Remove Archiving Remove Case Study Remove Security Remove Tools
article thumbnail

Survey reports skills in technology and Digital Preservation will be most desired in the next five years

Preservica

Ithaka S+R recently published a report based on findings from A*CENSUS II Archives Administrators Survey , which gathered data from 746 of the most senior archives leaders and decision-makers.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 103

The Schedule

Guest post by Cathrine Giles, State Records Branch Manager, Kentucky Department for Libraries and Archives. We can use “wicked problems” to frame a number of challenges the archival profession faces in order to identify where our professional knowledge can be applied to wicked problems challenging society.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

Does it impose new challenges or risks for the execution of those archival functions? The chapter presents two interesting projects that make it easier to understand how blockchain technology could support this archival function. The analysis of blockchain-based records’ trustworthiness is based on archival and diplomatic theory.

article thumbnail

This is the old ChiefTech blog.: Social software in organisations: Nature or nurture?

ChiefTech

Dave in turn responded that: " I have yet to find a social computing tool I could not pick up and use. The includes learning how to blog and use a whole range of tools. If you have counter experience or cases please let me know as it would surprise me to find them. Learning is experimentation, on line help, web sites.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Rogue security software. Architect a premium network security model like SASE that encompasses SD-WAN , CASB , secure web gateways , ZTNA , FWaaS , and microsegmentation. Ensure you install and run anti-malware software on your system and maintain high-security settings for browser activity. Jump ahead: Adware.

Phishing 105
article thumbnail

Tokyo 2020: when a sprint turned into a marathon

CILIP

And, from a blank sheet of paper, a safe and secure way found of hosting the world?s A practical systems-thinking approach offers tools to challenge complex situations and find solutions. We hope to use such experiences to produce a comprehensive case study for the public record in due course. All the plans redrawn.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Looking For Collaboration / Communication Tools Anyone remember the W formula for textbox width? KT_Follower 09/08/2008 02:24 PM Flag Have you had any requests for your case study? else watch n learn.

Paper 88