How to Use Gamification in Mobile Apps: A Case Study

IGI

The moment when users first open your app is critical to the app’s success , and you can use gamification as a tool to get a new user through the learning curve. Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

To help with that verification, we 1) turned auto-commit off on the tool being used by the developer who was helping us with the test, and 2) granted SELECT ON T1 to APP1ID. I've been interested in the role and trusted context features of Db2 for z/OS for a long time (I posted a two-part blog entry on the topic back in 2011). Theory is nice, but what about practice?

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

I asked the Db2 admin to use his Db2 performance monitor tool to generate detailed accounting reports (depending on the monitor used, such a report might be titled ACCOUNTING REPORT - LONG or ACCOUNTING SUMMARY - LONG) capturing activity during periods preceding and following the buffer pool changes - same FROM and TO times, same day of the week for both reports (to make the comparison as "apples to apples" as possible).

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

In summary, MR. Kiker pointed out the following lessons learned from the project: Define scope of tool up front – be stingy with data elements. Choose data collection tool carefully – understand its capabilities and limitations.

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

Data Mapping Tools: What Are the Key Differentiators

erwin

The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. Data mapping tools have always been a key asset for any organization looking to leverage data for insights.

Tools 83

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study

ChiefTech

Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: Avenue A | Razorfish Wiki Case Study

ChiefTech

Friday, 14 September 2007 Avenue A | Razorfish Wiki Case Study OK. Now were talking Wiki Case Study. " Technorati tags: Wiki , Enteprise 2.0 , Enterprise Web 2.0 , Portal , Case Study , Avenue A | Razorfish , Mike Gotta at 10:11 PM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge

ChiefTech

Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia. It was published as a chapter within Knowledge Management Tools and Techniques in January 2005. This is the old ChiefTech blog.

This is the old ChiefTech blog.: Bromberg & Sunstein LLP Wiki Case Study

ChiefTech

Friday, 7 September 2007 Bromberg & Sunstein LLP Wiki Case Study I discovered this quite by chance , but its actually a good case study on a law firm turning to wiki technology (in this case its Confluence again! ) When I read the case study I sense that this isnt so much about the success of social software, but more the about the success of the software product itself AND the evolution towards read/write intranets.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Archiving Spontaneous Events Case Studies

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

We also had very limited time available in which to train and familiarize ourselves with web archiving and the tools before the July deadline. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

This is the old ChiefTech blog.: Another Wiki Case Study from Dan Bricklin: Thomson Learning

ChiefTech

Saturday, 10 March 2007 Another Wiki Case Study from Dan Bricklin: Thomson Learning Dan Bricklin has recorded another wiki case study (MP3 podcast), this time with Thomson Learning. Technorati tags: Dan Bricklin , Thomson Learning , Wiki , Enterprise Wiki , Case Study , Twiki at 11:23 AM View blog reactions 1 comments: Anonymoussaid. This is the old ChiefTech blog. Nice of you to drop in and visit.

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

In 2017, our library applied for and received a grant to participate in the Community Webs program, designed to teach public libraries how to use web archiving tools and enable them to curate local history collections. Case Studies Community Webs

Analyze your Web Archives at Scale: The Archives Unleashed Cloud

Archive-It

Wayback browsing and search interfaces work for some applications, but with the rise of the digital humanities, the computational social sciences, and web science more generally, even more analysis tools can help to express archived data in new and enlightening ways. Case Studies How To

Expand the reach of Archive-It collections with these access integrations

Archive-It

Partners have, for instance, designed their own custom portals to web archives that integrate archived web content right into their own websites by using the tools described below. Case Studies How ToBy Jillian Lohndorf, Web Archivist for Archive-It.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

We had been requesting user metrics from Archive-It on a quarterly basis, but with the addition of the Google Analytics feature, we wanted to see what more we could learn about our users and how we could best utilize this tool. Case Studies How To

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. The founding participants developed assessment regimes and tools, all having to do with measuring and assessing, essentially, third-party risks. It was a natural step to expand and evolve these protocols and tools, and to invite companies from other sectors to participate.

Tools 120

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

In this case, why are three heads better than one? The Discovery Working Group does testing, provides feedback, and contributes to ongoing development of the NYARC Discovery search tool interface. by Karl-Rainer Blumenthal.

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. The experts first identify the automated bots then they use the tool to monitor the evolution of the botnets they belong.

Tools 79

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

I want to see where the tools make a real and lasting difference. Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. Remote assistance is another. Augmented reality Virtual reality Data management

This is the old ChiefTech blog.: More on E&Y's approach to KM

ChiefTech

Monday, 4 June 2007 More on E&Y's approach to KM I know there is always interest in Ernst & Young s approach to KM, so I keep my eyes open for new articles and case studies that are available in the public domain - here are two more: InsideKnowledge magazine interviewed Shirely Jackson , a UK-based director in the Ernst & Young Center for Business Knowledge in 2004. This is the old ChiefTech blog. Nice of you to drop in and visit.

Paper 40

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

service model risk blown away - Google and Postini I noticed in this case study about a law firms decision to pick Google Apps for email and collaboration over Microsoft Exchange or IBM Lotus Domino , that they mention Google has acquired a company called Postini (actually back last year ). This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0

ChiefTech

and a number of interesting case studies have appeared. And this is exactly what Barney and his skunkworks team did during 2007, including: A wiki that was initially used to manage information about the different products and suppliers that Santa uses, that then evolved into a tool to track and manage information about different toy laws in the 150+ jurisdictions around the world where Santa delivers care packages. This is the old ChiefTech blog.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 Editing should be easy and accessible and not require special tools. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: The slow death of Enterprise 2.0 on Wikipedia

ChiefTech

aka "Enterprise Social Software") entry in Wikipedia I noticed that, despite the HBS case study, the entry itself isnt actually getting any better. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. Our research tracked several black markets that traded third-party password breaches, as well as 25,000 blackhat tools used for phishing and keylogging.

Malicious PDF Analysis

Security Affairs

” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. Most security tools must always be adapted to this new reality of attack and infection.

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

WikiLeaks obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking techniques, tools, and capabilities. Digging in the huge trove of files, it is possible to find also information about the GHIDRA , a Java-based engineering tool.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. For this reason, a recent AZORult sample has been chosen to field-test the NSA reverse engineering tool.

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group.

Attacking encrypted USB keys the hard(ware) way

Elie

We will demonstrate how this methodology works in practice via a set of case-studies. Armed with this knowledge and our tools, you will be able to evaluate the security of the USB device of your choice Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke?

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. A straightforward and pragmatic guide to leadership, management and teamwork.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. Beyond these risk metrics, we delve into the global reach of the miscreants involved in credential theft and the blackhat tools they rely on.

Web archiving partners meet in 2019

Archive-It

Both events featured program and technology updates from Internet Archive staff, news and case studies from Archive-It partners, and informal time for discussion and working groups. by the Archive-It team.

A Rich Content Strategy Empowered by Chatbots | everteam.chatbot

Everteam

4- Case studies. 1- Define your goals and use case: whether you are developing an informative chatbot or a chatbot that can take orders and make reservations, or both. As previously discussed, Chatbots are a milestone in the marketing sector.

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. They use bagger tools and analyze the email using FTK to identify personal identifiable information. Email Archiving Comes of Age.

How to become an ISO 27001 lead implementer

IT Governance

You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. Tools for taming the digital tiger. We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018.

DocPoint Solutions and QAI Announce 10th Annual User Conference

Document Imaging Report

Scott Swidersky, president QAI and DocPoint, “Each year, we carefully design our conference to bring attendees first-hand knowledge on the latest, most innovative content management trends, tools and technologies in a fun and relaxed environment. Fulton, Md. April 17, 2018 – Konica Minolta companies DocPoint Solutions, Inc. and Quality Associates, Inc. QAI), announce their 10th Annual User Conference.