How to Use Gamification in Mobile Apps: A Case Study


The moment when users first open your app is critical to the app’s success , and you can use gamification as a tool to get a new user through the learning curve. I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world.

IT 40

Tyco International case study - replacing your intranet with Yammer


Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 76

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

In summary, MR. Kiker pointed out the following lessons learned from the project: Define scope of tool up front – be stingy with data elements. Choose data collection tool carefully – understand its capabilities and limitations. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

To help with that verification, we 1) turned auto-commit off on the tool being used by the developer who was helping us with the test, and 2) granted SELECT ON T1 to APP1ID. I've been interested in the role and trusted context features of Db2 for z/OS for a long time (I posted a two-part blog entry on the topic back in 2011). Theory is nice, but what about practice?

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

I asked the Db2 admin to use his Db2 performance monitor tool to generate detailed accounting reports (depending on the monitor used, such a report might be titled ACCOUNTING REPORT - LONG or ACCOUNTING SUMMARY - LONG) capturing activity during periods preceding and following the buffer pool changes - same FROM and TO times, same day of the week for both reports (to make the comparison as "apples to apples" as possible).

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study


Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: Avenue A | Razorfish Wiki Case Study


Friday, 14 September 2007 Avenue A | Razorfish Wiki Case Study OK. Now were talking Wiki Case Study. " Technorati tags: Wiki , Enteprise 2.0 , Enterprise Web 2.0 , Portal , Case Study , Avenue A | Razorfish , Mike Gotta at 10:11 PM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. This is the old ChiefTech blog. Nice of you to drop in and visit.

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred


Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge


Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia. It was published as a chapter within Knowledge Management Tools and Techniques in January 2005. This is the old ChiefTech blog.

Paper 44

This is the old ChiefTech blog.: Bromberg & Sunstein LLP Wiki Case Study


Friday, 7 September 2007 Bromberg & Sunstein LLP Wiki Case Study I discovered this quite by chance , but its actually a good case study on a law firm turning to wiki technology (in this case its Confluence again! ) When I read the case study I sense that this isnt so much about the success of social software, but more the about the success of the software product itself AND the evolution towards read/write intranets.

This is the old ChiefTech blog.: Another Wiki Case Study from Dan Bricklin: Thomson Learning


Saturday, 10 March 2007 Another Wiki Case Study from Dan Bricklin: Thomson Learning Dan Bricklin has recorded another wiki case study (MP3 podcast), this time with Thomson Learning. Technorati tags: Dan Bricklin , Thomson Learning , Wiki , Enterprise Wiki , Case Study , Twiki at 11:23 AM View blog reactions 1 comments: Anonymoussaid. This is the old ChiefTech blog. Nice of you to drop in and visit.

Data Mapping Tools: What Are the Key Differentiators


The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. Data mapping tools have always been a key asset for any organization looking to leverage data for insights. Data mapping tools are paramount in charting a path to compliance for said new, near-global standard and avoiding the hefty fines. analysis) are now adopting data mapping tools with compliance in mind.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada


Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Archiving Spontaneous Events Case Studies

Learn more about web archiving with Archive-It Advanced Training


The series also includes regular updates on altogether new tools and tech. For in-depth introductions and demonstrations of how to use them, see the training webinars on the “Brozzler” capture tool and the open APIs available for digital preservation and developers. Case Studies How Toby Jillian Lohndorf, Web Archivist for Archive-It. There are lots of ongoing training opportunities for web archivists of all experience levels.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive


We also had very limited time available in which to train and familiarize ourselves with web archiving and the tools before the July deadline. We hope that through this project we will bring other Mexican institutions and institutions from Latin America into these web archiving conversations and communities so that we may enrich our discussions and the social and technical possibilities of our tools. Case Studies

Analyze your Web Archives at Scale: The Archives Unleashed Cloud


Wayback browsing and search interfaces work for some applications, but with the rise of the digital humanities, the computational social sciences, and web science more generally, even more analysis tools can help to express archived data in new and enlightening ways. Case Studies How To

Take your web archives to go with these Archive-It APIs and integrations


Archive-It is a platform that brings together different tools that have been developed to acquire, store, preserve, and share primary source material from the World Wide Web — a kind of “one stop shop” for web archiving tech. To read a high level summary of each, review example use cases, and find detailed documentation and instructions for implementation, start here: Archive-It APIs and integrations. Use cases continue to drive development in this space, though!

Expand the reach of Archive-It collections with these access integrations


Partners have, for instance, designed their own custom portals to web archives that integrate archived web content right into their own websites by using the tools described below. Case Studies How ToBy Jillian Lohndorf, Web Archivist for Archive-It.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. The founding participants developed assessment regimes and tools, all having to do with measuring and assessing, essentially, third-party risks. It was a natural step to expand and evolve these protocols and tools, and to invite companies from other sectors to participate.

Risk 120

Collecting for continuity and for change: The web archiving experience in Westborough


In 2017, our library applied for and received a grant to participate in the Community Webs program, designed to teach public libraries how to use web archiving tools and enable them to curate local history collections. Case Studies Community WebsBy Anthony Vaver, Local History Librarian and Archivist, Westborough Public Library.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


We had been requesting user metrics from Archive-It on a quarterly basis, but with the addition of the Google Analytics feature, we wanted to see what more we could learn about our users and how we could best utilize this tool. We also used the free tool on AnalyticsMarket called IP Range Regular Expression Builder , built an IP range filter (Image 3), and confirmed the validity of the “IP Range Regular Expression Builder.” Case Studies How To

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. The experts first identify the automated bots then they use the tool to monitor the evolution of the botnets they belong.

New book showcases visual literacy as a tool for reader development


New book showcases visual literacy as a tool for reader development. Facet Publishing announces the publication of Seeing Sense: Visual literacy as a tool for libraries, learning and reader development by Jake Hope. A key tool for navigating digital devices, there is often an antipathy surrounding visual literacy borne out of stigma and at times, intimidation.

From local to global, NYARC’s networks bring art history to the web archive


In this case, why are three heads better than one? NYARC’s Archive-It collections are devoted to our institutional websites, NYARC’s own website and project sites, art-rich websites of significance to the study of art and art history, artists’ websites, auction house sites and their embedded catalogs, catalogue raisonnés, sites of NYC galleries and art dealers, and sites dedicated to restitution efforts and provenance of artworks that may be lost, stolen, or looted.

This is the old ChiefTech blog.: More on E&Y's approach to KM


Monday, 4 June 2007 More on E&Y's approach to KM I know there is always interest in Ernst & Young s approach to KM, so I keep my eyes open for new articles and case studies that are available in the public domain - here are two more: InsideKnowledge magazine interviewed Shirely Jackson , a UK-based director in the Ernst & Young Center for Business Knowledge in 2004. This is the old ChiefTech blog. Nice of you to drop in and visit.

Paper 40

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini


service model risk blown away - Google and Postini I noticed in this case study about a law firms decision to pick Google Apps for email and collaboration over Microsoft Exchange or IBM Lotus Domino , that they mention Google has acquired a company called Postini (actually back last year ). This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009. ©2005-2009.

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0


and a number of interesting case studies have appeared. And this is exactly what Barney and his skunkworks team did during 2007, including: A wiki that was initially used to manage information about the different products and suppliers that Santa uses, that then evolved into a tool to track and manage information about different toy laws in the 150+ jurisdictions around the world where Santa delivers care packages. This is the old ChiefTech blog.

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?


However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. Ive said similar things myself in response to the Avenue A | Razorfish case study (" Their wiki sounds very much like a portal, but a portal implemented in a wiki or Web 2.0 Editing should be easy and accessible and not require special tools. This is the old ChiefTech blog. Nice of you to drop in and visit.

This is the old ChiefTech blog.: The slow death of Enterprise 2.0 on Wikipedia


aka "Enterprise Social Software") entry in Wikipedia I noticed that, despite the HBS case study, the entry itself isnt actually getting any better. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. Our research tracked several black markets that traded third-party password breaches, as well as 25,000 blackhat tools used for phishing and keylogging.

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

I want to see where the tools make a real and lasting difference. Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. Remote assistance is another. Augmented reality Virtual reality Data management


Role of Library and Knowledge Specialists in Moving Education and Training Online


Potential areas for collaboration include: Finding, appraising and using existing digital resources and tools, including both subscription and openly licensed content for use in education and training. Training and teaching in various aspects of information literacy for students and learners, which will equip them with skills to study online and to tackle the growing amounts of mis-information, dis-information and fake news.

Attacking encrypted USB keys the hard(ware) way


We will demonstrate how this methodology works in practice via a set of case-studies. Armed with this knowledge and our tools, you will be able to evaluate the security of the USB device of your choice Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke?

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials


In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. Beyond these risk metrics, we delve into the global reach of the miscreants involved in credential theft and the blackhat tools they rely on.

Malicious PDF Analysis

Security Affairs

” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. Because the manufacturer’s analysis was not satisfactory, the team responsible for handling the incident requested a second opinion, since in other anti-virus tools the document was reported to be malicious.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

“The message put out there is that cybercrime is lucrative and exciting, when for most of the people involved it’s absolutely not the case.”

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

WikiLeaks obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking techniques, tools, and capabilities. Digging in the huge trove of files, it is possible to find also information about the GHIDRA , a Java-based engineering tool. My colleagues at Cybaze-Yoroi ZLAB malware demonstrated how to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware.

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. Tools for taming the digital tiger. We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Its release was a sort of “ main event ” for security researchers all around the globe, which immediately started exploring its functionalities to find out its place within the reversing tool panorama. For this reason, a recent AZORult sample has been chosen to field-test the NSA reverse engineering tool.