article thumbnail

Archive-It Partner News, February 2019

Archive-It

Laying the groundwork: The University of Pennsylvania Libraries summarize their growing institution-wide web archiving programs, including collections, workshops, and advice for creators. Mar 3-6: Electronic Resources & Libraries – Austin, TX. Mar 20-21: Library Technology Conference (LibTech) – St.

article thumbnail

This is the old ChiefTech blog.: Integrating Enterprise 2.0 into your corporate Intranet - 20th September

ChiefTech

into your corporate Intranet - 20th September Im running a half day workshop at Key Forums Intranet 07 conference in September. James, Good luck with the workshop. blog I work at Headshift , a social media and social computing consultancy, as a Senior Business & Technical Consultant. Ill be looking at: Enterprise 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. Vamosi: Now, before we get too far, one might ask, if you’re going to go through the effort to create a village, why not create a whole conference around the topic of aerospace instead?

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Ollam: so locks at DEF CON and locks it at any hacker conference. But it was really fella named Kai and his friend doc and some other people from Colorado and the 719 area code they they were the first to anyone really remembers in those early single digit days of DEF CON to start challenges and workshop tables. Still very informal.

article thumbnail

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

This is the seventh post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. TSLAC Wants Your Electronic Records. These results were used to develop a big bucket retention schedule and create standard repositories for electronic records.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. And that's actually far more important, so I would say it's the human factor talks at conferences like Black Hat, that are the most important ones. Both involve technology.