How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. Welcome to RIM Month! I have been promising/threatening my fellow Steering Committee members to write this post for a while now.

KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Those privileges are not available to the person who used the application's credentials to connect to the Db2 system from a laptop PC because the laptop's IP address is not one of the two specified in the definition of the trusted context (those being the addresses of the two application servers on which the application runs). The client address we saw was the one used in the definition of the trusted context, so why didn't the trusted context work for us?

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! Case opinion link courtesy of eDiscovery Assistant. The post Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law appeared first on CloudNine.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. So, a CICS-based solution satisfying the application requirement was definitely available to the organization with which Andrew was working. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

Saving Local News on the Web

Archive-It

One of the goals of Endangered Data Week is to “explore the power dynamics of data creation, sharing, and retention,” and we definitely addressed those questions in our discussion. Case Studies Community Webs

The Science of Artificial General Intelligence

Perficient Data & Analytics

Although there are multiple definitions in the context of dualism, I am going to focus on mind-body relationship since it directly relates to AI. Take the case study of AI playing Go and defeating Lee Sedol vs AI getting trained on Chess.

IT 65

How to become an ISO 27001 lead implementer

IT Governance

You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer.

Risk 71

Interactive: What Does It Really Mean?

The Texas Record

In terms of eLearning, I think “meaningful” is the key part that’s missing from that definition. In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition.

IT 83

Data Mapping Tools: What Are the Key Differentiators

erwin

Those organizations investing in data mapping tools with compliance as the main driver will definitely want to consider this opportunity and have it influence their decision as to which data mapping tool to adopt.

GDPR 84

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. This article summarizes a report published by AIEF on May 30, 2019.

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. Email Archiving Comes of Age.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

Now that we have a clear definition of what public relations is, let's move on to content marketing. As propsects move down your funnel, content may include later-stage content such as case studie and webinars. Case studies.

B2B 80

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a webcast ) and ALSP – Not Just Your Daddy’s LPO. Is there a standard, either statutory or in case law to help us with this determination? Most case studies I have seen emphasize speed or accuracy and don’t even mention cost.

Observations from the Enterprise 2.0 Conference

ChiefTech

conferences have suffered from a lack of end-user case studies, but that didn't seem to be the case this year. The number of case studies is increasing. You definitely have to answer the WIFM question at an individual, group and organisational level. A few of the reports from the Enterprise 2.0 Conference this week included some interesting observations. From NetworkWorld : Past Enterprise 2.0

IT 52

Flattening The Information Landscape with Really Simply Services

ChiefTech

In an interesting whitepaper, Flattening The Information Landscape [PDF], RSSBus explain how their products can help to provide “ Really Simply Services ”: “ …in case you are thinking that RSSBus is nothing more than RSS feed generation, that's definitely not the case.

IT 56

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

Until such time [as] the NAIC can evaluate any distinction in the text of the SEC proposal between a “best interest” recommendation and investment adviser fiduciary duties, and the SEC and FINRA have finalized relevant terms, definitions and related requirements, the NAIC would opt to refrain from using the phrase ‘best interest’ in Section 6A(1) of the proposed modifications to the Suitability in Annuity Transactions Model Regulation (#275).”.

Paper 65

Compete To Death, or Cooperate to Compete?

John Battelle's Searchblog

So far, the answer is a definitive NO. ( image ) In today’s business climate, it’s not normal for corporations to cooperate with each other when it comes to sharing core assets. In fact, it’s rather unusual.

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

A definite repeat for next year! In one area we could have done better, but I knew that would be the case going in and will explain why. in each case, higher than 4 out of 5).

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

In this case we will consider the "outside network" to be public online services and the Internet. In fact, the breadth of possible use cases and skills required for a successful intranet project was recognised early on - David Strom writing in Forbes advised: If you are about to begin your first Intranet project, you need to gather together people of diverse skills: computer geeks, artists, diplomats, and negotiators.

Download IGI’s Whitepaper: GDPR Myths & Misconceptions

IGI

Although it is impossible to definitively answer some questions about the GDPR until authorities begin to enforce the law, there is little uncertainty about its most important provisions and what organizations must do to prepare and comply. Sign up here to join the IGI Community to access our extensive library of IG research and tools including our Annual Report, whitepapers, case studies, infographics, and more.

A short history of intranets and what next with social, mobile and cloud

ChiefTech

In this case we will consider the "outside network" to be public online services and the Internet. In fact, the breadth of possible use cases and skills required for a successful intranet project was recognised early on - David Strom writing in Forbes advised: If you are about to begin your first Intranet project, you need to gather together people of diverse skills: computer geeks, artists, diplomats, and negotiators.

This is the old ChiefTech blog.: Social software in organisations: Nature or nurture?

ChiefTech

If you have counter experience or cases please let me know as it would surprise me to find them. Wikipedia s definition of ease of use is this: " Ease of use refers to the property of a product or thing that a user can operate without having to overcome a steep learning curve. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.