Remove Communications Remove Libraries Remove Mining Remove Paper
article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Since the pandemic I’ve fallen into the habit of reading paper books at night, and listening to books while walking. In short, everything could be minedmined for insights, for value, for untold usefulness.

Mining 52
article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. Nor am I going to wade into the debate about the ecological consequences of mining cryptocurrencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

And we communicate directly with Box product reps who will responsively speak with you even if you’re not part of a Fortune 500 company (no, I’m not on Box’s payroll, and much remains to be seen from them). Communication Tools and Policy. Books on institutional functions, like finance, law, student records, HR, advancement, etc.,

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Communication technologies have continued to change societies and human interaction. For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS. Data Analytics.

article thumbnail

This is the old ChiefTech blog.: The Technologist Perspective and the Business Perspective of Enterprise RSS

ChiefTech

We’re basically creating the Library of Congress every day or so, which makes finding a piece of information like finding a needle in a haystack. Getting people to communicate their problems and explaining how they think those problems could be solved and then taking the opportunity to present RSS, makes more sense.

Mining 40
article thumbnail

Sergeant Dennis Fisher and Marine Corps Combat Photography in Vietnam

Unwritten Record

Mine was 0311 which was an infantry rifleman, and I was sent off for advanced infantry training. After his retirement from that publication he had been brought on board at the U of M to bring his photojournalism and editorial talents to bear in a number of different visual communications disciplines. Thank you, Dennis.

article thumbnail

EP 49: LoL

ForAllSecure

Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking and what they'll do is they'll use a legitimate program that depends on a library, bring their malicious library with them and it gets sometimes side loaded. Unless you're specifically looking for messages within images.