Remove Case Study Remove Education Remove Events Remove How To
article thumbnail

The libraries and K&IM skillset of the future

CILIP

The forum was a unique opportunity for both groups to hear from each other on the skills that librarians and information managers will need in the future, and the opportunity it brings to libraries to take the lead in policy and education around AI. The day was made possible with sponsorship from CB Resourcing and WF Education.

article thumbnail

Is the federal government ready for robotic process automation?

CGI

While it may not seem like much on the surface, the software robot brings three pivotal capabilities: Orchestration —RPA solutions come with a dashboard to manage your robotic workforce and queue automated workflows based on a schedule or event trigger. CGI will present a case study of RPA on the second day of the event.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

How to Choose a Security Certification. If you are going to study the subject anyway, you might as well get a certification out of it.”. Also read: How to Get Started in a Cybersecurity Career. Those who pursue an in-depth technical education in all areas of information security are the target audience for the GSE certification.”

article thumbnail

Creating and nourishing a DevOps culture: key takeaways for agencies

CGI

Digital transformation is forcing a rethinking of business process simplification, data science is taking on a new importance with a push for data-driven insights, and federal CIOs are learning how to wield new authorities effectively to meet the accompanying new levels of accountability. Employ situational leadership?do Add new comment.

article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

Mark your calendars for April 7th, 2021 1pm-3pm EST. Outline of Event: 7 wonderful presenters working in records management, with 7 minute lightning round presentations (see below!). A case study in creating a Getty retention compliant electronic file naming system for Procurement. Jennifer Thompson, J. Paul Getty Trust.

article thumbnail

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

This means that the security initiatives that should be put in place must focus on how to decrease the time it takes to realize, contain and remediate suspicious activity on the information system. In my experience, it is also important to remember that C-suite executives respond well to case studies.

article thumbnail

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

In addition to that, CloudNine conducted a great new NineForum Discovery Education Series where prominent and highly respected eDiscovery and litigation support experts delivered 9 TED-style talks, 20 minutes each, covering important topics impacting the legal community. Discuss legal hold capabilities.