2013

article thumbnail

Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact

John Battelle's Searchblog

'The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero. Back when I wrote The Search , that hero was Google – the book wasn’t about Google alone, but Google’s narrative worked to drive the entire story. As Sara and I work on If/Then , we’ve discovered one unlikely hero for ours: The lowly banner ad.

Retail 112
article thumbnail

Harley Earl's influence on Steve Jobs

Collaboration 2.0

'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 95
article thumbnail

Federal Court: Non-Public Facebook Wall Posts Are Protected Under the Federal Stored Communications Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , No. 2:11-CV-3305 (WMJ) (D.N.J. Aug. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Elie

Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users.

IT 62

More Trending

article thumbnail

A Copernican Shift In Our Economic Thinking

Daradiction

Eversince I read Kalle Lasn's (Adbusters Founder) book "Culture Jam: The Uncooling of America" I've been fascinated with his anti consumer stance. Idealism aside, this set of images from his most recent book "Meme Wars: The Creative Destruction of Neoclassical Econmics" paints a stark contrast to business as usual.

68
article thumbnail

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

article thumbnail

Star Award: Employee of the Year

JKevinParker

I was honored by my current employer, T. White Parker (no relation), to be given their "Star Award" as employee of the year for 2013. This award is for "dedication and outstanding contribution". This firm has taught me a lot about management consulting and federal contracting. I feel I have taught them some things, also, about information management and technology.

article thumbnail

Meaningful Outcomes

CGI

Meaningful Outcomes. shobana.lv@cgi.com. Tue, 12/17/2013 - 05:45. It’s long been fashionable for us to knowingly advise each other to focus on outcomes. This is just common sense, so it’s hard to fault. But there’s an angle on outcomes which is usually overlooked. What constitutes an outcome to him, might not constitute one to her. It’s all down to our personal motivations.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Reality of HIPAA Violations and Enforcement

HIPAA

Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law.

CMS 44
article thumbnail

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team

article thumbnail

Harley Earl's influence on Steve Jobs

Collaboration 2.0

'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.

IT 111
article thumbnail

SAP SuccessFactors raise the user experience bar for a digital workplace

ChiefTech

'Yesterday I attended day 1 of SAP SuccessFactor''s SuccessConnect conference in Sydney. I was there to learn more about SAP''s roadmap for its enterprise social software offering (SAP Jam) and also to see how well it currently extends into the broader SAP''s HR technology ecosystem. One of the pleasant surprises of the day was seeing the latest mobile app from SuccessFactors, which integrates JAM and other applications from their suite: I have to admit this app really raises the bar in terms of

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The following features of the law are of particular significance: The law applies only to the processing of personal data in commercial transactions (in effect, private sector transactions, though not including credit reporting a

article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

IT 62
article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Access 67
article thumbnail

SXSW 2013 Highlights: Kurt Daradics & Stephen Wolfram

Daradiction

Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf extension), which he's proclaiming as the convergence of the past 30 years of his work.

Cloud 64
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Chief Marketing Technology Officer (CMTO) and the Enterprise Architecture Perspective

Interactive Information Management

The Chief Marketing Technology Officer (CMTO) is recently an often-proposed role, that combines the interactive marketing savvy and experience of a Chief Marketing Officer (CMO) and the traditional information technology operations, management and investment knowledge of a CIO or CTO. More and more often, digital marketing requirements of an organization need a healthy integration of both marketing and IT skills.

article thumbnail

TCPA Lawsuits Explosion

Privacy and Cybersecurity Law

The number of class-action lawsuits brought under the Telephone Consumer Protection Act (TCPA) against businesses that regularly call consumers for […].

Privacy 52
article thumbnail

Turning Content Inside Out

CGI

Turning Content Inside Out. ravi.kumarv@cgi.com. Thu, 12/12/2013 - 10:00. Content is changing - from author-controlled to consumer and collaboration-led. We review why this is happening and what an organisation can do to gain the benefits, cost and efficiency savings that will start to follow. The problem with 'old' Content. Content is produced today by most organisations in the same way since the 1980's when personal computers were introduced and 'personal productivity' software became availabl

ECM 40
article thumbnail

Gmail, Google Apps for Business HIPAA Business Associate Agreements

HIPAA

The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.” Complete compliance with HIPAA guidelines requires implementation of basic a

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Behind the Banner, A Visualization of the Adtech Ecosystem

John Battelle's Searchblog

'The post Behind the Banner, A Visualization of the Adtech Ecosystem appeared first on John Battelle's Search Blog. I’m very proud to announce “ Behind the Banner “, a visualization I’ve been producing Jer Thorp and his team from The Office for Creative Research , underwritten by Adobe as part of the upcoming CM Summit next week.

IT 111
article thumbnail

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

111
111
article thumbnail

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email. However, the Financial Times reports that Atos are making progress: "Almost two years on, zero email has not only begun to take hold within Atos, but the initiative has attracted interest from a growing number of business leaders.". (Sorry, the link above might get paywalled when you click on it).

IT 75
article thumbnail

French Data Protection Authority Issues Guidance on Cookie Consent and Expiration

Hunton Privacy

On December 16, 2013, the French Data Protection Authority (“CNIL”) released a set of practical FAQs (plus technical tools and relevant source code) providing guidance on how to obtain consent for the use of cookies and similar technologies in compliance with EU and French data protection requirements (the “CNIL’s Guidance”). Article 5.3 of the revised e-Privacy Directive 2002/58/EC imposes an obligation to obtain prior consent before placing or accessing cookies and similar technologies on web

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.

IT 33
article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Why? Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

Access 67
article thumbnail

Baja con Amigos

Daradiction

'In 2008 I met Kris Krug. We share several auspiciously random overlapping networks, and since 2008 our friendship has blossomed into a deep personal friendship and working collaboration. Kris is professional photographer / photo journalist and he has some fantastic clients including TED.com, United Nations, National Geographic, and the company that I'm working for, Esri.

Mining 76