Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. by the City CIO’s presentation of a text archiving plan. The text archiving plan presented at that December committee meeting, to me, risked committing some of the same mistake.

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. At this point, the presentation transitions to the planning and execution of the data mapping project, conducted by KPMG. PDF of Presentation.

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

e-Records 2019 Call for Presentations

The Texas Record

The one-day conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. Requested Presentation Formats.

Google Apps-based intranet: Ahold case study

ChiefTech

Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. Thanks to Entopic, I can now point you to a case study presented by James Nunn at their Congress Intranet 2013 conference about Ahold. But again as other case studies have shown, this hasn't stopped Ahold from getting on with the job of using the Google stack to run its intranet.

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. The COBOL program existed already in the form of a CICS transaction, and as CICS has advanced capabilities regarding interaction with Java applications, Edward wanted to assess the options available for invoking the COBOL program in its present, CICS transactional form. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. A table of case study on the use of iBeacon technology at a major theme park. narmada.devarajan. Wed, 12/10/2014 - 02:05.

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records.

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge

ChiefTech

Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

But because the scope and contents of the collection were articulated, it did allow for us to present a coherent final project and product. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack.

Request for Enterprise 2.0 Case Studies: Present Your Environment in Boston

Collaboration 2.0

The Open Enterprise 2009 study, which I am conducting with Stowe Boyd, will be a snapshot of the state of Enterprise 2.0 A major component of this research, which we will be presenting at the Enterprise 2.0 adoption mid 2009. Conference in Boston USA on June 23, will be how modern collaborative technologies are actually working

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

Provincial Candidates 2017 collection, an outcome of a collaboration started at BC Gov Info Day 2017 at Simon Fraser University, Burnaby, and a case of using–or trying to use–online political party resources to build comprehensive seed lists. Case Studies Collaborative Collecting

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

We certainly don’t want to discard or neglect these collections of our past, but we also need to reinvigorate them by connecting them to new collections from the present. History should help us connect our present lives to the continuity, or discontinuity, of our past.

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community

Archive-It

Case Studies Collaborative Collecting Community Websby Dylan Gaffney, Forbes Library.

Saving Local News on the Web

Archive-It

I began the event with a presentation providing a broad overview of web archiving and the importance of web preservation, especially with regards to local news sources. Case Studies Community Webs

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. If you are interested in presenting or being a panelist, please complete the online form, Presentation Proposal Submission Form. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions.

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017

IGI

Case Studies in IG. November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI.

This is the old ChiefTech blog.: More on E&Y's approach to KM

ChiefTech

Monday, 4 June 2007 More on E&Y's approach to KM I know there is always interest in Ernst & Young s approach to KM, so I keep my eyes open for new articles and case studies that are available in the public domain - here are two more: InsideKnowledge magazine interviewed Shirely Jackson , a UK-based director in the Ernst & Young Center for Business Knowledge in 2004. The presentation that goes with it is in english so it might give you a few clues too.

Paper 40

Manufacturing 4.0? Industry 4.0? It’s all digital manufacturing to me

OpenText Information Management

This three-day event was full of presentations, case studies and discussions on the journey to Manufacturing 4.0. I recently attended the Manufacturers Leadership Summit hosted by Frost & Sullivan in LA.

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

The platform was presented at the RSA Conference in San Francisco on Tuesday by Rob Joyce, former head of the NSA’s elite hacking team and now White House cybersecurity coordinator, Joyce has presented the code-analysis suite, he remarked the absence of backdoors.

Essential guidance to prevent business continuity disasters

IT Governance

Knowing what threats your organisation is facing and which of those could present a risk to its survival is vital. A range of internal and external risks could negatively impact your organisation and interfere with the normal running of your business.

New guide to improving library services using key library assessment methodologies

CILIP

Putting Library Assessment Data to Work takes common sources of data that academic libraries will already be collecting, and presents simple qualitative and quantitative techniques that can be used to evaluate and assess their services, both in detail and overall.

Attacking encrypted USB keys the hard(ware) way

Elie

In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies. Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke?

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Introduction. One of the most expected moments in the infosec community during the last few months was, with no doubt, the Ghidra public release.

Connect with Perficient at #Kscope18

Perficient Data & Analytics

We have a great session at this year’s conference, where you can hear Nandini Nehru, Solutions Architect at Perficient, and Janet Kloves, Assoc, Director, Finance, Financial Planning & Analysis at The University of Texas MD Anderson Cancer Center (MDACC) present on driver-based rolling forecasts.

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. In his presentation, Wong told the story about how managers would have to share data using WhatsApp or via paper before they added Domo.

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. Avian flu currently presents the greatest threat.

A Rich Content Strategy Empowered by Chatbots | everteam.chatbot

Everteam

4- Case studies. 1- Define your goals and use case: whether you are developing an informative chatbot or a chatbot that can take orders and make reservations, or both. As previously discussed, Chatbots are a milestone in the marketing sector.

How to start your career in cyber security

IT Governance

There are tons of events across the UK each year , where you can listen to keynote presentations, take part in roundtables and workshops, and network. A version of this blog was originally published on 8 December 2017.

Tips 78

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

After a word from each of the hosting agencies executive directors, Mark Smith and Stacey Napier, the presentations kicked off with learning often happening simultaneously in two conference rooms thanks to numerous breakout sessions throughout the day.

Estimating the Cost of Internet Insecurity

Schneier on Security

Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. They then ran a set of case studies to show the model's functionality and to compare the results against those in the existing literature.

Study 73

OpenText Showcases how Intelligence, Integration and Automation Drive Innovation in Content Services at AIIM Conference 2019

Document Imaging Report

OpenText will be jointly presenting with leaders from Pacific Life to discuss how secure, cloud-based information management help to transform their business. . Riley McIntosh of Pacific Life and Alison Clarke from OpenText will present a case study on how to build a strong information management framework on March 27 at 10:15 am. Named as a Leader in Gartner Magic Quadrant for Content Services Platforms* .

Intro to Analytics in Oracle IoT Cloud Service [Webinar]

Perficient Data & Analytics

On August 7, my colleague Mazen Manasseh will be presenting on the Road to Oracle Cloud from OBIEE and BI Apps. Additionally, my colleague Nandini Nehru will be presenting a “Case Study” webinar on August 14 covering the Implementation of a One-of-a-Kind Driver-Based Rolling Forecast Model at MD Anderson Cancer Center Using Hyperion Planning with ASO.

e-Records Conference 2018: Registration Open!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. e-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference. Visit the conference website to REGISTER and to read more about the exciting lineup and exhibitors.

Oracle Planning: Driver-based Rolling Forecast at #Kscope18

Perficient Data & Analytics

KSCOPE18 Session: Case Study: Implementing one of its kind driver based rolling forecast model at MD Anderson Cancer Center using Hyperion Planning with ASO integration. Presenter: Nandini Nehru, Perficient. Co-Presenter: Janet Kloves, University of Texas MD Anderson Cancer Center. Rolling forecasts in healthcare are challenging because Key Performance Indicators (KPIs) are unique to each organization and market conditions are ever changing.