet blogger Dennis Howlett attended the ‘‘Eastern Philosophy: Management Lessons From Emerging Markets’ Brainstorm Tech panel John and I [.

article thumbnail

The Year's Half Over. So How Are My Predictions Tracking?

John Battelle's Searchblog

I like to do this exercise from time to time - asking how my predictions for the year are holding up given six months have passed since I posted them. Well, let's see, shall we? 1. We'll see an end to the recession, taken literally, by Q4 09. I think most folks agree this will happen. I'm not saying it has, just that the consensus is we're on the way there. 2.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Story Crawler

Daradiction

My pal Denny Dansereau gave me beta access to his new “Story Crawler&# web app and I’m stoked, and for a few reasons. Selfishly, the tool rocks, it takes the friction out of finding the melody in a sea of stories, it’s a research/collaborators dream. Think Google Alerts on steroids with ability to push out and publish or syndicate.

article thumbnail

APEC Forum Discusses International Privacy Legislation Developments

Hunton Privacy

On July 28, 2009, the Data Privacy Subgroup meeting at the Asia-Pacific Economic Cooperation (APEC) Forum in Singapore reported a number of privacy-related legislative developments on the horizon. Among the highlights: On July 15, the Malaysian Cabinet approved privacy legislation to be enacted by the Parliament in early 2010 . Vietnam is set to enact consumer protection legislation including privacy provisions in 2010 .

Privacy 40
article thumbnail

TED Talks by Clay Shirky: How social media can make history

Daradiction

While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics. Tags: Cultural Anthropology Technology.

49
article thumbnail

Neon Indian – Deadbeat Summer

Daradiction

A new band out of Brooklyn. They’re Neon Indian, and as of right now there identity is a mystery. This tune is called “Deadbeat Summer&#. Click here to view the embedded video. Tags: Culture.

49
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Twitter Security Crunch

Collaboration 2.0

There’s an awful symmetry about the strategic plans of the Twitter team being published on TechCrunch today: using password discovery techniques ‘Hacker Croll’ was able to access Google and other accounts. I literally just saw on Twitter as I write this the ‘ethical line’ TechCrunch have invented for themselves questioned by Twitter founder @ev: @TechCrunch @arrington “we [.

article thumbnail

Global Collaboration Competitive Success: Old Dogs, New Tricks & The Shift Index

Collaboration 2.0

The above CNBC video of John Hagel (Deloitte Center for the Edge) discusses the huge problem of applying old business thinking when adopting new technology, and the scary new realities around global business competitiveness. ‘Measuring the forces of long term change - the 2009 shift index‘, an important new report, addresses a major gap between the [.

45
article thumbnail

Enterprise 2.0 ROI Metrics: One Size Doesn't Fit All

Collaboration 2.0

‘The ROI of Online Customer Service communities‘ by Forrester customer experience and relationship management analyst Natalie Petouhoff is a $US 1,999 ‘Total Economic Impact™ Analysis’ (TEI) report. Mike Krigsman over at his ‘IT failures’ blog here on ZD Net seems impressed by the report’s findings, so I took a quick look at what is publicly available [.

article thumbnail

Thinking About New Models for Search

John Battelle's Searchblog

Yesterday I spent an illuminating hour with the folks behind Wowd , a still-private-beta search upstart that is taking a new approach to, well, just about everything in search as we traditionally understand it. In a odd coincidence, this morning Venturebeat published a thoughtful piece on how search might shift when more data, in particular social data, is added to the mix.

Paper 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Twistory 101: It's All About Small Business

John Battelle's Searchblog

The world's abuzz this week with word that Twitter is getting serious about business - the proof point being Twitter's new subdomain " business.twitter.com " and the "Twitter 101" handbook currently living there, a white paper of sorts aimed at helping companies figure out how to leverage the sometimes befuddling service. This all reminds me of Fall 2004.

IT 45
article thumbnail

OMG! It's A New Yahoo Homepage

John Battelle's Searchblog

Yahoo has redesigned its homepage , on the same day it announced improved profits (thanks in large part to the painful cost cutting of the past few quarters). Quite directly, Yahoo says "This new launch represents the most significant change to our homepage since the company’s inception.". That's quite a statement. I've spent some time on the page, and I'm not sure it lives up to that billing.

IT 45
article thumbnail

Twitter Grows Again

John Battelle's Searchblog

The growth is back, impressive but slower than before, but it's probably quite a relief over at Twitter HQ to see no continuation of the trend from last month.

IT 45
article thumbnail

The FCC No Likey What Apple Did to Google, Either

John Battelle's Searchblog

And they are opening an investigation into it. According to a Dow Jones Newswire report, on Friday afternoon the FCC sent letters to Apple, AT&T, and Google. The federal inquiry asks Apple why the Google Voice application was rejected from its App Store for the iPhone and iPod Touch, and why it removed third-party applications built on the Google app that had been previously approved.

IT 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

SAP's Schwarz & Sikka: The Road to More Agile Business Performance

Collaboration 2.0

Last week I had the opportunity to spend time with SAP CTO Vishal Sikka and separately SAP executive board member John Schwarz, and I’ve been ruminating on our conversations a lot since those meetings. Fortunately I was part of a group of bloggers who have been following SAP closely, and their questions and insight were [.

40
article thumbnail

Yahoo and Microsoft Announce Deal

John Battelle's Searchblog

NYT has a good story : The terms of the 10-year agreement call for Microsoft to license some of Yahoo’s search technologies, and Yahoo will initially receive a lucrative 88 percent of search-generated ad revenue from Yahoo sites. Cnet does as well. Many folks are noting Yahoo's shares slide at the open this morning. No " Boatload " of cash upfront. More as morning coffee kicks in.

article thumbnail

The Deal Is Done Between Yahoo and Microsoft, Sources Say

John Battelle's Searchblog

Not my sources, of course, but it's all over the web now, including banking analyst notes, the WSJ, and elsewhere. Here's a Google news link for those who want to dive in.

IT 40