The Data Breach Case Study & Protection Guide

Record Nations

million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. You can’t convert the trees into money, for example, or coupons.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

His first attempt at successful use of a Db2 role and trusted context didn't work: the SELECT privilege on table T1 was granted to a role but not to authorization ID APP1ID (using the example ID previously referenced), and an attempt to execute SELECT COL1 FROM T1 by way of a trusted context, using ID APP1ID, failed with a Db2 "ID not authorized to perform this action" error code.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

When data in a detailed accounting report is aggregated at the connection type level, you get within the larger report a sub-report for each connection type used in the Db2 for z/OS system of interest; for example: a sub-report showing all CICS-Db2 work in the system, one showing all batch work that uses the call attachment facility, one showing all batch work using the TSO attachment facility, one showing all DDF-related work (connection type: DRDA), etc.

What belongs in a community web archive? New collecting guidelines and examples from Community Webs partners

Archive-It

Even as web archiving becomes more widely practiced, publicly available examples of collection development policies to guide these decisions can be hard to find and adapt for local use. Case Studies Community Webs How Toby Sylvie Rollason-Cass, Web Archivist for Archive-It.

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. The Webinar also features Andrew McAfee, who provides context for the case study.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Evaluate capabilities by use case. Case Studies.

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. As I noted, there are already many real-life examples of its application in other industries such as retail. A table of case study on the use of iBeacon technology at a major theme park.

Disrupting Call Center Fraud With Voice Biometrics

Data Breach Today

Nuance Communications and Royal Bank of Scotland Share a Case Study Jason Costain of the Royal Bank of Scotland and Brett Beranek of Nuance Communications share a real world example of mitigating fraud with voice biometrics in a call center

Yammer case study: Hall & Wilcox, a law firm in Melbourne, Australia

ChiefTech

An example of a really creative launch came to my attention, and I just had to get to know the company that made its own Yammer shirts (and sent me one!), However, Hall & Wilcox is a good case study of the kinds of activities you could be using to help create and maintain momentum if you wanted to do more than simply throwing open the doors to an enterprise social networking platform.

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

Specific thematic examples discussed to illustrate these points with a local context included the University of British Columbia’s B.C. Case Studies Collaborative Collectingby Caron Rollins, Matt Huculak, and Dana McFarland.

Analyze your Web Archives at Scale: The Archives Unleashed Cloud

Archive-It

For example, a PhD candidate at the University of Waterloo, Sarah McTavish, used Archives Unleashed Cloud data from the University of Alberta to explore what a researcher could discover about the Alberta Oil Sands from their “Alberta Oil Sands” collection. Case Studies How To

Expand the reach of Archive-It collections with these access integrations

Archive-It

Princeton Theological Seminary, for example, pulls results from querying the CDX/C API into a faceted display of capture times for seeds in their collections. Case Studies How ToBy Jillian Lohndorf, Web Archivist for Archive-It.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

Once our regular expression was created, it looked something like the following example ^100.100.05.([1-9]|[1-9][0-9]|1([0-9][0-9])|2([0-4][0-9]|5[0-5]))$. For example, because we track referrals, we noticed a large increase of visitors from the U.S. Case Studies How To

Saving Local News on the Web

Archive-It

It also has more long-term relevance, however, as Brownstoner , for example, is one of the few survivors of what was once a thriving local blogosphere in Brooklyn. Case Studies Community Webs

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library

Archive-It

The Section 108 Study Group recommends collectors give content creators the right to opt out of having their content collected or made publically available. Archiving Spontaneous Events Case Studies Community WebsBy Emily Ward, Digital Archivist, East Baton Rouge Parish Library.

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

Social business is more than adding a social layer: A banking example

ChiefTech

afterall, the first case study was about a bank ) and solutions social intranets aren’t really worthwhile or have any impact? For example, another second tier Australian bank is also talking about overhauling their core banking systems.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 A wiki by itself is a useful tool, but you can magnify its use greatly in combination with other features (for example social features, blogs, comments etc).

Free download: A Beginner’s Guide to the DPO

IT Governance

For example, organisations that conduct “regular and systematic monitoring” of data subjects “on a large scale” should have one, but what does that mean? Case study examples of a DPO in action. Do you need a data protection officer?

This is the old ChiefTech blog.: The slow death of Enterprise 2.0 on Wikipedia

ChiefTech

aka "Enterprise Social Software") entry in Wikipedia I noticed that, despite the HBS case study, the entry itself isnt actually getting any better. Unfortunately at the moment the article is less than 500 words (compared for example with the few thousand for KM ) that hardly touch the sides of recent debate on this issue. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

Essential guidance to prevent business continuity disasters

IT Governance

Examples of business continuity disasters include: Fuel crisis; Communications failure; Industrial action; and. Learn how you can avoid making similar mistakes, reduce risks and enable faster recovery when things do go wrong with In Hindsight: A compendium of Business Continuity case studies.

Identifying People by Metadata

Schneier on Security

In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. A straightforward and pragmatic guide to leadership, management and teamwork.

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources).

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. One interesting example is Sinar Mas, a palm oil company in Indonesia.

A Rich Content Strategy Empowered by Chatbots | everteam.chatbot

Everteam

4- Case studies. Fashion retailers and publishers for example are implementing chatbots that can act as their personal shopping assistant to avoid any bottlenecks in their purchase funnel. As previously discussed, Chatbots are a milestone in the marketing sector.

How to start your career in cyber security

IT Governance

Account executives and junior penetration testers, for example, tend to have little work experience, and can learn while on the job. A version of this blog was originally published on 8 December 2017.

Tips 78

Estimating the Cost of Internet Insecurity

Schneier on Security

Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. They then ran a set of case studies to show the model's functionality and to compare the results against those in the existing literature.

Study 73

Who will win the driverless / autonomous car wars?

Information Matters

I’ve been planning some new classes for the fast-approaching semester and have decided to use the example of driverless vehicles to help my students think about what determines which type of companies win when a new technology emerges. Historical case studies ( eg.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. Co-presenters, for example, may be state or local government staff and vendors who collaborated on relevant projects. We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. For example, if you want to be an information security manager, a relevant ISO 27001 qualification is a must.

New report – Designing Mobile Apps: A Roadmap for Businesses

ChiefTech

How to identify user requirements and develop use cases. Case studies and examples of the approaches taken by Alcatel-lucent, Apache Corporations, King & Wood Mallesons, Woods Bagot and Zurich. The report covers: Key concepts about enterprise mobility and mobile apps. The business context (including how mobile apps relate to intranets, training and social business). A roadmap for developing mobile apps.

Interactive: What Does It Really Mean?

The Texas Record

In these cases, people use interactive as a buzzword. Examples of Interactive eLearning. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Here are some examples: Branching scenarios.

DocPoint Solutions and QAI Announce 10th Annual User Conference

Document Imaging Report

We are excited to have Chris Darcy as our keynote speaker to give attendees real-life examples of this year’s conference theme ’Information in Motion.’ ” . The full-day conference will showcase insightful keynote presentations, demos, customer-related case studies, workshops and breakout sessions featuring QAI and DocPoint Solutions subject matter experts, industry thought leaders and other technology professionals. Fulton, Md.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

As propsects move down your funnel, content may include later-stage content such as case studie and webinars. Case studies. If you want to generate leads, you'll want to generate leads, think webinars, demos, case studies and other later-stage content.

B2B 76

Poster boy for Information Governance

InfoGovNuggets

Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. While there have been a lot of information governance-related stories in the news over the past two years, including Equifax and Facebook and VW and Wells Fargo, my nominee for the one name associated with the most significant teaching example in information governance and compliance is the former FBI Director, James Comey.

The Architecture of the Archive project

Archives Blogs

For the SRO case study, students were provided with a diverse range of examples of State archives which have unique needs or which may be difficult to access properly without the right kind of infrastructure. Damien Hassan. Wednesday, May 30, 2018 – 13:35. Archives.

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

This example, therefore, serves to show you the importance of taking cybersecurity seriously since a cyber attack can terribly damage an organization’s reputation and even lower the quality of the service or product it offers.