How to Use Gamification in Mobile Apps: A Case Study


Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world. The moment when users first open your app is critical to the app’s success , and you can use gamification as a tool to get a new user through the learning curve.

IT 52

Take your web archives to go with these Archive-It APIs and integrations


Archive-It is a platform that brings together different tools that have been developed to acquire, store, preserve, and share primary source material from the World Wide Web — a kind of “one stop shop” for web archiving tech. What happens next is up to your imagination.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

His team had made some changes to the buffer pool configuration in their production Db2 environment (the overall size of the buffer pool configuration was increased to reduce read I/O activity , and greater use was made of large real storage page frames ), and they were not sure as to how the performance impact of these changes could be measured. Why do I like for data in a detailed accounting report to be aggregated in this way? That's something to think about.

What belongs in a community web archive? New collecting guidelines and examples from Community Webs partners


With the sheer vastness of resources available, how does a community-based program decide what is most important and necessary to collect for the future? Others with discrete goals found it easier to write wholly new policy documents specific to the format.

Analyze your Web Archives at Scale: The Archives Unleashed Cloud


Do you have great collections, but wish you had more and different ways to explore them? Archive-It provides a fantastic service to curate, collect, and preserve content from the Web. You can watch the full video above to learn the complete process. To get started visit: [link].

Expand the reach of Archive-It collections with these access integrations


Archive-It partners can enable direct access to their captures, collection descriptions, and other related metadata beyond the default portal of, customizing where and how patrons find and explore their web archives. Not sure what your options are, or where to start?

Young Automotive Group Digitizes HR Processes with DocuWare

Document Imaging Report

“I was on the phone with a new hire instructing how to fill out our digital forms. When I told him I already got the form on my end, he was impressed by how quickly our system works.”. Contributed News case study ECM HR RetailHe pressed the button and the form disappeared.” — SharRee Shupe, HR Generalist. Young Automotive Group, Layton, UT. DocuWare_CaseStudy_YoungAutomotiveGroup_FINAL_RSD version.

A case study on the use of iBeacon technology at a major theme park


A case study on the use of iBeacon technology at a major theme park. CGI, in fact, has used it to enhance park management and the customer experience for one of the largest theme parks in Northern Europe. Are you ready to try this technology?

Describing web archives: Learning from Archive-It partners and friends


Partners, collaborators, and peers gathered this week for Describing Web Archives , the latest in Archive-It’s Advanced Training series of webinars , and the second (with Access to Archive-It Collections ) to invite web archivists to take the lead in demonstrating their approaches to access and discovery. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

How to become an ISO 27001 lead implementer

IT Governance

If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer. Anyone interested in the position will need to pass the ISO27001 Certified ISMS Lead Implementer (CIS LI) exam. What you need to know.

Risk 71

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. As with most industries, you’re much more likely to get ahead in cyber security if you have experience. Study.

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners


Our goal was to raise awareness about web archiving, how it works, who can be involved, and the special importance of collaborative efforts when building community-based thematic collections. . Wildfires 2017 to which several universities contributed seeds, and UVic’s B.C.

Collecting for continuity and for change: The web archiving experience in Westborough


In 2013, a group of sixty people packed into a venue designed for forty in order to see a collection of eighteenth and nineteenth century town records that had just been found in the Westborough Town Clerk’s vault. We launched to facilitate access to digital resources.

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community


In my first sit down with a fellow staff member to talk about the prospects for a web archive, we brainstormed how we could more completely capture the digital record of today’s community. My colleague Heather whispered to me excitedly: “We could make it weird!”

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library


We simply had not begun to deal with born-digital content but we knew we needed to start and quickly, and this is when our relationship with Archive-it began. I knew however, this system was not sustainable or compatible with the type of collecting we hoped to do in the future.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

When you boil it down, there's a lot to be said for teamwork. According to these individuals, you should either have PR or content marketing -- not both. Let's take a closer look at PR and content marketing, and examine how both play an important role in your overall B2B strategy.

B2B 79

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides.

Comics for Consumer Communication


The rising popularity of the comic as an internal communication device for designers has increased our ability to engage our stakeholders as we build interfaces. Yet, social service agencies looking to provide services to hard-to-reach groups like immigrants, cultural minorities, and the poor have taken pride in innovative outreach methods. In some cases, the comic book format has been used as a way to help people get access to critical legal help.

Fragmented Data, 1 Source of Truth: Why to Use Datorama [Webinar]

Perficient Data & Analytics

Want to connect all of your marketing data in one place in real-time? Attribute revenue directly to campaigns? Eric Dukart, practice director at Perficient, will explain how it puts a single source of truth at your fingertips. Real-world case studies, including a quick demo.

Free download: A Beginner’s Guide to the DPO

IT Governance

Since the GDPR (General Data Protection Regulation) came into effect in May 2018, many organisations are asking whether they’re supposed to have a DPO (data protection officer), but sometimes the answer isn’t that simple. Case study examples of a DPO in action.


NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

Digging in the huge trove of files, it is possible to find also information about the GHIDRA , a Java-based engineering tool. Early March, the NSA has released the suite Ghidra that could be used to find vulnerabilities and security holes in applications.

Attacking encrypted USB keys the hard(ware) way


If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies.

RFID Global to sponsor Airline Baggage Tracking session at RFID Journal Live!

RFID Global Solution, Inc.

The workshop will be free for all airline executives who wish to attend. As the team that implemented Delta Airline’s baggage tracking program, we are proud to sponsor this session and look forward to sharing our experiences and lessons learned. In addition, the session will feature a case study by Brandon Woodruff, Senior Analyst at Delta Air Lines, the first major airline to track baggage worldwide. The RFID Journal LIVE!


Top 10 Analytics Sessions at 2019 Oracle OpenWorld

Perficient Data & Analytics

There are so many great analytics sessions it was hard to whittle it down to just 10. Here is the link to the Oracle OpenWorld session catalog where you can see all the sessions and make your own calendar: [link]. OAC connector to Snowflake).

Book reviews: a call to arms for open licensing


Book reviews: a call to arms for open licensing. ? THIS book is a passionate call to arms for open licensing. The editors argue that this should be no different when collection items move from the analogue world to the digital. to CILIP members. ? ?

How Secure Are Bitcoin Wallets, Really?

Security Affairs

So, the companies behind those wallets wisely emphasize why their products are more secure than what competitors offer and why that’s the case. So, that’s undoubtedly comforting to people who raise their eyebrows at the prospect of using a digital method to store their cryptocurrency investments. If a person owns collector coins, it’s essential to learn how to protect them from potential sources of damage — such as temperature extremes, acids and humidity.

New report – Designing Mobile Apps: A Roadmap for Businesses


The business context (including how mobile apps relate to intranets, training and social business). How to identify user requirements and develop use cases. Case studies and examples of the approaches taken by Alcatel-lucent, Apache Corporations, King & Wood Mallesons, Woods Bagot and Zurich. The report covers: Key concepts about enterprise mobility and mobile apps.


Successful Information Governance when the Bosses Just Don't Care


How can you move your organization's information governance program forward in the absence of management support or interest? There are two ways to approach this. Option 1: Try To Get Your Bosses to Care. What we'd suggest here is to get very specific about the value of effective information governance from a couple of different perspectives. You can determine these figures and compare them to industry benchmarks to get an idea of potential savings.

New guide to improving library services using key library assessment methodologies


Facet Publishing announces the publication of Putting Library Assessment Data to Work by Selena Killick and Frankie Wilson. But what do we mean by library assessment and how can it be used to improve the library service?

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

Blockchain is often defined as ledgers with entries organized in an append-only, sequential chain using cryptographic links and distributed out and stored on a peer-to-peer computer network. The issues related to “Blockchain and Defensible Disposition” are discussed in Chapter 5.

OpenText Showcases how Intelligence, Integration and Automation Drive Innovation in Content Services at AIIM Conference 2019

Document Imaging Report

By connecting content to the digital business, OpenText Content Services accelerate productivity, improve governance and facilitate transformation through off-cloud and cloud deployments. Our deployment of EIM as a service, flexible industry-relevant apps, and compelling microservices and APIs are leading an industry-wide transformation in how customers seize the value of their information.”. Named as a Leader in Gartner Magic Quadrant for Content Services Platforms* .

e-Records Conference: Price Increase on October 26!

The Texas Record

Reminder to register now and save $25 on your registration fee! After October 26 , price will increase to $90, if space is still available. Be sure to visit the conference website to read more about the exciting lineup and this year’s exhibitors. It’s all about tackling tough challenges to manage those electronic records. We had so many great sessions submitted this year that we have five breakout sessions to bring you more content and options than ever before!

Privacy and Cybersecurity May 2019 Events

HL Chronicle of Data Protection

Bret Cohen will speak on the Privacy Bar Section Forum panels, “Working Across Borders: Partnering and Vetting,” and “Case Study: How Working Across Borders Worked for Me,” during the 2019 IAPP Global Summit. Bret Cohen , Lillian Hardy , Paul Otto , and Nathan Salminen will discuss types of hacks and how to mitigate risk in the webinar, “Hacking 101: How it works and how to mitigate risk.”

4 ways ISO 27001 can enhance your business

IT Governance

Implementing an ISMS helps organisations manage their security practices, as well as helping to monitor, audit and improve their information security. In the UK, the number of organisations certified to the Standard increased by 20% in 2016 , bringing the total to more than 33,000.

Sales 58

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor. But the truth of the matter is, companies of all sizes and in all sectors remain acutely vulnerable to attack vectors laid open by third-party contractors. And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. Third-party cyber risks are likely to persist at the current scale for a while longer.

Risk 121

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001. Although ISO 27001 is the more well-known standard – and the one that organisations certify to – neither can be considered in isolation. This blog explains why that’s the case, helping you understand how each standard works and the differences between them. You can certify to ISO 27001 but not to ISO 27002.

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

This example, therefore, serves to show you the importance of taking cybersecurity seriously since a cyber attack can terribly damage an organization’s reputation and even lower the quality of the service or product it offers.

Spotlight: Photographs Documenting the Civilian Conservation Corps (CCC)

Unwritten Record

However, the CCC quickly proved to be a popular program, especially among those that benefited – specifically unmarried, unemployed men between the ages of 18 and 25 (that age range would later be expanded to 17 through 28), as well as their families.

What did you do for European Cyber Security Month?

IT Governance

The campaign may be drawing to a close, but there is still plenty you can do to boost your awareness of cyber security risks. Let’s take a look at some of the biggest lessons we’ve learned in the past month, and what you can do to stay secure at home and in the workplace.