Remove Case Study Remove Examples Remove Metadata Remove Security
article thumbnail

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

Your IG program should help your organization understand the value of the information you have and put processes and procedures in place to not only store this information securely but also provide access when and where required. Case studies and examples of peers in other organizations can be powerful techniques.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing Your Infrastructure for LAW & Explore eDiscovery

eDiscovery Daily

Examples would be “people, technology, and process” or “team, leadership, and mission”, or, my favorite, “price, speed, and quality”. Real-life case study: About 8 years ago, we were working with a client that had a few virtual machines and a few physical machines. How your processing engine gets metadata to you matters.

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

Secure & compliant, fast, portable, standardized if necessary, high quality. For example the databases, virtualization technologies, data access services, storage and middleware capabilities. Oracle is an example of a DaaS Provider - empowering businesses and public sector organizations (i.e.