CASE STUDY: LEGIT_00004

ForAllSecure

In the rest of this article, we will explain what the bug was, and how Mayhem used it to create a full-fledged exploit. LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory.

IT 52

Case Study: LEGIT_00004

ForAllSecure

In the rest of this article, we will explain what the bug was, and how Mayhem used it to create a full-fledged exploit LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 40

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. Tech-oriented media outlets latched onto Forest immediately, and it appeared in articles like “ Top 10 Productivity Tools to Maximize Your Efficiency ” and “ Curb Tech Dependence With an App That Plants Trees as a Reward.”.

IT 40

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. if the article is paywalled, try this link (PDF) provided by NSC Group). NSC Group - Using a free Yammer network. (if A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”. Note: I reviewed SharePoint 2013's social features over on the Ripple Effect Group blog.

IT 42

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study

ChiefTech

Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. Further Reading Articles and Papers Book Reviews and More Intranet 2.0

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”).

This is the old ChiefTech blog.: Bromberg & Sunstein LLP Wiki Case Study

ChiefTech

Friday, 7 September 2007 Bromberg & Sunstein LLP Wiki Case Study I discovered this quite by chance , but its actually a good case study on a law firm turning to wiki technology (in this case its Confluence again! ) When I read the case study I sense that this isnt so much about the success of social software, but more the about the success of the software product itself AND the evolution towards read/write intranets.

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge

ChiefTech

Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia. Further Reading Articles and Papers Book Reviews and More Intranet 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit.

Paper 44

This is the old ChiefTech blog.: Another Wiki Case Study from Dan Bricklin: Thomson Learning

ChiefTech

Saturday, 10 March 2007 Another Wiki Case Study from Dan Bricklin: Thomson Learning Dan Bricklin has recorded another wiki case study (MP3 podcast), this time with Thomson Learning. Technorati tags: Dan Bricklin , Thomson Learning , Wiki , Enterprise Wiki , Case Study , Twiki at 11:23 AM View blog reactions 1 comments: Anonymoussaid. Further Reading Articles and Papers Book Reviews and More Intranet 2.0 This is the old ChiefTech blog.

Take your web archives to go with these Archive-It APIs and integrations

Archive-It

To read a high level summary of each, review example use cases, and find detailed documentation and instructions for implementation, start here: Archive-It APIs and integrations. Use cases continue to drive development in this space, though! Let us know when you’ve used one of these APIs in the Help article above or make a feature request if there’s a new integration that you’d like to use, and we’ll be back to highlight more examples and ideas. Case Studies How To

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library

Archive-It

This might be a single news article (i.e. The Section 108 Study Group recommends collectors give content creators the right to opt out of having their content collected or made publically available. Archiving Spontaneous Events Case Studies Community Webs

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

The first step was to go through some of the many professional sources available, such as Google’s Analytics Academy Courses , and the articles The Suitability of Web Analytics Key by Jody Condit Fagan and Evaluating Information Seeking and Use in the Changing Virtual world: the Emerging Role of Google Analytics by D.J. Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S.

Saving Local News on the Web

Archive-It

” The Atlantic told the story in a 2015 article titled “Raiders of the Lost Web” with the tagline, “If a Pulitzer-finalist 34-part series of investigative journalism can vanish from the web, anything can.” Case Studies Community WebsThe following is a guest post by Diana Bowers-Smith, Archivist, Brooklyn Collection, at the Brooklyn Public Library.

This is the old ChiefTech blog.: More on E&Y's approach to KM

ChiefTech

Monday, 4 June 2007 More on E&Y's approach to KM I know there is always interest in Ernst & Young s approach to KM, so I keep my eyes open for new articles and case studies that are available in the public domain - here are two more: InsideKnowledge magazine interviewed Shirely Jackson , a UK-based director in the Ernst & Young Center for Business Knowledge in 2004. You can read more about E&Y s approach to KM in these papers and articles.

Paper 40

The complete Enterprise RSS Value Chain article

ChiefTech

Back in late September I mentioned I was working on an article about Enterprise RSS. To be fair to Image & Data Manager magazine subscribers I normally wait a little while before uploading a copy of the article to my online archive. The combined article also profiles two very different Enterprise RSS solutions ( Newsgator and Xenos ) and some case studies, including the now 'classic' Wallem shipping example from Attensa.

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

service model risk blown away - Google and Postini I noticed in this case study about a law firms decision to pick Google Apps for email and collaboration over Microsoft Exchange or IBM Lotus Domino , that they mention Google has acquired a company called Postini (actually back last year ). Further Reading Articles and Papers Book Reviews and More Intranet 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0

ChiefTech

and a number of interesting case studies have appeared. Technorati tags: Web 2.0 , Enterprise Web 2.0 , Enterprise 2.0 , Case Study , Christmas , Santa Claus , Father Christmas , Funny at 10:43 AM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. Further Reading Articles and Papers Book Reviews and More Intranet 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit.

Data Mapping Tools: What Are the Key Differentiators

erwin

BFSI, PHARMA, INSURANCE AND NON-PROFIT) CASE STUDIES FOR AUTOMATED METADATA-DRIVEN AUTOMATION. Article 33 of GDPR requires organizations to notify the appropriate supervisory authority “without undue delay and, where, feasible, not later than 72 hours” after discovering a breach. The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. It’s not difficult to see why either.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 Further Reading Articles and Papers Book Reviews and More Intranet 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: The slow death of Enterprise 2.0 on Wikipedia

ChiefTech

aka "Enterprise Social Software") entry in Wikipedia I noticed that, despite the HBS case study, the entry itself isnt actually getting any better. The latest revision history has comments such as " hardly any content, no need to keep separate " and that the article shouldnt be " a link farm ". Unfortunately at the moment the article is less than 500 words (compared for example with the few thousand for KM ) that hardly touch the sides of recent debate on this issue.

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

After releasing the so-called Referential in March 2014, a jointly developed mapping document comparing APEC CBPR to the EU Binding Corporate Rules (“BCR”) system, APEC officials and representatives of the Article 29 Working Party continued their collaboration on this subject through the BCR/CBPR joint working group. The ultimate goal of the case studies is to identify possible ways to simplify and streamline the dual certification/approval processes under the CBPR and BCR systems.

Malicious PDF Analysis

Security Affairs

Then I thought, “Why not turn a PDF analysis into an article?” ” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. In the last few days I have done some analysis on malicious documents, especially PDF.

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

They also discussed the work that is currently being done by a joint working group of the Article 29 Working Party and the APEC Data Privacy Subgroup on the development of tools that help companies become certified and approved under both the EU Binding Corporate Rules (“BCRs”) and the CBPRs. The case studies are ongoing and will be formally discussed by the joint working group at the upcoming APEC Data Privacy Subgroup meetings in the Philippines in late January 2015.

Beware the gaps in SharePoint

ChiefTech

Alex Manchester interviewed me the other day for a Melcrum Internal Comms Hub article discussing SharePoint responding to a new report from Forrester. His article also contains a link to a SharePoint case study at BSI Group. " See, why bother paying Forrester for analysis when you can just talk to me. ;-) Technorati Tags: Alex Manchester , Melcrum , Internal Comms Hub , SharePoint , MOSS , Forrester , Case Study , BSI Group

40

APEC Privacy Update – Beijing Meetings

Hunton Privacy

The DPS received a positive outcomes report of a study on the compatibility of Australia’s privacy regime with participation in the CBPR system that may set the stage for Australia’s future participation in the system. Similar studies may be performed on other APEC economies that are considering joining the system. Subject to approval by the Article 29 Working Party at its upcoming September meeting, this collaboration will continue inter-sessionally.

Singapore Updates Its Model Artificial Intelligence Governance Framework

Data Protection Report

Such examples are drawn from a variety of industries – ranging from banking and finance, healthcare to technology and transportation, and are based on different use cases, thereby reinforcing the neutral and flexible nature of the framework. . (2) The Compendium of Use Cases. The Compendium of Use Cases sets out various case studies of organisations which have operationalised the principles from the Model Framework.

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Since a taxonomy is a reflection of what it organizes, in this case we’re reflecting our profession. Dark data : There is a case to be made that this should have been added last year, but we deferred then, and have added it this year. View the PDF version of this article.

ROT 59

Can I really rely on my entire workforce to support a recovery?

IT Governance

This is a guest article written by Robert A. Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. I am reminded of an article that I read in ‘The News’ last year, which reported that Portsmouth City Council had lost more than 33,000 days last year to staff sickness.

Risk 51

Poster boy for Information Governance

InfoGovNuggets

Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. And now we learn that he conducted government business over his own private gmail account {that information does not appear in the WSJ article – Ed.}, Certainly an argument for an Information Governance case study of just the Clinton email investigation and its aftermath.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

This article summarizes a report published by AIEF on May 30, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in November. The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. View the PDF version of the article.

Off the Record – Nuclear Records Testing, Legal IG Guidance, Perfect Retention Policies

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers. To illustrate this point, they focus on a case study of a large U.S.

This is the old ChiefTech blog.: Mashup News and the Difficulty Curve

ChiefTech

Monday, 26 February 2007 Mashup News and the Difficulty Curve No time to comment fully on this, but some good stories and articles about enterprise mashups: Jackbe , who describe themselves as " a provider of Enterprise Web 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit.

CNIL Adopts Referentials On DPO Certification

Hunton Privacy

Article 37(5) of the GDPR requires that the DPO “shall be designated on the basis of professional qualities and, in particular, expert knowledge of data protection law and practices and the ability to fulfill the [DPO] tasks.”. Candidates also will need to successfully complete a written test that will consist of at least 100 multiple choice questions, 30% of which will be presented in the form of case studies.

GDPR 61

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

Further to the decision by the Court of Justice (CJEU) Fashion ID case, and confirmed in the DPCs report, third parties that process personal data in cookies via embedding a plugin in another party’s website, can be considered a joint controller in relation to that data. The DPC notes in its report that some controllers failed to consider their controller obligations in relation to third party cookies, which have been confirmed by the CJEU in the Fashion ID case.

GDPR 43

Flattening The Information Landscape with Really Simply Services

ChiefTech

In an interesting whitepaper, Flattening The Information Landscape [PDF], RSSBus explain how their products can help to provide “ Really Simply Services ”: “ …in case you are thinking that RSSBus is nothing more than RSS feed generation, that's definitely not the case.

IT 56

KM Australia this week

ChiefTech

Wood Bagot was also a case study in my recently publised mobile apps report. Incidentally I wrote about mobile KM back in 2005 for IDM magazine in an article titled, In the Know and on the Move. Cross posted from scriptogr.am. I’m at KM Australia for the next few days – you can follow on Twitter, using the #kmaus hashtag. Clearly, knowledge management isn’t dead.

IT 44

KM Australia this week

ChiefTech

Wood Bagot was also a case study in my recently publised mobile apps report. Incidentally I wrote about mobile KM back in 2005 for IDM magazine in an article titled, In the Know and on the Move. I'm at KM Australia for the next few days - you can follow on Twitter, using the #kmaus hashtag. Clearly, knowledge management isn't dead.

IT 40

UNCOVERING VULNERABILITIES IN OPEN SOURCE LIBRARIES

ForAllSecure

In recent articles, ForAllSecure has discussed how we were able to use our next-generation fuzzing solution, Mayhem, to discover previously unknown vulnerabilities in several open source projects, including Netflix DIAL reference , Das U-Boot , and more. Introduction.

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

News articles : Media Cloud. However, Kelly referenced an article recently published in the Journal of Contemporary Archival Studies concerning trauma. Author: Steven Gentry. The speakers consider innovative collections of born-digital materials from both the fringe and mainstream related to current events that contain controversial or sensitive materials.

Starting your first NHS librarian post: top tips

CILIP

Impact studies, usability studies, case studies are all great ways of collecting data and providing good evidence for the impact you?re Just like a decent journal article, you need to back your service with strong evidence to prove you?re ? Hannah Wood (@Librarian1703) is Librarian, Weston Area Health Trust. EVEN months ago, I left Greater Manchester to start a new job down south as a librarian. I hadn?t t yet completed my Master?s