Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. by the City CIO’s presentation of a text archiving plan. The text archiving plan presented at that December committee meeting, to me, risked committing some of the same mistake.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tyco International case study - replacing your intranet with Yammer


Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 76

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. At this point, the presentation transitions to the planning and execution of the data mapping project, conducted by KPMG. PDF of Presentation.

Google Apps-based intranet: Ahold case study


Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. Thanks to Entopic, I can now point you to a case study presented by James Nunn at their Congress Intranet 2013 conference about Ahold. But again as other case studies have shown, this hasn't stopped Ahold from getting on with the job of using the Google stack to run its intranet.


IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].


Tod Chernikoff, #InfoGov18 Speaker Interview Series

IG Guru

We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. Featured ICRM InfoGovCon Information Governance Record Retention Records Management case study change management IBM records and information management Tod Chernikoff

IT 67

A case study on the use of iBeacon technology at a major theme park


A case study on the use of iBeacon technology at a major theme park. A table of case study on the use of iBeacon technology at a major theme park. narmada.devarajan. Wed, 12/10/2014 - 02:05.

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. The COBOL program existed already in the form of a CICS transaction, and as CICS has advanced capabilities regarding interaction with Java applications, Edward wanted to assess the options available for invoking the COBOL program in its present, CICS transactional form. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge


Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

Paper 44

Request for Enterprise 2.0 Case Studies: Present Your Environment in Boston

Collaboration 2.0

The Open Enterprise 2009 study, which I am conducting with Stowe Boyd, will be a snapshot of the state of Enterprise 2.0 A major component of this research, which we will be presenting at the Enterprise 2.0 adoption mid 2009. Conference in Boston USA on June 23, will be how modern collaborative technologies are actually working


Opening the House Foreign Affairs Committee web archive


Royce’s decision to preserve the digital past provides an important baseline from which to measure our collective political present and future. Case Studiesby Mark G. Bilby, Senior Assistant Librarian, California State University, Fullerton.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive


But because the scope and contents of the collection were articulated, it did allow for us to present a coherent final project and product. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners


Provincial Candidates 2017 collection, an outcome of a collaboration started at BC Gov Info Day 2017 at Simon Fraser University, Burnaby, and a case of using–or trying to use–online political party resources to build comprehensive seed lists. Case Studies Collaborative Collecting

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. If you are interested in presenting or being a panelist, please complete the online form, Presentation Proposal Submission Form. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions.

Collecting for continuity and for change: The web archiving experience in Westborough


We certainly don’t want to discard or neglect these collections of our past, but we also need to reinvigorate them by connecting them to new collections from the present. History should help us connect our present lives to the continuity, or discontinuity, of our past.

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community


Case Studies Collaborative Collecting Community Websby Dylan Gaffney, Forbes Library.

Saving Local News on the Web


I began the event with a presentation providing a broad overview of web archiving and the importance of web preservation, especially with regards to local news sources. Case Studies Community Webs

Describing web archives: Learning from Archive-It partners and friends


In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack.

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017


Case Studies in IG. November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI.


This is the old ChiefTech blog.: More on E&Y's approach to KM


Monday, 4 June 2007 More on E&Y's approach to KM I know there is always interest in Ernst & Young s approach to KM, so I keep my eyes open for new articles and case studies that are available in the public domain - here are two more: InsideKnowledge magazine interviewed Shirely Jackson , a UK-based director in the Ernst & Young Center for Business Knowledge in 2004. The presentation that goes with it is in english so it might give you a few clues too.

Paper 40

Manufacturing 4.0? Industry 4.0? It’s all digital manufacturing to me

OpenText Information Management

This three-day event was full of presentations, case studies and discussions on the journey to Manufacturing 4.0. I recently attended the Manufacturers Leadership Summit hosted by Frost & Sullivan in LA.

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

The platform was presented at the RSA Conference in San Francisco on Tuesday by Rob Joyce, former head of the NSA’s elite hacking team and now White House cybersecurity coordinator, Joyce has presented the code-analysis suite, he remarked the absence of backdoors.

Attacking encrypted USB keys the hard(ware) way


In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies. Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke?

Essential guidance to prevent business continuity disasters

IT Governance

Knowing what threats your organisation is facing and which of those could present a risk to its survival is vital. A range of internal and external risks could negatively impact your organisation and interfere with the normal running of your business.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials


In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9

Estimating the Cost of Internet Insecurity

Schneier on Security

Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. They then ran a set of case studies to show the model's functionality and to compare the results against those in the existing literature.

Risk 105

Connect with Perficient at #Kscope18

Perficient Data & Analytics

We have a great session at this year’s conference, where you can hear Nandini Nehru, Solutions Architect at Perficient, and Janet Kloves, Assoc, Director, Finance, Financial Planning & Analysis at The University of Texas MD Anderson Cancer Center (MDACC) present on driver-based rolling forecasts.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Introduction. One of the most expected moments in the infosec community during the last few months was, with no doubt, the Ghidra public release.

CCPA and the future of the health data economy


These new data privacy rules – covering the previous gaps – present an opportunity for healthcare industry organizations to enhance the trust within their data relationships.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

After a word from each of the hosting agencies executive directors, Mark Smith and Stacey Napier, the presentations kicked off with learning often happening simultaneously in two conference rooms thanks to numerous breakout sessions throughout the day.

e-Records 2019: Registration Open!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. Registration for the 2019 e-Records Conference is now open to state agencies and local governments. Visit the conference website to register and read about the exciting lineup and exhibitors.

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. Avian flu currently presents the greatest threat.

Risk 77

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Be sure to visit the conference website to read about this year’s exciting presentations and exhibitors. Better Together in a Digital World: Security and Retention. TSLAC @TexasDIR. Reminder to register now and save $30! Early bird registration is only $70.

CCPA and the future of the health data economy


These new data privacy rules – covering the previous gaps – present an opportunity for healthcare industry organizations to enhance the trust within their data relationships.

e-Records Conference 2018: Registration Open!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. e-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference. Visit the conference website to REGISTER and to read more about the exciting lineup and exhibitors.

New guide to improving library services using key library assessment methodologies


Putting Library Assessment Data to Work takes common sources of data that academic libraries will already be collecting, and presents simple qualitative and quantitative techniques that can be used to evaluate and assess their services, both in detail and overall.

The Certified Information Professional (CIP) vs the Certified Records Manager (CRM): 7 Differences You Should Know


The CRM consists of five separate 100-question multiple-choice exams and a four-hour written exam consisting of two case studies that demonstrate writing skills and the application of knowledge to solve RIM problems. The ICRM offers 100 practice questions, 20 per exam part, and two case study practice questions for Part 6. A CIP study guide is free to all members of AIIM and available for $60 to non-members.