How to Use Gamification in Mobile Apps: A Case Study


I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. In 2015, Shaokan Pi, a Taiwanese mobile app publisher, released an app called Forest.

IT 52

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

So, in that spirit, I am going to share results of the May 2015 CIGO Summit participant survey that just came in. In one area we could have done better, but I knew that would be the case going in and will explain why. in each case, higher than 4 out of 5).

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events.

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study. Million since late 2015. Million since late 2015 appeared first on Security Affairs.

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

We held over fifty stakeholder meetings between October of 2013 and April of 2015. These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). In one case, we had an oversized vendor truck get stuck between a building, a ledge, and a tree for about twenty-five minutes.

Best value procurement recognizes vendors as experts


A case study by the Performance Based Studies Research Group at Arizona State University documented that BVP is highly successful, with client satisfaction levels of 98%. Best value procurement recognizes vendors as experts. narmada.devarajan. Wed, 08/26/2015 - 03:15.

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. After the last meetings in August 2014 in Beijing , the collaboration focused on case studies by several companies that sought or are in the process of seeking certification or approval under both the CBPR and BCR systems.

Finding diamonds in data


You can learn more about the project by reading CGI’s TKE case study and Microsoft’s TKE case study. Like many diamonds from data, this is most exciting to people who are actually in the business—in this case elevator maintenance.) This kind of result is what “Data to Diamonds” is all about—in this case, a big “lift” to customer service. Finding diamonds in data. Thu, 02/19/2015 - 23:24.

The Legal Industry is Getting More Collaborative


Check out one of our case studies. The Legal Industry is Getting More Collaborative. Box_User1. Mon, 02/02/2015 - 13:17.

Cloud 26

The Legal Industry is Getting More Collaborative


Check out one of our case studies. The Legal Industry is Getting More Collaborative. Box_User1. Mon, 02/02/2015 - 13:17.

Cloud 26

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


In August 2015, GPO began exploring methods to analyze our Archive-It data collected through Google Analytics. Based on Google Analytics, our average monthly visitors between June and October 2015 were approximately 2,600. Case Studies How To

Saving Local News on the Web


” The Atlantic told the story in a 2015 article titled “Raiders of the Lost Web” with the tagline, “If a Pulitzer-finalist 34-part series of investigative journalism can vanish from the web, anything can.” Case Studies Community Webs

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group.

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. This is a guest article written by Robert A.

Risk 68

Destroying Barriers to Destruction


So it didn’t come as much of a surprise that the 2015 and 2017 Cohasset/ARMA IG Benchmark reports saw virtually no decline in the number of organizations (76%) that maintain a “keep everything culture,” and don’t have a formal secure destruction plan. While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey.

New Functional Schedule for North Carolina State Agencies

The Schedule

In 2015, the Records Analysis Unit of the Government Records Section at the State Archives of North Carolina (SANC) began a project to revamp the retention and disposition schedules for state agencies in North Carolina.

Wednesday’s Relativity Fest Sessions: eDiscovery Trends

eDiscovery Daily

Here is one of the eDiscovery-related sessions for today (it’s a short day): 9:00 AM – 10:00 AM: LIE230322 – e-Discovery Law and Practice: Case Studies in Cooperation.

4 ways ISO 27001 can enhance your business

IT Governance

The negative effects of security incidents can be seen to some extent in almost all breaches, but for an extreme example, see the aftermath of the 2015 TalkTalk breach.

Sales 54

Resourceful Records Managers! Courtney Bailey, Chair, SAA Records Management Section 2019-2020

The Schedule

I’ve been on the Records Management Round Table/Section since 2015, and I think I’ve done some good work over the years on things like reviewing open source software programs and migrating and updating a records management bibliography into Zotero. Whenever I had the opportunity to focus my own research, I tried to focus on a topic that would fill in a gap for me, and in this case, I looked into records management in the business arena.

Can Enterprises execute a GRC Movement?

Security Affairs

Are applications or use cases of GRC platforms or products for enterprises going to be different for different organisations? If yes then what kind of use cases? Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world.

Risk 89

KnowledgeShare: access to evidence for NHS staff


1 Policy documents, guidelines and case studies of innovative practice add to this plethora. Case study: Tom Roper, Clinical Librarian, Brighton and Sussex Hospitals. Case study: Stephen Ayre, Library Services Manager, George Eliot Hospital.

Provenance, restitution and poison cupboards


Librarians in Russia encounter different problems: the case study of one particular Russian library showed how the government exerts strong control over the acquisition of library materials, for example materials relating to Stalin or in non-Russian languages aren?t

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

She also explained the ongoing follow-up work to the Referential, whereby the working group is conducting case studies with the help of several companies that have or are seeking dual certification/approval under the CBPR and BCRs. The case studies are ongoing and will be formally discussed by the joint working group at the upcoming APEC Data Privacy Subgroup meetings in the Philippines in late January 2015.

APEC Privacy Update – Beijing Meetings

Hunton Privacy

The DPS received a positive outcomes report of a study on the compatibility of Australia’s privacy regime with participation in the CBPR system that may set the stage for Australia’s future participation in the system. Similar studies may be performed on other APEC economies that are considering joining the system. The next round of meetings will be held in the Philippines at the end of January 2015.