Remove category international
article thumbnail

This is the old ChiefTech blog.: Saving E2.0's Soul

ChiefTech

Tools emerging under the category of social software are benefiting from common application, infrastructure and network services that were not mature in the eighties and nineties. Were looking into streaming live, but short of that, well post the videopodcast for the international community. Enterprise 2.0 Great blog, btw.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. Walsh 31 Reputation points Posted 2008/09/21 @ 13:52PM with Really enjoyable article.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Documentation Theory for Information Governance

ARMA International

xi] The term “information” covers any phenomena, including physical or digital objects, intangible knowledge, events, and nearly everything that could be considered as informative. x] Marc Kosciejew, “Documentation and the Information of Art,” Tate Papers 29, Spring 2008, [link]. Copyright 2019 ARMA International and AIEF.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. Much like malware, it is an inclusive category that encompasses a wide variety of malicious software. Since 2008, RAM scraping has been a boon for retailers. Additional features of botnets include spam, ad and click fraud, and spyware.

Phishing 104
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. Therefore, the risk did not seem to matter. 2020, p 1).

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Among other things, well-designed custodian interviews and close cooperation with internal IT personnel can help determine the likely relevance of a data source, as well as the kind of sensitive information that might be contained within it. 2008); see also White v. 565, 578–97 (2008) (recounting the saga of the Zyprexa leak).

Privacy 97
article thumbnail

Office 2.0: Eating our own dogfood. | ZDNet

Collaboration 2.0

By Oliver Marks | August 25, 2008, 7:17pm PDT Summary It’s been a fascinating experience helping Ismael Ghalimi organize the third Office 2.0 This is a great opportunity to show off new technology solutions, and it’s not too late to take part in this section of the event if you are a small technology startup!

Paper 40