Remove category
article thumbnail

Documentation Theory for Information Governance

ARMA International

This framework “places a specific document, or documents, at the center of observation, study, and analysis and thereby develops documentary dialogues about and for it, uses the document to better illuminate its contexts, and integrates the document in teaching and researching information.” Ann Arbor: The University of Michigan Press, 2006.

article thumbnail

This is the old ChiefTech blog.: Saving E2.0's Soul

ChiefTech

Mike Gotta - following Davenport and a response from Andrew McAfee - adds this analysis : " I have a slight disagreement with Andrew McAfee that these tools are radical departures from previous generations of communication and collaboration technology. Please forward any specific questions youd like to ask these guys-- its your event!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top IoT Security Solutions of 2021

eSecurity Planet

The Armis Platform offers the behavioral analysis of billions of devices to inform the Armis Device Knowledgebase, which monitors and alerts administrators to anomalies in IoT device traffic. Security administrators gain needed context into IoT and OT security events to leverage existing policies. Broadcom Features. Cisco Features.

IoT 140
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And so I joined a very small startup called KSR at the time and that we were trying to do security as service back in that was 2006 was way too early for the market. They're looking macro trends of the industry and who can do strategic analysis and strategy planning. Make the event organizers know your position on this.

Cloud 40
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? 3 As a result, an emerging consensus of courts and commentators has concluded that privacy interests may — and indeed, should — be considered as part of the proportionality analysis required under Rule 26(b)(1).

Privacy 97
article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. He founded the company “ Content Crew ” in 2006, and is its CEO since this time.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

And so we were basically you know, we started doing enterprise monitoring packet captures, you know, decryption, replaying all the events, incident response, all the assessment work, that it was a playground, you know, I got to do everything. I wondered what Daniel thought about the Information Sharing and Analysis Center or ISACs?

IT 40