Remove 2019 Remove Case Study Remove Cloud Remove Libraries
article thumbnail

e-Records 2019 Call for Presentations

The Texas Record

The annual e-Records Conference will be held Friday, November 15, 2019. We want to you to speak at e-Records 2019. This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored with the Texas Department of Information Resources (DIR) to promote electronic records management in Texas government.

article thumbnail

e-Records 2019: Registration Open!

The Texas Record

Registration for the 2019 e-Records Conference is now open to state agencies and local governments. About e-Records 2019. Texas technology managers and records managers are working together closer than ever before to implement critical projects like cloud migration and cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Why Attend e-Records 2019. The result is more and more of our information is born digitally; accessed and used solely via screens; stored on hard drives, servers, and in the cloud; and will eventually be deleted or transferred to a digital archive all without ever having been reduced to paper.

article thumbnail

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Jennifer Weintraub began the session by introducing the panelists and highlighting some of its major themes and points: “Controversial material” : Weintraub defined “controversial material” broadly–”it depends”– and noted that the Schlesinger Library, along with many other institutions, already collect this kind of content.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

During the 2019 holiday season, the Barracuda research team analyzed 4,200 Android apps related to shopping, Santa, and games. While this case study is just a snapshot, vigilance in the app store is required. Examples of Malicious Mobile App Malware Attacks. It can forgo modifying the kernel and subvert the OS.

Phishing 105