Remove Case Study Remove Definition Remove IT Remove Libraries
article thumbnail

Taking on new roles - Let's Roll: tabletop games in the library

CILIP

Beth Montague-Hellen, the new Head of Library and Information Services at the Francis Crick Institute, asks how big changes like this can be achieved without the help of a crisis. The latest book from Facet looks at how tabletop roleplaying games can be incorporated into school libraries.

article thumbnail

The Future of RegTech for AI Governance

IBM Big Data Hub

These RegTech solutions will operate as part of a wider AI governance process and should be integrated as components of broader AI governance mechanisms that can include non-tech components such as an advisory board, use case reviews, and feedback mechanisms [10]. Case studies on OpenPages: Using RegTech for AI governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections. million records.

article thumbnail

The stack: An introduction to the WARC file

Archive-It

A capture from one of the first ARC files created by an Archive-It partner, the South Dakota State Archives and State Library. by Karl-Rainer Blumenthal, Web Archivist for Archive-It. Want to know more about a tool in our web archiving toolbox? Your suggestions or questions for future posts about Archive-It technology are very welcome here.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Well, unlike large organizations, small to medium businesses lack the full accompaniment of network defenses. So they’re often unprepared when a nation state APT choses to focus on them. A lot of SMBs do not have security operations centers or SOCs. I’ve spoken about this before, about managed service providers or MSPs.

article thumbnail

For safekeeping: An automated preservation workflow for Archive-It content

Archive-It

by Adriane Hanson, Head of Digital Stewardship, University of Georgia Libraries. In this blog post, I’ll describe the University of Georgia Libraries’ almost entirely automated workflow for preserving a copy of our Archive-It content locally. We’ve used it successfully in production since July 2020. Archive-It APIs.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

While this case study is just a snapshot, vigilance in the app store is required. Malware, short for “malicious software,” is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the early days of computing, a wide range of malware types with varying functions have emerged.

Phishing 105