KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. Edward's chief concerns were locking and data integrity (locking, of course, is a mechanism for preserving data integrity). In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without jeopardising your health. Let’s take a look at five of the best online courses for cyber security.

Yammer case study: Hall & Wilcox, a law firm in Melbourne, Australia


However, Hall & Wilcox is a good case study of the kinds of activities you could be using to help create and maintain momentum if you wanted to do more than simply throwing open the doors to an enterprise social networking platform. The other common factor here of course is Pete Williams, who you many have noticed acts as the idea virus in many of Yammer's Australian success stories.

IT 49

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


The first step was to go through some of the many professional sources available, such as Google’s Analytics Academy Courses , and the articles The Suitability of Web Analytics Key by Jody Condit Fagan and Evaluating Information Seeking and Use in the Changing Virtual world: the Emerging Role of Google Analytics by D.J. Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S.

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0


and a number of interesting case studies have appeared. Of course it wasnt all jolly to begin with. " Technorati tags: Web 2.0 , Enterprise Web 2.0 , Enterprise 2.0 , Case Study , Christmas , Santa Claus , Father Christmas , Funny at 10:43 AM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. This is the old ChiefTech blog. Nice of you to drop in and visit.

RMS Section Meeting: teasers!

The Schedule

Cultural heritage organizations like libraries, archives, and museums create, use, manage, and share records every day in the course of daily operations. In this case study, the author explores the university archivist’s role in identifying opportunities for collaboration with academic campus museums; in the identification and management of records with permanent value to the museum and/or archival value; and in policymaking

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials


In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

New book tackles the challenges of discovery in the (post-Google) era


Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. s suitability for course use, Adrienne Muir said, ?There

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately. The course is led by real-world ISO 27001 practitioners who show you how to tackle an ISMS project from start to finish.

Risk 62

How to start your career in cyber security

IT Governance

Of course, any prior experience is a massive advantage, despite the skills gap. And, of course, there’s our own blog , which helps you stay up to date with the latest cyber security news and advice. We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO27001 Certified ISMS Foundation Training Course. A version of this blog was originally published on 8 December 2017.

The Certified Information Professional (CIP) vs the Certified Records Manager (CRM): 7 Differences You Should Know


The CRM consists of five separate 100-question multiple-choice exams and a four-hour written exam consisting of two case studies that demonstrate writing skills and the application of knowledge to solve RIM problems. The ICRM offers 100 practice questions, 20 per exam part, and two case study practice questions for Part 6. A CIP study guide is free to all members of AIIM and available for $60 to non-members.

Higher learning


Maybe the ex-Dean can be the subject of a case study in the Ethics curriculum. Or a Compliance course, if the school has one. Sometimes, I select stories just for the headline I can write over it. “Temple Is Probed Over Online MBA Marketing,” The Wall Street Journal , July 26, 2018 B5. University accused of deceptive marketing to prospective MBA students. What is the lesson here? School may have tweaked some test data to improve the school’s ranking.

This is the old ChiefTech blog.: Planning for an Enterprise RSS Day of Action


Of course, thats never going to happen! This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO 27001 Certified ISMS Foundation Training Course. This one-day course is delivered by an experienced information security practitioner, and combines formal training, practical exercises and relevant case studies.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC). Given the topic of the conference, many of the presentations centered around information governance and implementation whether in the cloud, SharePoint, or through successful case studies.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

We know how Vladmir Putin, Xi Jinping and Kim Jung-un would answer: “Of course!”. In this case it’s an encryption key. Venafi: Cambridge Analytica is just an amazing case study of what can happen when machines can actually pull all this information together, and the massive power of that. Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today?

Connect with Perficient at #Kscope18

Perficient Data & Analytics

Perficient’s Oracle consultants are certified to deliver the official Oracle course curriculum to customers via onsite training classes. Case Study: Implementing a One-of-a-Kind Driver-based Rolling Forecast Model at MD Anderson Cancer Center Using Hyperion Planning with ASO Integration. If you’re not able to attend the event, but would like to learn more about the MDACC case study, please reach out to us.

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

” This decision is a case study, both companies are facing an unprecedented court case. Of course, this situation will not have a simple resolution, even if Zurich has found a way to avoid paying the policy, it will be obliged to prove the attribution of the attack to Russia. The case, lodged in Illinois court (2018-L-011008) is being watched keenly as a result. .

Destroying Barriers to Destruction


While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey. The Guide also includes a number of relevant case studies. The authors stress that ILM programs differ from organization to organization, therefore the decision to adopt a course of action must be taken in regards to your own situation.

Poster boy for Information Governance


Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. Senior employees treat documents prepared by them in the course of business as their personal information. Certainly an argument for an Information Governance case study of just the Clinton email investigation and its aftermath.

Join Our Sessions at MuleSoft CONNECT 2018

Perficient Data & Analytics

The conference is complete with deep-dive sessions, hands-on training courses, and keynote speakers who will further educate and inspire developers, engineers, architects, and technical decision makers alike! Attendees will hear about Ameren’s own experiences and use case studies. Today kicks off MuleSoft CONNECT 2018 – a conference that is centered on helping attendees learn to design, build, and manage integrations and APIs like experts.

Successful Information Governance when the Bosses Just Don't Care


We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. In all cases, case studies and stories can really help make the case. Certainly, on the risk side, you hope to never have a case study from your own organization - but if you do, it's hard to find one more relevant because you know what happened, you know the costs to recover, you know all the outcomes.

Interactive: What Does It Really Mean?

Association eLearning

If the learner needs to click something in an eLearning course some places will call that interactive. Making courses like that is quick and easy, because they don’t take much work. In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Reading a case study and using it to come to conclusions.

IT 55

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

This blog explains why that’s the case, helping you understand how each standard works and the differences between them. You can find out more about how to implement a best-practice ISMS by enrolling on our ISO27001 Certified ISMS Foundation Training Course. This one-day course provides a comprehensive introduction to the key elements required to comply with ISO 27001.

Austin Signal: The Program

John Battelle's Searchblog

was going to go meta? ), but I prepare quite a bit in any case. And of course, nothing's more "local" than feet on the street, literally, who touch customers in store and in their homes. After another Ignite, we'll hear a case study from Levi's, and a unique POV on B2B from Spiceworks.

B2B 71

4 ways ISO 27001 can enhance your business

IT Governance

If you want to learn how to plan, implement and maintain an ISO 27001-compliant ISMS, you should enrol on our ISO27001 Certified ISMS Lead Implementer course. Developed by IT Governance’s founders, Alan Calder and Steve Watkins, this fully accredited, practitioner-led course shows you how to successfully execute your compliance project. Find out more about our ISO27001 Certified ISMS Lead Implementer course >> ISO 27001

Sales 41

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

Case studies where DApps have been successfully deployed. In just 10 years the case law around eDiscovery AI & Analytics has exploded. Survey the key case law governing the application of machine learning to eDiscovery.

Wolters Kluwer swaps a static intranet for an enterprise social network


In this case study global information services and publishing company, Wolters Kluwer group, made a deliberate decision to replace their intranet with Yammer. While there are clearly signs of bottom-up adoption in this example, this is an interesting case of a company not just accepting the existence of a shadow social collaboration system but instead fully embracing it. You can read the full case study on SlideShare

IT 58

Preservica, IRMS and ARA digital preservation training a great success!


Over the course of 2015/16 the Preservica team has been pairing up with the Information and Records Management Society (IRMS) and ARA (UK) to deliver a series of practical workshops and webinars on digital preservation. More importantly, we received some very positive feedback from attendees of the sessions, and were delighted to hear them speak of an “instructive, useful and fun” course that was “well designed to provide confidence and some great tips for the future”.

Top 10 Analytics Sessions at 2019 Oracle OpenWorld

Perficient Data & Analytics

Chart Your Course with Oracle Analytics On-Premise (THT6476), Tues Sept 17, 1:00 pm – some companies are not ready to move to the cloud or don’t plan to move to the cloud. Your Analytics Guide: Perficient OAC Implementation Case Study (CON6394), Tues, Sept 17, 4:15 pm – Ok yes this is my speaking session (at least I put it as #10!).

Why the cyber security skills gap is so damaging

IT Governance

In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. For example, if you’re interested in the way you can use hacking skills for good, you might want enrol on our Certified Ethical Hacker (CEH) Training Course. Our course is led by an information security consultant with over ten years’ experience. You might also be interested in our Managing Cyber Security Risk Training Course.

Risk 42

The Architecture of the Archive project

Archives Blogs

Intrigued by the type of records held in the State Archives Collection, and the challenges in storing, preserving and making accessible our State’s official archives, UWA Lecturer Mark Sawyer suggested using the SRO as a “case study” and to have his first year architecture students develop proposed designs for a new SRO Search Room. This type of architectural modelling is a key requirement for architecture students as part of their course work. Damien Hassan.

Why we need long-term thinking for long-term records


As records management professionals, we’re still fighting the thorny issue of getting people to pay attention in the normal course of business operations to records that need care and protection. Records and information governance practitioners play a vital role in easing this tension, creating dialogues and use cases to move people from a blinkered short term focus. The other side of the coin of course is compliance and risk mitigation.

Welcome to Legaltech New York 2019!: eDiscovery Trends

eDiscovery Daily

During this session, practitioners will learn where, when and how they can identify, contain, interrogate and disclose relevant data for optimal representation through the course of an investigation. Case studies with best practices, ROI benefits and efficiencies achieved. Today is the start of Legaltech® New York (LTNY), and, for the ninth(!) year in a row, eDiscovery Daily is here to report about the latest eDiscovery trends being discussed at the show.

Starting your first NHS librarian post: top tips


Of course, being new at the whole ?being Impact studies, usability studies, case studies are all great ways of collecting data and providing good evidence for the impact you?re also crop up a lot; try and book yourself onto courses, or read up about these terms. ? Hannah Wood (@Librarian1703) is Librarian, Weston Area Health Trust. EVEN months ago, I left Greater Manchester to start a new job down south as a librarian. I hadn?t t yet completed my Master?s

The Friday Signal: Will Apple Flash Us, or Not?

John Battelle's Searchblog

However, a site called 9to5Mac studied the iPad introduction video, and found that Flash must be working on the device, because it's used on the nyt.com, which was featured in the demo: The iPad has Adobe's Flash on Apple's video. This of course is important to marketers, as Flash is pretty much an industry standard for rich advertising. Social Media Marketing: How Pepsi Got It Right (Mashable) I love case studies. Online, of course, will grow far faster.

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Of course, we will have a booth in the exhibit hall (booth #310), but that’s not all. The panel will share case studies covering the lifecycle of an AI solution, from assessing contractual risk issues to upstream/downstream customization of the tools to developing internal champions who will ensure adoption. OK, everybody gets hung up on Legalweek vs. Legaltech®. Technically, Legaltech is part of Legalweek and it starts in earnest on Tuesday. So, what’s happening this year?

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

And of course, we’re all fully staffed, right? These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). In one case, we had an oversized vendor truck get stuck between a building, a ledge, and a tree for about twenty-five minutes. George Despres, University Records Manager, Brandeis University.

How many people does it take to implement an information management project?


And of course beyond the core project group there were a number of stakeholder groups that provided input into the project. The whole initiative elapsed over a year, with the first six months spent on just developing the strategy and business case before product selection. Technorati Tags: project management , information management , case studiesThis is neither a joke or a trick question!

IT 40