article thumbnail

New book explores the social, institutional and user impacts of e-legal deposit

CILIP

Facet Publishing announce the publication of Electronic Legal Deposit: Shaping the Library Collections of the Future edited by Paul Gooding and Melissa Terras. Although a growing international activity, there has been little consideration of the impact of e-legal deposit on the 21st Century library, or on its present or future users.

article thumbnail

Finding the treasure in governement information management

CILIP

He gives an example from his early days at the Department for the Environment: “I remember in April 1986, I was on the library enquiry desk. Decades later his library role has shifted into managing across the full gamut of KIM-related disciplines, but he is still supporting the Government’s information needs in crises.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Y2K: The New Year’s Disaster That Wasn’t

Unwritten Record

Governments and businesses around the world proactively prepared their computer systems to seamlessly to the year 2000 rather than travel back to 1900. Since its creation in 1941, Keesler Air Force Base in Biloxi, Mississippi has specialized in technical training in avionics and electronics. Is it time for a ferret unit?

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

In 2017, Tesla sent an over-the-air update to their Model S and X vehicles to extend maximum battery capacity and driving range, which allowed owners to drive an extra 30 miles outside the evacuation area as Hurricane Irma was bearing down on Florida. They have design constraints. Remote start threats : a compromised digital key fob (i.e.,

IoT 77
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Implied herein is a cloud computing model that ARMA (2016) defines as “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

article thumbnail

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

This is the seventh post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. TSLAC Wants Your Electronic Records. These results were used to develop a big bucket retention schedule and create standard repositories for electronic records.

article thumbnail

The evolutions of APT28 attacks

Security Affairs

In other words all the infrastructures, the samples, the command and controls, the domains and IPs, the certificate, the libraries and, general speaking, all the operations that come before the attack phase in term of environments. For example from 2017 to early 2018 APT28 used specific techniques such as: T1251 , T1329 , T1336 and T1319.