article thumbnail

Survey reports skills in technology and Digital Preservation will be most desired in the next five years

Preservica

Ithaka S+R recently published a report based on findings from A*CENSUS II Archives Administrators Survey , which gathered data from 746 of the most senior archives leaders and decision-makers.

article thumbnail

[Podcast] Tips and Advice for Legacy Replacement

AIIM

Yet, according to AIIM research , the decade-old SharePoint Server 2010 is still running for 40% of the SharePoint users we surveyed. Also, on this episode , an AIIM member case study featuring Freeport LNG and Shinydocs. Click here to access our full library of episodes. Want more episodes like this?

Libraries 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UNCOVERING VULNERABILITIES IN OPEN SOURCE LIBRARIES

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. When tasked with analyzing a specific project, it’s often worthwhile to survey the codebase and its dependencies. What Makes a Good Target? What to Target?

article thumbnail

New book tackles the challenges of discovery in the (post-Google) era

CILIP

Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. New book tackles the challenges of discovery in the (post-Google) era. What might the future of discovery look like?

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. When tasked with analyzing a specific project, it’s often worthwhile to survey the codebase and its dependencies. What Makes a Good Target? What to Target?

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. When tasked with analyzing a specific project, it’s often worthwhile to survey the codebase and its dependencies. What Makes a Good Target? What to Target?