This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On the eve of the main Boston Enterprise 2.0 Conference, it’s worth taking a look at the state of the enterprise. Despite being up to my eyeballs in collaboration strategy behind the firewall inside large companies this year I strive to stay objective and to avoid failing to see the wood for the trees. It’s all [.
Jonathan Zittrain has an important op ed up on Harvard’s site , and I hope all of you will go read it. It sums up many of the points that I hit as I write here at Searchblog, and that will enliven my next book What We Hath Wrought. Key points: Rising numbers of mobile, lightweight, cloud-centric devices don’t merely represent a change in form factor.
Hello! I moved within Santa Monica recently to a great place with a better layout for working at home and having people over. I’ve had a GREAT roommate for awhile, but he recently got engaged and they are getting married. It’s a 2BR / 2BA place, remodeled with hardwood floors and a great kitchen. Their share of the rent would be around $1100 but could be less/more on if they want the place furnished, office den, parking spot, etc.
Over the past 15 years or so, I have written magazine articles, and presented, and blogged on the topic of DB2 for z/OS buffer pools and their impact on application performance (two of my more recent blog entries in this category were posted in September and October of last year). Often, the message boils down to this: bigger buffer pool configuration = good.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
I am pleased to announce that I have accepted a position with a consulting firm near Washington, D.C., as a SharePoint Architect. I will be interfacing directly with a federal government agency, helping them create a new robust SharePoint 2010 environment and migrating content from thousands of SharePoint 2007/2003 sites to this new environment. I'm very excited!
In this post we are going to take a closer look on what are the current phishing tactics employed in the wild. The trends uncovered by analyzing our new data-set of 5000 recents phishing sites will change the way you think about phishing.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
In this post we are going to take a closer look on what are the current phishing tactics employed in the wild. The trends uncovered by analyzing our new data-set of 5000 recents phishing sites will change the way you think about phishing.
Google’s pivot from search to social technologies occurred last week and my early impressions of their new service Google+ are very positive, particularly around their efforts on allowing you to group your contacts. The giant global advertising company have many years experience analyzing your search and email history, and often display eerily accurate recommendations contextual [.
 A common criticism of modern ’social’ interactions online is that they are just that: superficial socializing to idle away the time. It’s a view often held by people with little or no experience of actually interacting through the modern mediums which are now an integral part of mainstream broadcast media. Twitter has quickly taken center stage in [.
The distraction of increasing volumes of digital noise is arguably creating ‘information deflation’, which is causing quality information to be harder to find, have a shorter lifecycle and quickly become devalued
MarkLogic are an interesting and rapidly growing company in the enterprise space right now:Â essentially they replace the relational database model in ways that make their next generation purpose built tools fit your unstructured data. Their servers coral all the heterogeneous information companies create to index everything they see, pulling together information in context.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Working with international company workforces I’m often struck by the sheer diversity of individuals across cultures, age groups and skill sets who are confident in their ability to communicate and collaborate well. There seems to be a personality type that has a huge appetite for learning and using ever more frequent waves of new technology [.
Despite the apparent pace of urgent change proposed by hi tech company marketing, enterprises are more circumspect in identifying their best paths forward to achieve their goals.
Salesforce exhibit marketing & presentation genius on a par with Apple to roll out new products across the global internet; pragmatic challenges in planning and realizing your needs are sometimes underestimated during roll out after digesting the dream
Sharepoint 2010 is now a credible platform player for collaboration and business social networking. The larger challenge: Changing user perceptions of what the tools are for, and what you can do with them.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Kaizen (æ¹å) is a Japanese term meaning “change for the better&# , referring to a philosophy and practices that focus on ‘continuous improvement’ of processes in manufacturing, engineering, supporting business processes and people management. In its purest form it’s a daily process, the purpose of which goes beyond simple productivity improvement with its ability to cross [.
Box.net got forty eight million dollars bigger today thanks to a Series D funding round led by Meritech Capital Partners, with new investment firms Andreessen-Horowitz and Emergence Capital Partners joining previous investors Draper Fisher Jurvetson, Scale Venture Partners and US Ventures Partners to help with Boxâs growth as an enterprise cloud platform.
The escalating unrest in North Africa and other parts of the world continues to make us wonder about the fundamental levers of control of the entire internet, and its uses for mass interactions and broadcasts. Bit.ly, the uniform resource locator (web site url address) shortener widely used by marketers and Twitter users relies on.ly, the [.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Like accountancy software and spreadsheets, HR Technology has been around as long as business computing. Recruiting, payroll, tracking work time, performance appraisals, employee benefits administration, managing training and learning and performance reviews and records…and of course the funeral parlor like world of ‘off boarding’ may not be the sexiest of software spaces but they form [.
Enterprise leadership is often out of touch with innovation, collaborative processes and the levers for success: ‘Car Guys vs Bean Counters - The battle for the soul of American Business’ by Bob Lutz encapsulates much of what is wrong
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
2011 should be the year where we begin to see much tighter business definition into various verticals for the word ’social’, which is currently extremely fuzzily focused and meaning different things to different interest groups. This week sees the run up in the USA to Super Bowl XLV, the 45th edition of the final game of [.
If you were to write a brief history of Twitter, its zenith might prove to be surprisingly similar to San Francisco’s summer of love, 3 months in 1967 when as many as 100,000 people converged on the Haight-Ashbury neighborhood. I live a few blocks away from that area, which is still a tourist attraction - I [.
The 1999 US Gap 30 second TV spot above - ‘everybody in vests!‘ - is now exquisitely unfashionable. Hi Tech is every bit as fashion driven as the clothing industry, but unlike the rag trade has an evangelical quality which can be quite amusing to those being propositioned within prospect businesses. Computer technology’s role in business [.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
‘Tis the season for career musical chairs. We all hear about executive leadership changes in a breathless media - Google, HP et al. Further down the hierarchy countless ‘Reductions In Force’, reshuffles and hires are happening this January, with scant media discussion unless it’s a mass layoff, such as the MySpace shrinkage, or a mass business [.
I had a sobering experience in Buenos Aires just before Christmas - I lost my iPhone. For the following few days I retraced my steps in my mind…I’d either left it in a taxi in 100 degree heat or it had been pick pocketed in a crowded GalerÃas PacÃfico shopping mall. More importantly I’d left it [.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content