article thumbnail

Arup Library: 60 years

CILIP

the librarian residing in the basement surrounded by piles of books and magazines? Arup Library in the Electronic Age. This followed the successful transfer of Arup job records to a DEC10 Mainframe computer in 1978, which greatly sped up the data handling managed by the library. In 1968, Peter Hoggett took over Arup Library.

article thumbnail

This is the old ChiefTech blog.: Why aren't we getting enterprise RSS yet?

ChiefTech

We believe the market is much broader than Gartner is allowing, encompassing content relevancy, discovery, and surfacing (what you need, when you need it, and in an app that can use it), user profile data, user initiated action, such as sharing and tagging, coupled with user generated content. " Help me understand - thank you.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. A cloud-first “mind-shift” implies using a cloud computing model, which exposes an organization to risks on the Internet, where data is considered “digital gold” that cyber criminals want to steal. 2020, p 6).

article thumbnail

Summary – “Industry in One: Financial Services”

ARMA International

Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November. Most financial institutions have become very effective at managing risk in traditional financial risk areas such as markets, liquidity, and credit. Risk Management and RIM.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

I'm a contributing editor at PC World Magazine. It started because we we would go to conferences and where we read articles and you know magazines or newspapers or whatever. And people gladly take your computer and run it and you have to question that but there's they're so eager to learn it and to do it.

article thumbnail

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

The term cyber refers, by and large, to the virtual world of ICT, the Internet and computers. Classical theories about communication cannot utterly fit to the intelligence sphere: Communicating bad news or threat scenarios has little to do with marketing, persuasion and sales techniques. Cyber intelligence is a subset of intelligence.