This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Despite the apparent pace of urgent change proposed by hi tech company marketing, enterprises are more circumspect in identifying their best paths forward to achieve their goals.
Jonathan Zittrain has an important op ed up on Harvard’s site , and I hope all of you will go read it. It sums up many of the points that I hit as I write here at Searchblog, and that will enliven my next book What We Hath Wrought. Key points: Rising numbers of mobile, lightweight, cloud-centric devices don’t merely represent a change in form factor.
In this post we are going to take a closer look on what are the current phishing tactics employed in the wild. The trends uncovered by analyzing our new data-set of 5000 recents phishing sites will change the way you think about phishing.
DB2 for z/OS data sharing is great technology. One of the things that makes it great is the ability of a data sharing system to automatically spread work across DB2 members so as to optimize load balancing, throughput, and availability. For this we can thank the z/OS workload manager (WLM), the DB2 group attach capability (for local-to-DB2 applications such as batch programs and utilities), and the Sysplex awareness built into DB2 Connect, the IBM Data Server Driver, and other DB2 clients (for r
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
I am a Certified Information Professional. I just passed the proctored exam and received my CIP Examination Score Report. In a few weeks I should have access to the official logo and credentials. While for obvious reasons test takers cannot retain a copy of any questions answered incorrectly (or otherwise), this Score Report shows the percentage correct for each section.
Lithuanian firm LAWIN Lideika, Petrauskas, Vali?nas ir partneriai reports that recent amendments to Lithuania’s Law on Legal Protection of Personal Data and the Law on Electronic Communications have established a breach notification requirement. Specifically, providers of publicly-available electronic communications services or of public communications networks must notify the data protection authority of data security breaches, and, when the breach is likely to have an adverse effect on the pri
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Lithuanian firm LAWIN Lideika, Petrauskas, Vali?nas ir partneriai reports that recent amendments to Lithuania’s Law on Legal Protection of Personal Data and the Law on Electronic Communications have established a breach notification requirement. Specifically, providers of publicly-available electronic communications services or of public communications networks must notify the data protection authority of data security breaches, and, when the breach is likely to have an adverse effect on the pri
It takes hard work to create simplicity: unless IT security is allowed to move with the rapidly changing times to enable greater efficiencies, outmoded and sometimes irrelevant rules will hamstring enterprises.
In the vein of documenting how the world most likely will look one generate hence, my researcher and I have been taking a look at a number of key global drivers. One, of course, is how we govern ourselves (you can see posts on that topic here and here ). Another is global population. Working with data from the US Census Bureau and International Data Base , we’ve also overlayed some information from Internet World Stats , though for now, the fit is imperfect.
Since the introduction of HTTPS by Netscape, the lock icon have been the indicator of choice to tell users that their communication is secure. Over the years, this “prestigious” icon shape and position kept changing from browser to browser and from version to version so I made a couple of infographic to illustrate this. I hope you will enjoy them.
IBM's 2011 Information on Demand conference took place last week in Las Vegas. I attended a number of the event's technical sessions, and summarized what I heard in some of those sessions in a couple of entries posted to this blog. In this entry, my last focused on IOD 2011, I'll provide some of the more interesting items of information that I picked up in the "coffee track" -- that being the term often used to describe discussions that take place during coffee breaks and otherwise outside of th
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
It's great to see our work getting some mentions in the UK national press, with the Guardian's "Media Planet" supplement article on search and deploy technologies. See here for more [link].
On November 29, 2011, at the International Association of Privacy Professionals (“IAPP”) Europe Data Protection Congress in Paris, France, Viviane Reding, Vice President of the European Commission and Commissioner for Justice, Fundamental Rights and Citizenship, provided insight into details of the proposals for the revised EU data protection framework.
Yesterday I met with Christopher Ahlberg , the PhD co-founder of Recorded Future , a company I noted in these pages back in mid-2010. Ahlberg is one of those rare birds you just know is making stuff that matters – a scientist, an entrepreneur, a tinkerer, and an enthusiast all wrapped into one. He ran me through Recorded Future’s technology and business model, and I found it impressive.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Collaboration software and social media led several maturing topics at ARMA International’s annual conference and expo near Washington D.C., October 16-19. Born in records management, ARMA showed an accelerating metamorphosis into Information Governance, as the definition of “record” expanded again. The transformation, first observed a year ago, reflects court decisions requiring management of information – not just official records -- in all formats and media.
AIIM now offers the new Information Certification. According to the AIIM Web site , The new Information certification demonstrates your ability to solve an. organization's existing information-related problems as well as plan for the future. The objectives outlined for the certification are as follows: Certified information professionals contribute to the success of. their organizations by helping address the following kinds of. information management challenges (both on-premises and in the clou
On November 29, 2011, the Federal Trade Commission announced that Facebook has settled charges that it deceived consumers by making false privacy promises. The settlement requires Facebook to (1) not misrepresent how it maintains the privacy or security of users’ personal information (2) obtain users’ “affirmative express consent” before sharing their information with any third party that “materially exceeds the restrictions imposed by a user’s privacy setting(s),” (3) implement procedures to pr
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The global black market economy is estimated at around 10 trillion a year, easily making it the second-largest economy on Earth, rivaling the United States in size. Where does the ‘informal’ economy end and the black market begin, and how do we foster ingenuity in formal business collaboration without crossing criminal lines?
A funny thing happens to me after each Web 2 Summit – I tend to curl up for a week or two and shut down my idea receptors. It takes a ton of output to curate the show, and then running it for three straight days is rather like running an intellectual and social marathon. You’re “on” the whole time, scrambling backstage, pretending to have it together onstage, greeting amazing minds, cheering them on, delivering what I hope will be thought provoking interlocution, and, of
( image ) As I begin to dig into the work of my next book, I’ve found myself thinking about politics and government far more than I anticipated. (For initial thoughts and stats, see Government By Numbers: Some Interesting Insights ). While the body politic was always going to be one of the main pillars of the book , I didn’t expect it to push itself to the foreground so quickly.
I hate to pick on the good folks at TextPlus , because I like the service (and my kids do too). But my family recently had an experience that reminded me how stunted the advertising ecosystem remains in the (relatively) new world of apps. Quite serendipitously, after that experience I had the pleasure of meeting the CEO of Gogii, the company behind TextPlus.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The Federal Trade Commission and Facebook have come to terms on consumer privacy, an issue the FTC formally raised in an eight-count complaint earlier this year. Both sides have announced the pact in their own particular way. On Facebook’s blog , CEO Mark Zuckerberg strikes a diplomatic tone with a dash of mea culpa. “Overall, I think we have a good history of providing transparency and control over who can see your information,” he writes. “That said, I’m the firs
It took me a while, but I’ve finally finished Kevin Kelly’s “ What Technology Wants ,” first published last year and now out in paperback. Befitting a tome that took five or so years to write, Kevin’s book is not the kind of work that is easily digested – at least for me. But that’s not to say it’s not worthy.
I’ve spent the better part of a few days thinking through the theme(s) of FM’s Signal series of conferences for the upcoming year. I’ve got a ton of thoughts scrawled across my whiteboards, but then a thought woke me up in the middle of the night – why don’t I ask all of you what you think are the most important trends for digital marketing in 2012?
This week Ad Age published All Brands Are Publishers, Learn How to Be a Good One , by yours truly. In it I summarize six or so years of work I’ve done outlining terms like “ conversational media ,” which I first outlined on this site, “brands as publishers,” also written about first in these pages and at FM’s home , and of course the Independent Web (again, here).
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
As early as 2003, which was the first year I began writing this site, I wrote about the idea of “video as grammar.” By this I meant (and mean) that I foresaw a day when our culture communicated with itself using video much as we currently use text. In order for this to happen, a number of things had to fall in place. First, we needed tools that allow for quick and easy “video processing” – we need the Microsoft Word for video.
I’ve always been quite interested in commenting systems for the Independent Web, and when it came time to redesign this site, I chose to use Disqus , an independent company that is a leader in the space. Disqus has its detractors, but it has many more fans. The company has nearly 1 million sites using the services and is rolling out new features very quickly.
Bing released its top searches of the year today, continuing the trend of presuming the year ends before December begins (watch for Yahoo and Google’s lists in the next week or so). Once again, the data is utterly uninspiring and shallow. I mean, did we really not know that the US is fascinated with celebrities and iPhones? This is becoming something of a trope for me, but given all the data to which search giants like Microsoft and Google have access, I’d love to see some real data
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content