Remove archives
Remove Case Study Remove Communications Remove IT Remove Security
article thumbnail

The Power of the Record

Brandeis Records Manager

The “record” of survival equates with a sense of security among the most dangerous conditions. Each year, we have excellent conferences–ARMA, AIIM, MER–I’ve attended them all multiple times, and they can be counted on for great sessions, engaging vendor floors, insights, leading edge case studies, keynote inspiration, and collegiality.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Users have created over 50,000 communities with over 100,000 experts signed up to answer questions and manage information; experts are GE workers with full-time jobs who use the system because it helps them do their job better.

Paper 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tokyo 2020: when a sprint turned into a marathon

CILIP

And, from a blank sheet of paper, a safe and secure way found of hosting the world?s Its intention is to secure greater solidarity, further digitalisation, increased sustainability, strengthened credibility and a reinforced focus on the role of sport in society. s biggest sporting event during a pandemic. All the plans redrawn.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? He was indicted on charges of stealing millions of academic articles and journals from a digital archive at MIT. Is hacking a crime? I used to hack the phone company quite a bit.

IT 52