eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Administer questionnaire to pilot group. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

Young Automotive Group Digitizes HR Processes with DocuWare

Document Imaging Report

Young Automotive Group, Layton, UT. Contributed News case study ECM HR Retail“I was on the phone with a new hire instructing how to fill out our digital forms. He pressed the button and the form disappeared.” When I told him I already got the form on my end, he was impressed by how quickly our system works.”. — SharRee Shupe, HR Generalist. DocuWare_CaseStudy_YoungAutomotiveGroup_FINAL_RSD version.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

I also requested that the reports be generated so as to have data aggregated at the connection type level (again, terminology can vary by monitor product - your instruction to the monitor might be to "order" the data by connection type, or to "group" the data by connection type). Size" refers in this case to aggregate in-Db2 CPU cost of SQL statement execution, and that's easy to determine: for a given workload component (a given connection type), find first the average in-Db2 (i.e.,

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if if the article is paywalled, try this link (PDF) provided by NSC Group). Note: I reviewed SharePoint 2013's social features over on the Ripple Effect Group blog. Some interesting adoption facts from NSC Group: Yammer was introduced by an employee who had used it in an another organisation.

IT 42

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). IG projects require tight alignment and coordination amongst these groups. Click here to access the case study in the IGI Community.

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! Zillow Group Inc., Case opinion link courtesy of eDiscovery Assistant. Case Study Cooperation Electronic Discovery Case Law

Learn more about web archiving with Archive-It Advanced Training

Archive-It

Case Studies How Toby Jillian Lohndorf, Web Archivist for Archive-It. There are lots of ongoing training opportunities for web archivists of all experience levels.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Archiving Spontaneous Events Case Studies

Analyze your Web Archives at Scale: The Archives Unleashed Cloud

Archive-It

We’d love to connect with you – whether you’d like to chat about web archives, your experience with AUK, contribute a case study, or join our growing community, there are a number of ways to connect with our team and community: Follow us on Twitter. Join our Slack group.

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

In 2013, a group of sixty people packed into a venue designed for forty in order to see a collection of eighteenth and nineteenth century town records that had just been found in the Westborough Town Clerk’s vault. Case Studies Community Webs

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community

Archive-It

The Forbes Library was one of a few public libraries chosen nationwide for the Community Webs cohort, a group of public libraries organized by the Internet Archive and funded by the Institute of Museum and Library Services to expand web archiving in local history collections.

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library

Archive-It

The Section 108 Study Group recommends collectors give content creators the right to opt out of having their content collected or made publically available. Archiving Spontaneous Events Case Studies Community Webs

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

In this case, why are three heads better than one? We also formed a Discovery Working Group as a collaborative initiative between our institutions. Through this group we implemented the Primo discovery layer and integrated our Archive-It collections into a single-search environment.

DriveTime Automotive Group Selects Square 9? Softworks as Exclusive Enterprise Content Management Partner

Document Imaging Report

June 14, 2018 – Developers of next-generation process automation solutions, Square 9® Softworks, has announced that DriveTime Automotive Group, one of the nation’s leading used car retailer and finance companies, has selected Square 9 as their chosen enterprise content management (ECM) provider for their document management needs. To learn more about DriveTime’s implementation of Square 9’s solutions, visit www.square-9.com/case-studies/globalsearch-auto-loans/.

Comics for Consumer Communication

ChiefTech

Yet, social service agencies looking to provide services to hard-to-reach groups like immigrants, cultural minorities, and the poor have taken pride in innovative outreach methods. In some cases, the comic book format has been used as a way to help people get access to critical legal help. This case study from my time as a Publication Manager at the Legal Services Society (LSS) of British Columbia (BC) could inspire the use of comics outside the development process.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

“The message put out there is that cybercrime is lucrative and exciting, when for most of the people involved it’s absolutely not the case.”

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. A new round of the weekly newsletter arrived! The best news of the week with Security Affairs.

Identifying People by Metadata

Schneier on Security

In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group.

Crooks offer millions to skilled black hats to help them in extortion campaigns

Security Affairs

Cybercrime gangs aim at hiring skilled hackers that can help them in extortion campaign against high-worth individuals, in this case they promise $30,000 per month ($360,000 per year). The Dark Overlord group decided to publish the document because the company contacted law enforcement.

Sales 110

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

The Report also includes 46 case studies from 17 participating organizations from different sectors, geographies and sizes – including two SMEs and a university.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. Also, we are looking for state agency Information Resource Managers and Records Management Officer pairs for a panel to share how they developed the intersections between the two groups and their roles and responsibilities.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

The two media outlets attribute the cyber attack to a China-linked cyber espionage group tracked as Tick (aka Bronze Butler ). “In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.”

e-Records Conference 2018: Call for Presentations

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. The annual e-Records Conference will be held Friday, November 16, 2018.

How to start your career in cyber security

IT Governance

This one-day course: Was designed by the same experts who led the world’s first successful ISO 27001 implementation project; Gives you the opportunity to participate in group discussions and practical exercises, and review case studies; and.

Singapore Updates Its Model Artificial Intelligence Governance Framework

Data Protection Report

Such examples are drawn from a variety of industries – ranging from banking and finance, healthcare to technology and transportation, and are based on different use cases, thereby reinforcing the neutral and flexible nature of the framework. . (2) The Compendium of Use Cases. The Compendium of Use Cases sets out various case studies of organisations which have operationalised the principles from the Model Framework.

Beware the gaps in SharePoint

ChiefTech

His article also contains a link to a SharePoint case study at BSI Group. " See, why bother paying Forrester for analysis when you can just talk to me. ;-) Technorati Tags: Alex Manchester , Melcrum , Internal Comms Hub , SharePoint , MOSS , Forrester , Case Study , BSI GroupAlex Manchester interviewed me the other day for a Melcrum Internal Comms Hub article discussing SharePoint responding to a new report from Forrester.

40

How to become an ISO 27001 lead implementer

IT Governance

You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer.

Risk 61

New report – Designing Mobile Apps: A Roadmap for Businesses

ChiefTech

How to identify user requirements and develop use cases. Case studies and examples of the approaches taken by Alcatel-lucent, Apache Corporations, King & Wood Mallesons, Woods Bagot and Zurich. My new report is now available for pre-order from Ark Group. The report covers: Key concepts about enterprise mobility and mobile apps. The business context (including how mobile apps relate to intranets, training and social business).

40

BRIEFING NOTE: School librarians empower thriving schools

CILIP

This briefing note has been created for Head Teachers, Senior Leaders and Governors by CILIP and the CILIP School Libraries Group. For more information on the campaign and to download case studies illustrating the role of professional librarians in delivering thriving schools, visit [link].

New Functional Schedule for North Carolina State Agencies

The Schedule

Realizing that an increasing share of state agency records are being created and maintained electronically, we attempted to group records with similar functions in “big buckets” in order to facilitate the appropriate disposition of these records that are housed in document management systems.

5 best online cyber security training courses and certifications in 2020

IT Governance

To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without jeopardising your health.

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study. million, the security firm also estimated that the group is netting around $300,000 per month.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. This article summarizes a report published by AIEF on May 30, 2019.

The Architecture of the Archive project

Archives Blogs

For the SRO case study, students were provided with a diverse range of examples of State archives which have unique needs or which may be difficult to access properly without the right kind of infrastructure. Damien Hassan. Wednesday, May 30, 2018 – 13:35. Archives.

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

Hansen, who are also a IntranetPrisen 2010 winner (see this case study (PDF) about their SharePoint project). Scott Corporation (see this case study about their SharePoint project). Weston Solutions, also a winner in the World Wide Intranet Challenge (+ see Newsgator for their case study). Stockland (+ see Newsgator for their case study). (I I think this case study really demonstrates the value of investing up front in the design process.

Digital Workers Thrive with ABBYY and UiPath Partnership

Document Imaging Report

With circa 150,000 insurance claims to process annually, our processes were burdened with poor digitization quality, manual data entry and human errors,” said Greg Booker, Group CIO at RACQ, one of Australia’s largest insurance companies. “By

Advocating for digital preservation through better corporate governance

Preservica

You can find other useful resources and case studies on our Corporate and business archives page. And if you would like to share experiences and learn from other corporate and business archivists then why not join our Linkedin group on digital archiving

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

The context can be either external or internal data with a good example being ‘threat intelligence’ that is used to provide a broader context on the procedures, tactics, and tools of the attack group.