How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. Welcome to RIM Month! I have been promising/threatening my fellow Steering Committee members to write this post for a while now.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

We were then able to attend training and got our logins and access to the platform. We also had very limited time available in which to train and familiarize ourselves with web archiving and the tools before the July deadline. Case Studies

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

Provincial Candidates 2017 collection, an outcome of a collaboration started at BC Gov Info Day 2017 at Simon Fraser University, Burnaby, and a case of using–or trying to use–online political party resources to build comprehensive seed lists. Case Studies Collaborative Collecting

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community

Archive-It

We started by training just a few Information Services staff in one-on-one sessions and shared Archive-It training videos. Case Studies Collaborative Collecting Community Websby Dylan Gaffney, Forbes Library.

Saving Local News on the Web

Archive-It

I gave a long but I hope helpful answer describing archival practices of appraisal and weeding, and how we are trained to make those types of decisions. Case Studies Community Webs

Describing web archives: Learning from Archive-It partners and friends

Archive-It

Partners, collaborators, and peers gathered this week for Describing Web Archives , the latest in Archive-It’s Advanced Training series of webinars , and the second (with Access to Archive-It Collections ) to invite web archivists to take the lead in demonstrating their approaches to access and discovery. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. .

How to start your career in cyber security

IT Governance

We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO27001 Certified ISMS Foundation Training Course. Cyber Security ISO 27001 ISO 27001 trainingA version of this blog was originally published on 8 December 2017.

Tips 78

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. I want to see where the tools make a real and lasting difference. Remote assistance is another. Augmented reality Virtual reality Data management

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO 27001 Certified ISMS Foundation Training Course.

e-Records Conference 2018: Registration Open!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. News Training DIR erecords 2018 Local Governments State Agencies TSLACe-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

Given the topic of the conference, many of the presentations centered around information governance and implementation whether in the cloud, SharePoint, or through successful case studies. News Training eRecords 2017 Local Governments State Agencies

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. News Training DIR electronic records erecords 2018 Local Governments State Agencies TSLACWe are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018.

e-Records Conference 2018: Call for Presentations

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. The annual e-Records Conference will be held Friday, November 16, 2018.

e-Records Conference: Price Increase on October 26!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. News Training DIR eRecords erecords 2018 Local Governments State Agencies TSLACReminder to register now and save $25 on your registration fee! Early registration fee is $65.

Demo 40

Webinar: Simple Ways to Turn Your Records Liaisons Into Records Ambassadors

The Texas Record

So, we are pleased to announce that Holly will be giving this presentation via webinar training on October 18th at 2pm. This case study shows how the launch, and eventual revamping, of this program has impacted records management across Denton County. Training Local Governments State Agencies WebinarsIn July, some staff were fortunate enough to attend the annual NAGARA Conference in Boise, ID.

Identifying People by Metadata

Schneier on Security

In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.

RFID Global to sponsor Airline Baggage Tracking session at RFID Journal Live!

RFID Global Solution, Inc.

In addition, the session will feature a case study by Brandon Woodruff, Senior Analyst at Delta Air Lines, the first major airline to track baggage worldwide. The conference will feature eight tracks, a co-located IEEE RFID 2019 event, the RFID Journal Awards, and fast-track RFID training and RFID Professional Institute certification. The RFID Journal LIVE!

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. A straightforward and pragmatic guide to leadership, management and teamwork.

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. In all cases, case studies and stories can really help make the case. Certainly, on the risk side, you hope to never have a case study from your own organization - but if you do, it's hard to find one more relevant because you know what happened, you know the costs to recover, you know all the outcomes.

Web archiving partners meet in 2019

Archive-It

Both events featured program and technology updates from Internet Archive staff, news and case studies from Archive-It partners, and informal time for discussion and working groups. by the Archive-It team.

Connect with Perficient at #Kscope18

Perficient Data & Analytics

Perficient’s Oracle consultants are certified to deliver the official Oracle course curriculum to customers via onsite training classes. Case Study: Implementing a One-of-a-Kind Driver-based Rolling Forecast Model at MD Anderson Cancer Center Using Hyperion Planning with ASO Integration.

New guide to improving library services using key library assessment methodologies

CILIP

The different assessment methods are presented from a practical perspective with a theoretical grounding, and include practical case studies to illustrate how the methodologies have successfully been applied. New book on improving library services with assessment data.

A Rich Content Strategy Empowered by Chatbots | everteam.chatbot

Everteam

4- Case studies. Trained and programmed to use natural language it will almost feel like you’re chatting with an actual human! 1- Define your goals and use case: whether you are developing an informative chatbot or a chatbot that can take orders and make reservations, or both.

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. This is a guest article written by Robert A.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Mike Jordan, senior director of the Shared Assessments Program, a Santa Fe, NM-based intel-sharing and training consortium focused on third-party risks, points out that at least one of the banks that had data exposed in this latest huge data leak wasn’t even a customer of the allegedly culpable contractor. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Tools 120

New report – Designing Mobile Apps: A Roadmap for Businesses

ChiefTech

The business context (including how mobile apps relate to intranets, training and social business). How to identify user requirements and develop use cases. Case studies and examples of the approaches taken by Alcatel-lucent, Apache Corporations, King & Wood Mallesons, Woods Bagot and Zurich. The report covers: Key concepts about enterprise mobility and mobile apps. A roadmap for developing mobile apps.

Join Our Sessions at MuleSoft CONNECT 2018

Perficient Data & Analytics

The conference is complete with deep-dive sessions, hands-on training courses, and keynote speakers who will further educate and inspire developers, engineers, architects, and technical decision makers alike! Attendees will hear about Ameren’s own experiences and use case studies. Today kicks off MuleSoft CONNECT 2018 – a conference that is centered on helping attendees learn to design, build, and manage integrations and APIs like experts.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

This blog explains why that’s the case, helping you understand how each standard works and the differences between them. To meet these requirements, organisations must: Assemble a project team and initiate the project; Conduct a gap analysis; Scope the ISMS; Initiate high-level policy development; Perform a risk assessment; Select and apply controls; Develop risk documentation; Conduct staff awareness training; Assess, review and conduct an internal audit; and.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Machine Learning: train a machine to do a job. Evaluate capabilities by use case. Optimize your training efforts. You only have so much bandwidth to train the engine. Don’t try to train too many cognitive engines. Case Studies.

Interactive: What Does It Really Mean?

The Texas Record

In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Reading a case study and using it to come to conclusions.

Why the cyber security skills gap is so damaging

IT Governance

In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. Although these new recruits can help with routine work, senior staff will need to provide on-the-job training, which prevents them performing their own tasks.

CNIL Adopts Referentials On DPO Certification

Hunton Privacy

professional experience of at least 2 years in any field, with at least 35 hours of data protection training administered by a training body. Candidates also will need to successfully complete a written test that will consist of at least 100 multiple choice questions, 30% of which will be presented in the form of case studies.

GDPR 63

SAA/CoSA/NAGARA 2018 recap: Session 103

The Schedule

Archives and property managers need better training, more resources, and better tools for handling collections related to trauma and the continued trauma the collections may bring to a community. In the case study focusing on ExxonMobil, Tansey showed how these three functions applied. Guest post by Cathrine Giles, State Records Branch Manager, Kentucky Department for Libraries and Archives.

KnowledgeShare: access to evidence for NHS staff

CILIP

1 Policy documents, guidelines and case studies of innovative practice add to this plethora. Case study: Tom Roper, Clinical Librarian, Brighton and Sussex Hospitals. Case study: Stephen Ayre, Library Services Manager, George Eliot Hospital.

Creating and nourishing a DevOps culture: key takeaways for agencies

CGI

Showcase case studies, especially local or homegrown examples, sharing successes and failures alike. do not expect people to know what to do in a new culture without appropriate training and practice. Creating and nourishing a DevOps culture: key takeaways for agencies. ravi.kumarv@cgi.com. Tue, 10/16/2018 - 09:15. Federal agencies are dealing with a lot of change right now.

Virgin America and the New Intranet

ChiefTech

I think this can create a misconception that ESNs are simply about employee engagement (as some of the early case studies suggested) or worse just for sharing jokes (a situation one law firm told me that this was all that their microblogging platform was used for).

Can Enterprises execute a GRC Movement?

Security Affairs

Are applications or use cases of GRC platforms or products for enterprises going to be different for different organisations? If yes then what kind of use cases? Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world.

Risk 88

Archive-It Partner News, November 2017

Archive-It

Tech and Training. To explore a rich case study in collecting and parsing out this information, see the new blog post by partners at the U.S. Upcoming and recorded training. by the Archive-It team. Community News.

Archive-It Partner News, May 2018

Archive-It

Tech and Training. If you have use cases for automatically integrating more descriptive, administrative, or technical metadata about your web archives into finding aids, catalogs, preservation systems, access portals, or elsewhere, we want to hear from you! by the Archive-It team.