article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. They’re often overlooked in favor of external spreadsheets, docs, or other tracking software for such communications.

article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. They’re often overlooked in favor of external spreadsheets, docs, or other tracking software for such communications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Current Operating Status

National Archives Records Express

However, we would like to highlight our 2011 FAQ on telework. Given this unusual situation, some teleworking employees may find that they use personal email accounts to communicate for work. More information about the National Archives’ response to coronavirus can be found at archives.gov/coronavirus.

article thumbnail

Judge Recommends Jury Decision on Impact of Spoliation of Emails: eDiscovery Case Law

eDiscovery Daily

The plaintiff indicated that it changed servers in November 2011 and no longer had possession of any emails prior to then. In response to the suggestion that the loss of the pre-November 2011 emails might have been deliberate, the plaintiff claimed that the server change was “years before any party could have foreseen litigation”.

article thumbnail

Reflections on international collaboration: enthusiasm, commitment, resilience. It is all about dive

CILIP

Hogg OBE, the Founding Principal of the College of Librarianship, Aberystwyth, decided to start the first International Graduate Summer School for students and future library and archive leaders. Attending my first AHILA conference in Mombasa in 2006 was an unforgettable experience. s General Assembly in 2010 in Burkina Faso.

article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

The threat actor abused Bitly shortener and an ad hoc BlogSpot account to protect the malicious code, lastly stored in an encrypted zip archive hosted on Mega.nz. Sqlcmd.exe, an interesting information stealer and dropper leveraging custom ECC cryptography to secure its communication (details below) KiffAppE2.exe, All at the same time.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

When serious stolen payment card shop vendors wish to communicate that a batch of cards is uniquely their handiwork or that of their immediate crew, they refer to it as “our base.” The earliest recorded archive of the Hot Spot website listed three clients on its homepage, including ChronoPay and Freefrog.