KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. Edward's chief concerns were locking and data integrity (locking, of course, is a mechanism for preserving data integrity). In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Yammer case study: Hall & Wilcox, a law firm in Melbourne, Australia


However, Hall & Wilcox is a good case study of the kinds of activities you could be using to help create and maintain momentum if you wanted to do more than simply throwing open the doors to an enterprise social networking platform. The other common factor here of course is Pete Williams, who you many have noticed acts as the idea virus in many of Yammer's Australian success stories.

IT 49

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S. Government Publishing Office (GPO).

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0


and a number of interesting case studies have appeared. Of course it wasnt all jolly to begin with. " Technorati tags: Web 2.0 , Enterprise Web 2.0 , Enterprise 2.0 , Case Study , Christmas , Santa Claus , Father Christmas , Funny at 10:43 AM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: The slow death of Enterprise 2.0 on Wikipedia


aka "Enterprise Social Software") entry in Wikipedia I noticed that, despite the HBS case study, the entry itself isnt actually getting any better. The real shame here is that in Wikipedia is of course quite able to keep up with the debate, but clearly people have to be interested enough in the subject matter. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately. The course is led by real-world ISO 27001 practitioners who show you how to tackle an ISMS project from start to finish.

Risk 71

How to start your career in cyber security

IT Governance

Of course, any prior experience is a massive advantage, despite the skills gap. And, of course, there’s our own blog , which helps you stay up to date with the latest cyber security news and advice. A version of this blog was originally published on 8 December 2017.

The Certified Information Professional (CIP) vs the Certified Records Manager (CRM): 7 Differences You Should Know


The CRM consists of five separate 100-question multiple-choice exams and a four-hour written exam consisting of two case studies that demonstrate writing skills and the application of knowledge to solve RIM problems. The ICRM offers 100 practice questions, 20 per exam part, and two case study practice questions for Part 6. A CIP study guide is free to all members of AIIM and available for $60 to non-members.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. Find out more about our ISO 27001 Certified ISMS Foundation Training Course >> Cyber Security ISO 27001 ISO 27001 training

Connect with Perficient at #Kscope18

Perficient Data & Analytics

Perficient’s Oracle consultants are certified to deliver the official Oracle course curriculum to customers via onsite training classes. Case Study: Implementing a One-of-a-Kind Driver-based Rolling Forecast Model at MD Anderson Cancer Center Using Hyperion Planning with ASO Integration.

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

” This decision is a case study, both companies are facing an unprecedented court case. The case, lodged in Illinois court (2018-L-011008) is being watched keenly as a result. .

Higher learning


Maybe the ex-Dean can be the subject of a case study in the Ethics curriculum. Or a Compliance course, if the school has one. Sometimes, I select stories just for the headline I can write over it. “Temple Is Probed Over Online MBA Marketing,” The Wall Street Journal , July 26, 2018 B5. University accused of deceptive marketing to prospective MBA students. What is the lesson here? School may have tweaked some test data to improve the school’s ranking.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

We know how Vladmir Putin, Xi Jinping and Kim Jung-un would answer: “Of course!”. In this case it’s an encryption key. Venafi: Cambridge Analytica is just an amazing case study of what can happen when machines can actually pull all this information together, and the massive power of that. Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today?

This is the old ChiefTech blog.: Planning for an Enterprise RSS Day of Action


Of course, thats never going to happen! This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC).

Interactive: What Does It Really Mean?

The Texas Record

If the learner needs to click something in an eLearning course some places will call that interactive. Making courses like that is quick and easy, because they don’t take much work. In these cases, people use interactive as a buzzword.

IT 83

Destroying Barriers to Destruction


While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey. The Guide also includes a number of relevant case studies. The authors stress that ILM programs differ from organization to organization, therefore the decision to adopt a course of action must be taken in regards to your own situation.

Successful Information Governance when the Bosses Just Don't Care


We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. In all cases, case studies and stories can really help make the case. Certainly, on the risk side, you hope to never have a case study from your own organization - but if you do, it's hard to find one more relevant because you know what happened, you know the costs to recover, you know all the outcomes.

Poster boy for Information Governance


Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. Senior employees treat documents prepared by them in the course of business as their personal information. Certainly an argument for an Information Governance case study of just the Clinton email investigation and its aftermath.

Join Our Sessions at MuleSoft CONNECT 2018

Perficient Data & Analytics

The conference is complete with deep-dive sessions, hands-on training courses, and keynote speakers who will further educate and inspire developers, engineers, architects, and technical decision makers alike! Attendees will hear about Ameren’s own experiences and use case studies. Today kicks off MuleSoft CONNECT 2018 – a conference that is centered on helping attendees learn to design, build, and manage integrations and APIs like experts.

Top 10 Analytics Sessions at 2019 Oracle OpenWorld

Perficient Data & Analytics

Chart Your Course with Oracle Analytics On-Premise (THT6476), Tues Sept 17, 1:00 pm – some companies are not ready to move to the cloud or don’t plan to move to the cloud.

4 ways ISO 27001 can enhance your business

IT Governance

If you want to learn how to plan, implement and maintain an ISO 27001-compliant ISMS, you should enrol on our ISO27001 Certified ISMS Lead Implementer course. Find out more about our ISO27001 Certified ISMS Lead Implementer course >> ISO 27001

Sales 58

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

This blog explains why that’s the case, helping you understand how each standard works and the differences between them. You can find out more about how to implement a best-practice ISMS by enrolling on our ISO27001 Certified ISMS Foundation Training Course. This one-day course provides a comprehensive introduction to the key elements required to comply with ISO 27001.

Why the cyber security skills gap is so damaging

IT Governance

In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. For example, if you’re interested in the way you can use hacking skills for good, you might want enrol on our Certified Ethical Hacker (CEH) Training Course.

Risk 59

Austin Signal: The Program

John Battelle's Searchblog

was going to go meta? ), but I prepare quite a bit in any case. And of course, nothing's more "local" than feet on the street, literally, who touch customers in store and in their homes. After another Ignite, we'll hear a case study from Levi's, and a unique POV on B2B from Spiceworks.

B2B 75

Wolters Kluwer swaps a static intranet for an enterprise social network


In this case study global information services and publishing company, Wolters Kluwer group, made a deliberate decision to replace their intranet with Yammer. While there are clearly signs of bottom-up adoption in this example, this is an interesting case of a company not just accepting the existence of a shadow social collaboration system but instead fully embracing it. You can read the full case study on SlideShare

IT 58

The Architecture of the Archive project

Archives Blogs

This type of architectural modelling is a key requirement for architecture students as part of their course work. Damien Hassan. Wednesday, May 30, 2018 – 13:35. Archives.

Welcome to Legaltech New York 2019!: eDiscovery Trends

eDiscovery Daily

During this session, practitioners will learn where, when and how they can identify, contain, interrogate and disclose relevant data for optimal representation through the course of an investigation. Case studies with best practices, ROI benefits and efficiencies achieved.

Starting your first NHS librarian post: top tips


Of course, being new at the whole ?being Impact studies, usability studies, case studies are all great ways of collecting data and providing good evidence for the impact you?re also crop up a lot; try and book yourself onto courses, or read up about these terms.

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Of course, we will have a booth in the exhibit hall (booth #310), but that’s not all. OK, everybody gets hung up on Legalweek vs. Legaltech®. Technically, Legaltech is part of Legalweek and it starts in earnest on Tuesday. So, what’s happening this year? Let’s take a look.

The Friday Signal: Will Apple Flash Us, or Not?

John Battelle's Searchblog

However, a site called 9to5Mac studied the iPad introduction video, and found that Flash must be working on the device, because it's used on the nyt.com, which was featured in the demo: The iPad has Adobe's Flash on Apple's video. This of course is important to marketers, as Flash is pretty much an industry standard for rich advertising. Social Media Marketing: How Pepsi Got It Right (Mashable) I love case studies. Online, of course, will grow far faster.

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

And of course, we’re all fully staffed, right? These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). In one case, we had an oversized vendor truck get stuck between a building, a ledge, and a tree for about twenty-five minutes. George Despres, University Records Manager, Brandeis University.

How many people does it take to implement an information management project?


And of course beyond the core project group there were a number of stakeholder groups that provided input into the project. The whole initiative elapsed over a year, with the first six months spent on just developing the strategy and business case before product selection. Technorati Tags: project management , information management , case studiesThis is neither a joke or a trick question!

IT 40

Compete To Death, or Cooperate to Compete?

John Battelle's Searchblog

Of course I started Federated Media to participate in that model, and now FM has as large a revenue run rate as the Industry Standard, across a far more diverse market.

Reflecting on Enterprise 2.0 for Information Professionals


Of course, those that have experienced Web 2.0 The Ernst & Young Facebook case study also raised some interesting issues about online identity if you are asked to represent your organisation online - there is a real need for the employer to ensure the employee understands how to protect their privacy in the Web 2.0 Last week I attended the second day of Key Forum's Enterprise 2.0

Philology from Philadelphia

Positively RIM

The mock case study showed at least some of Redmond’s expanded RIM functionality Cloud computing vendors provided second-level saturation, proclaiming the advantages of their tools while trying to assuage buyers’ fears The show’s small footprint allowed a thorough viewing with minimal loss of shoe leather EMC, HP and Oracle presented credible displays. Of course, SharePoint has been the basis for many of these applications and more.

ECM 40

Press Release: Headshift appoints James Dellow and ramps up Enterprise 2.0 capabilities


They have a wide range of both internationally and local case studies that highlight how the power of social software can add quantifiable value, said Dellow. James Dellow’s blog can be found at [link] You read more about Headshift on their Website of course and if you want to contact me, while I do have a new Headshift email address, don't worry as my old contact details still work.

ChiefTech: Observations from the Enterprise 2.0 Executive Forum - collaboration, innovation and conversation


and Managers have been operating under the false assumption – “ you never had control! &# I also enjoyed the local case studies, which is of course in part what the forum was all about: Melbourne-based KM’er Andrew Mitchell talked about his experiences of using social media tools at Urbis – blogging didn’t work so well (this was all the experience of others) and they had more success with wikis. This is the old ChiefTech blog.

This is the old ChiefTech blog.: Enterprise Web 2.0 inside CSC


In July one of these experiments was integrated into CSC s global portal infrastructure as part what we are calling our Collaboration Portal Center : " The Collaboration Portal Center boasts a wide-open experimental Collaboration Wiki; videos; podcasts (well only one to start); Yahoo Pipes, Blog, and RSS mash-up; comment areas following many content pages; documented solutions and case studies; a Global Google Maps mash-up; and RSS feeds on several portions of the content.