Remove Case Study Remove Education Remove Examples Remove How To
article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

How to Avoid Information Governance Pitfalls. We'll explore why these challenges occur, how to avoid or overcome them, and actions you can take now to get started. How to Avoid/Overcome: Overcome this issue by addressing objections directly with good communication and contextual education. Lack of Stakeholder Support.

article thumbnail

AI and AI policy top the agenda at CILIP Supplier Forum

CILIP

In addition to the 'Developing your AI policy' workshop, case studies were presented from both sides of the sector, an employer and an educator.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources). This book is both accessible and comprehensive.

article thumbnail

Is the federal government ready for robotic process automation?

CGI

The software robots, or “bots,” used in RPA vastly eclipse the utility of more rudimentary forms of automation (for example, scripts or command line utilities). The conference runs from July 22-25, with an agenda full of educational deep dives, intriguing talks and engaging networking social events.

article thumbnail

Creating and nourishing a DevOps culture: key takeaways for agencies

CGI

Digital transformation is forcing a rethinking of business process simplification, data science is taking on a new importance with a push for data-driven insights, and federal CIOs are learning how to wield new authorities effectively to meet the accompanying new levels of accountability. and DevOps is an effective method to make that happen.

article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

This presentation will discuss the process of surveying and reviewing these records in situ, provide examples of inventories that are useful for Technical Services staff, and discuss lessons learned as the Records Management program continues collecting university records despite physical restrictions. Jennifer Thompson, J. Paul Getty Trust.

article thumbnail

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

This example, therefore, serves to show you the importance of taking cybersecurity seriously since a cyber attack can terribly damage an organization’s reputation and even lower the quality of the service or product it offers. You can use real-life examples such as account information and credentials of a customer sign-in.