article thumbnail

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. If we represent the hazards as shark tanks on all sides, I am currently on dry land, but bloody and scratched and missing some chunks. So: Learn from my mistakes! Don’t go charging in without considering the ramifications!

article thumbnail

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Those privileges are not available to the person who used the application's credentials to connect to the Db2 system from a laptop PC because the laptop's IP address is not one of the two specified in the definition of the trusted context (those being the addresses of the two application servers on which the application runs).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Document Retention & Destruction Policy Guide

Docuware

Table of Contents Definition of a document retention policy Why should your company create these policies? Before you start How to create a retention policy Adapting a game plan to your industry Document management case study Managing retention policies with DocuWare Downloadable Retention Policy Template FAQs

article thumbnail

KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

And anyone who reads this site knows that my definition of a truly successful "publication" is one that has a voice and point of view which draws a community together. In fact, it's rather a case study of what NOT to do if you have a product so good, people actually do work to tell you more about themselves. What a novelty!

article thumbnail

How to Manage Information - Growing Your Own Success

AIIM

There are lots of call-outs with key terms, definitions, and even five additional pages you can access for tons of free resources, solution providers, best practices, and more. Explore free resources, solution providers, case studies and more from this domain. Creating, Capturing, and Sharing Information (Planting the Seed).

ROT 161
article thumbnail

UK ICO Publishes New Report on Neurotechnology and Warns of “Real Danger” of  Discrimination

Hunton Privacy

The ICO is in the process of developing guidance on the topic, which will, among other things, consider the interpretation of core legislative and technical neurotechnology definitions, link to existing ICO guidance where appropriate, and provide case studies.

Risk 55
article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. So, a CICS-based solution satisfying the application requirement was definitely available to the organization with which Andrew was working. Everyone chimed in with their thoughts on the matter, and in this blog entry I'll synthesize and summarize that information.

Mining 48