Remove Computer and Electronics Remove Education Remove Government Remove Meeting
article thumbnail

RMS Section Meeting Teaser #5

The Schedule

Reminder: our section meeting is free and it is set for Monday, July 27th at 3pm EST. Are Records Essential to Governance of Higher Education during a Crisis? Our next teaser is from panelist Eric Stoykovich of Trinity College!

article thumbnail

RMS annual meeting teaser #2

The Schedule

Another panelist who will be presenting during our annual meeting is Krista Oldham, University Archivist at Clemson University. She will speak on “The Struggle is Real: Getting a Seat at the Table.”. This struggle is compounded when records management authority is perceived to be buried in an institution’s organizational structure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. The meeting presenters try to spice things up. Very probably.

article thumbnail

Leveraging IBM Cloud for electronic design automation (EDA) workloads

IBM Big Data Hub

Electronic design automation (EDA) is a market segment consisting of software, hardware and services with the goal of assisting in the definition, planning, design, implementation, verification and subsequent manufacturing of semiconductor devices (or chips). The primary providers of this service are semiconductor foundries or fabs.

Cloud 92
article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community. Wednesday, March 21: Brett Burney. Monday, March 26: Craig Ball.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

The government will usually get its ESI by consent or warrant. Typically, when the federal government seeks data in criminal cases (and most states have a similar procedure), it requests a search and seizure warrant by filing an application or affidavit sworn before a judge. The first is forensic images of computers and cell phones.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Four: eDiscovery Best Practices

eDiscovery Daily

So, it is no surprise that one of the growing electronic aspects of criminal law is social media as evidence. Furthermore, electronic evidence, such as social media, must be authenticated, that is shown to be what it is supposed to be. Working with Social Media as Evidence. Recent decisions, including Sublet v. State , 113 A.3d