Case Study: Improving ID and Access Management

Data Breach Today

What are some of moves that organizations can make to improve their identity and access management? Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview

Access 132

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 164

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity.

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. Access Legal Public Records Records Management RIM Month UncategorizedWelcome to RIM Month!

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

IT Security – Cybersecurity; Access Controls; Breach Detection. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

The kind of application we're talking about here is one that accesses a Db2 for z/OS server through a TCP/IP link via the IBM Data Server Driver (or its predecessor, Db2 Connect). What is to keep someone from using the application's authorization credentials to connect to the Db2 system from, say, a laptop PC, thereby gaining access to data that should be accessible only through the application?

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). Click here to access the case study in the IGI Community.

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor.

Cloud 74

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

The scenario involved a Java program that accessed a local DB2 for z/OS subsystem (i.e., I think it makes for an interesting case study. In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

Expand the reach of Archive-It collections with these access integrations

Archive-It

Archive-It partners can enable direct access to their captures, collection descriptions, and other related metadata beyond the default portal of archive-it.org, customizing where and how patrons find and explore their web archives. Case Studies How To

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

As agencies increasingly disseminate information directly to their websites, and not through GPO, web archiving proved a good option for continuing to provide permanent public access to Federal Agency web content. The FDLP Web Archive may be accessed via the Catalog of U.S.

Take your web archives to go with these Archive-It APIs and integrations

Archive-It

The goal is to ensure that every Archive-It partner can access, manage, migrate, and represent their web archives where and how they need them. Partners may access, curate, preserve, and share these same data directly by following the instructions in the documentation above.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. This way we are able to provide multiple points of access between the collection and the finding aid.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

We were then able to attend training and got our logins and access to the platform. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

We launched WestboroughCenter.org to facilitate access to digital resources. Case Studies Community WebsBy Anthony Vaver, Local History Librarian and Archivist, Westborough Public Library.

Saving Local News on the Web

Archive-It

We still access the content from those records every single day, as do countless patrons across the country and the world. But how will we access today’s news content 100 years from now (or more)? Access to local news is also affected by the way the Internet itself is regulated.

Describing web archives: Learning from Archive-It partners and friends

Archive-It

Partners, collaborators, and peers gathered this week for Describing Web Archives , the latest in Archive-It’s Advanced Training series of webinars , and the second (with Access to Archive-It Collections ) to invite web archivists to take the lead in demonstrating their approaches to access and discovery. Web archives come in many different shapes and sizes, so describing them towards enhancing patron access can be as much an intellectual as a technical challenge.

Partner in the news: Freedom of the Press Foundation archives online journalism at risk

Archive-It

Announced on the Freedom of the Press Foundation’s blog by Director of Special Projects Parker Higgins, the effort aims to provide reporters, editors, columnists, and citizens with perpetual access to the original work of press organizations regardless of changes in ownership. Archive-It Partner News Case Studies PressBy Karl-Rainer Blumenthal. It’s comforting to know that with the help of Freedom of Press and Archive-It, the internet never forgets.

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

The New York Art Resources Consortium (NYARC) has blazed trails into digital art historical collection development and access for more than ten years. In this case, why are three heads better than one? by Karl-Rainer Blumenthal.

KnowledgeShare: access to evidence for NHS staff

CILIP

? KnowledgeShare: access to evidence for NHS staff. 1 Policy documents, guidelines and case studies of innovative practice add to this plethora. Case study: Tom Roper, Clinical Librarian, Brighton and Sussex Hospitals.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 Editing should be easy and accessible and not require special tools. This is the old ChiefTech blog. Nice of you to drop in and visit.

Comics for Consumer Communication

ChiefTech

From guerilla theatre to testimonials, posters to graphic instructions, users have benefited from alternative communication methods, particularly in situations where education or cultural barriers make it difficult for people to access services important to their well-being and safety. In some cases, the comic book format has been used as a way to help people get access to critical legal help.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Introduction. One of the most expected moments in the infosec community during the last few months was, with no doubt, the Ghidra public release.

Benefits of Data Vault Automation

erwin

Benefits of Data Vault Automation – A Case Study … Global Pharma Company Saves Considerable Time and Money with Data Vault Automation. They needed to accelerate development, as well as aggregate data from different systems for internal customers to access and share.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? Advocates claim such access is needed to strengthen national security and hinder terrorism. Machine to machine connection and communication needs to be authenticated to access systems, so this technology is where the rubber meets the road, with respect to this debate. In this case it’s an encryption key.

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources).

How Secure Are Bitcoin Wallets, Really?

Security Affairs

So, the companies behind those wallets wisely emphasize why their products are more secure than what competitors offer and why that’s the case. There’s also the detailed account of Mark Frauenfelder, who owned a Trezor wallet and couldn’t access it for several traumatizing months after misplacing the PIN that served as recovery words for the software. Purchasers of Bitcoin wallets usually have one priority topping their lists: security.

The Science of Artificial General Intelligence

Perficient Data & Analytics

Take the case study of AI playing Go and defeating Lee Sedol vs AI getting trained on Chess.

IT 65

e-Records 2019: Early Bird discount expires soon!

The Texas Record

The result is more and more of our information is born digitally; accessed and used solely via screens; stored on hard drives, servers, and in the cloud; and will eventually be deleted or transferred to a digital archive all without ever having been reduced to paper.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

Given the topic of the conference, many of the presentations centered around information governance and implementation whether in the cloud, SharePoint, or through successful case studies.

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. Now, Sinar Mas is able to collect, share, and collaborate on data all within a single platform so that everyone has access to the same information in real-time.

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study.

NHS is still assessing the cost of WannaCry one year later

Security Affairs

The estimate in the report considers the financial costs in two time periods: during the attack between 12 and 18 May 2017; during the recovery period in the immediate aftermath to June-July 2017; The analysis focus on two categories of cost are: Direct impact – lost output of patient care caused by reduced access to information and systems required for care leading to cancelled appointments etc.

OpenText Showcases how Intelligence, Integration and Automation Drive Innovation in Content Services at AIIM Conference 2019

Document Imaging Report

OpenText Content Services help organizations readily access critical business information through the delivery of “content in context” for both structured and unstructured data. Conference attendees can access demos and further information at OpenText’s booth (31 and 32) at the AIIM Conference tradeshow. Riley McIntosh of Pacific Life and Alison Clarke from OpenText will present a case study on how to build a strong information management framework on March 27 at 10:15 am.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor. Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 120

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. This article summarizes a report published by AIEF on May 30, 2019.

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. This project focus on access as preservation as the end goal. They provide online access to emails by converting emails to pdfs, with attachments, uploading them to the content management system, and making them keyword searchable. Email Archiving Comes of Age.

Spotcap Expedites Lending Decisions Using Kofax Kapow Robotic Process Automation

Document Imaging Report

Applications are reviewed within 24 hours and, once approved, SMEs have immediate access to funds. For more information: Spotcap Revolutionizes Lending with Flexible and Accessible Financing for Small and Medium-Sized Businesses case study.

Kofax Announces “First Year Free” Offer for its Market Leading Information Capture Solutions

Document Imaging Report

Kofax Capture automates scan to archive applications and enables easier access to information within an organization. Vendors can help drive transformation by making solutions more accessible to a wider market.”

Innovation in service delivery - PatchworkHQ pilot in Victoria

ChiefTech

When I joined Ripple Effect Group in 2009 (then known as Headshift), one of the company's case studies that immediately resonated with me was Patient Opinion. There was nothing like it in Australia and if you've been following me for a while, you'll know I've often featured it as a case study of what we can do when we think beyond getting government agencies on to Facebook and Twitter.