AI and AI policy top the agenda at CILIP Supplier Forum
CILIP
MARCH 4, 2024
In addition to the 'Developing your AI policy' workshop, case studies were presented from both sides of the sector, an employer and an educator.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
AIIM
SEPTEMBER 7, 2021
How to Avoid/Overcome: Overcome this issue by addressing objections directly with good communication and contextual education. Case studies and examples of peers in other organizations can be powerful techniques. How to Avoid/Overcome: The primary way to get beyond this hurdle is to: communicate, communicate, communicate.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The Texas Record
DECEMBER 12, 2018
The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. Lastly, KPMG educated the RIM Committee members on: What RIM is. This is an important project because it allows everyone to see what records they have and where they are located.
IT Governance
FEBRUARY 14, 2024
But to give you an example, one of our partners, Tela Technology, an IT and telecoms solutions provider, was unable to offer ISO accreditations for its clients – something that could be a dealbreaker for certain clients with specific legal or business requirements. So this year, for example, the PCI DSS v4.0
CILIP
APRIL 30, 2019
This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. Her qualifications include a doctorate in education (on the topic of e-mentoring and women into leadership). Barbara Allan said: ?
ChiefTech
SEPTEMBER 27, 2012
Incidentally, the NSW Department of Education is also a Socialtext customer (see below). Hansen, who are also a IntranetPrisen 2010 winner (see this case study (PDF) about their SharePoint project). Scott Corporation (see this case study about their SharePoint project). Observations.
CILIP
NOVEMBER 8, 2018
Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources).
IBM Big Data Hub
JULY 26, 2023
For example, IBM’s HR function has worked to build the capabilities of its internal AI-driven digital assistant, AskHR, over the past 8 years to answer 2,000 inquiries and automate more than 100 processes. AskHR has recently started pushing nudges to employees preparing for travel, sending weather alerts, and completing other processes.
eDiscovery Daily
NOVEMBER 18, 2019
Case Study: Example of a Hostile 30(b)(6) Witness Presentation. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance.
eDiscovery Daily
OCTOBER 31, 2019
Case Study: Example of a Hostile 30(b)(6) Witness Presentation. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance.
CGI
JULY 19, 2018
The software robots, or “bots,” used in RPA vastly eclipse the utility of more rudimentary forms of automation (for example, scripts or command line utilities). The conference runs from July 22-25, with an agenda full of educational deep dives, intriguing talks and engaging networking social events.
IT Governance
APRIL 11, 2018
It adds: “It will be important, if not essential, to consider the relevant educational foundations, training and professional development opportunities that support the breadth of people with potential to enter the field in order to fill the worker shortage.”. You might also be interested in our Managing Cyber Security Risk Training Course.
CGI
OCTOBER 16, 2018
Showcase case studies, especially local or homegrown examples, sharing successes and failures alike. We found that it is good practice to establish a steady cadence of activities to increase empathy, avoid constant restructuring and promote continuing education. Employ situational leadership?do
The Schedule
MARCH 3, 2021
This presentation will discuss the process of surveying and reviewing these records in situ, provide examples of inventories that are useful for Technical Services staff, and discuss lessons learned as the Records Management program continues collecting university records despite physical restrictions. Jennifer Thompson, J. Paul Getty Trust.
Cyber Info Veritas
JULY 18, 2018
This example, therefore, serves to show you the importance of taking cybersecurity seriously since a cyber attack can terribly damage an organization’s reputation and even lower the quality of the service or product it offers. You can use real-life examples such as account information and credentials of a customer sign-in.
CILIP
NOVEMBER 11, 2019
In 2016, a study into the impact of HMD carried out by Sheffield Hallam University found that 70 per cent of respondents who had taken part in an HMD activity became more aware of the causes and conditions that can lead to genocide. s more, we know that HMD helps us achieve this. Holocaust Memorial Day 2020. Get Involved Guide for Libraries?
Rocket Software
FEBRUARY 3, 2022
While an intermediary in business can sometimes lead to communication breakdowns, Derek Powe, M&T vice president, zPlatform manager says with Rocket, “that wasn’t the case.”. This is both an opportunity and challenge, as firms invest in new hardware optimized for speed and insight, employee education and partnering.
IT Governance
FEBRUARY 7, 2024
The course also features numerous examples and case studies. One of my personal favourite features is the new Colonial Pipeline case study. Ransomware Staff Awareness E-learning Course Educate your staff to be alert and secure. Could you take us through the key changes to the course?
eDiscovery Daily
OCTOBER 20, 2019
Chief legal officers provide a unique perspective, and to analyze that perspective, Relativity and the FTI Technology business unit of FTI Consulting commissioned a study by Ari Kaplan Advisors, surveying general counsel on a wide variety of legal issues affecting business and the legal profession. Matthewman – U.S.
Thales Cloud Protection & Licensing
JANUARY 24, 2024
Read the customer case study from a large leading financial institution. This type of threat poses interesting questions on the design of systems that have long life cycles – for example cars, transport infrastructure, core banking applications, and blockchain applications. No, there are more threats that need to be addressed.
eSecurity Planet
FEBRUARY 16, 2021
This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. Examples of Adware Malware Attacks. While there are hundreds of adware versions, some of the most common examples include Fireball, Appearch, DollarRevenue, Gator, and DeskAd. Examples of Backdoor Malware Attacks.
AIIM
OCTOBER 17, 2019
The CRM consists of five separate 100-question multiple-choice exams and a four-hour written exam consisting of two case studies that demonstrate writing skills and the application of knowledge to solve RIM problems. The ICRM offers 100 practice questions, 20 per exam part, and two case study practice questions for Part 6.
ForAllSecure
MAY 17, 2023
My healthcare is always going to be one again, it's a vertical healthcare and education, both where you have large amounts of very sensitive information, but not necessarily the budgets to secure it effectively. That's an example of AI. I will give you an example. And we're starting to see more and more. China invaded Taiwan.
CILIP
NOVEMBER 7, 2020
Even so, they were busy providing study space for students with nowhere else to work. Case Studies. This is a good example of how the British Council exercises ?soft In a shopping mall, for example, curious shoppers and young families experienced ?library soft power? and influence abroad. library walls? ?
CILIP
JANUARY 24, 2022
For example, we nurture and develop the natural progression in the way people consume content, from data to information to knowledge to learning. We help people understand where knowledge can be found, often, for example, by promoting various community discussions, using a network of champions. focuses on this. The effectiveness of ?what?
eSecurity Planet
APRIL 9, 2024
Conduct a cost-benefit analysis: Do a thorough study of the costs and benefits of compliance in order to make informed decisions consistent with your organization’s strategic goals and objectives. Can the vendor give references or case studies that show effective security deployments in similar organizations?
eDiscovery Daily
JANUARY 28, 2019
In addition to that, today and tomorrow, CloudNine will launch its new NineForum Discovery Education Series where prominent and highly respected eDiscovery and litigation support experts will deliver 9 TED-style talks, 20 minutes each, covering important topics impacting the legal community. Data governance. Challenges and risk (i.e.
CILIP
AUGUST 1, 2018
1 Policy documents, guidelines and case studies of innovative practice add to this plethora. They can include public health content or focus on management topics such as patient experience, clinical risk, staff education, etc. Case study: Tom Roper, Clinical Librarian, Brighton and Sussex Hospitals. t normally ?
Archive-It
JUNE 16, 2022
As an example, we reviewed two different crawls of the City of San Diego’s homepage: a snapshot from September 2007 , and a second snapshot from October 2021. For example, in addition to not working well with screen readers, dynamic visual content is often more challenging to capture and replay. Conclusion.
Collaboration 2.0
JULY 17, 2008
Id like to see details and some examples of how GE is using this Enterprise Collaboration Backbone to continue doing business with the terrorist regime of Iran as well as avoiding its responsibilities to clean up PCBs in the Hudson River and other Superfund sites. Useful-tech-only 11/11/2008 12:16 PM Reply to Flag The article doesnt say.
ForAllSecure
APRIL 11, 2016
For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. For example, when creating a buffer overflow, you should be able to generate 10 different instances to practice on. Case Study: Variable Length Buffers And Canaries. Replayability.
ForAllSecure
APRIL 11, 2016
For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. For example, when creating a buffer overflow, you should be able to generate 10 different instances to practice on. Case Study: Variable Length Buffers And Canaries. Replayability.
ForAllSecure
APRIL 11, 2016
For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. For example, when creating a buffer overflow, you should be able to generate 10 different instances to practice on. CASE STUDY: VARIABLE LENGTH BUFFERS AND CANARIES. Replayability.
eDiscovery Daily
DECEMBER 16, 2019
It’s nice to cover an agreement between parties for a change and this discovery agreement is a good example of parties cooperating effectively on a plan for discovery. So, what do you think? Do you see any issues with this agreement?
KnowBe4
MAY 31, 2023
The next layer in your defense should be a user that's properly educated using security awareness training to easily identify financial fraud and other phishing-based threats, stopping them before they do actual damage. The CSA provides hunting guidance, best practices, examples of the actor's commands, and detection signatures.
Archive-It
JUNE 19, 2018
However, we eventually found an example of a collection development policy that had a mission similar to our own: we decided to adapt portions of the Bentley Historical Library Collection Development Policy for Web Archives as our model in conjunction with the East Baton Rouge Parish Library Collection Development Policy.
The Last Watchdog
MAY 19, 2021
Colonial pipeline is a really good case study for the whole critical infrastructure industry. Not only will it educate and inform the cybersecurity experts regarding the cyberattacks. The federal government should be an example of what good cyber security practices are, it should serve as a role model for the private sector.
CILIP
SEPTEMBER 10, 2018
For example, a German public library offers plain language library tours aimed at refugees. This is mainly to do with the large numbers of Syrian refugees who fled to these countries. I learned about the many projects and services that librarians have initiated, organised and developed.
Barclay T Blair
JUNE 22, 2015
For example, our next big event, InfoGovCon15 is inexpensive ($400 or less for 2.5 I love that this forum gave me a chance to meet my peers and be educated! in each case, higher than 4 out of 5). For example, participants rated the speakers at 4.45, the registration process 4.6, Vicki Lee Clewes. Our Speakers.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content