article thumbnail

Apprenticeship Stories: Lavinia Bentley

CILIP

CILIP Copyright COnference 2024 By Lavinia Bentley, Archive Assistant, Jaguar Daimler Heritage Trust, Collections Centre, British Motor Museum Is starting an apprenticeship in the 60th year of your life a good idea? Galleries, Libraries, Archives and Museums,) sector and was able to mount a small exhibition as part of my End Point Assessment.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Source New Manufacturing USA Yes 20,415 TECA Srl Source New Transport Italy Yes 16.7 Known records breached Zenlayer Source New Telecoms USA Yes 384,658,212 ASA Electronics Source New Engineering USA Yes 2.7 Known records breached Zenlayer Source New Telecoms USA Yes 384,658,212 ASA Electronics Source New Engineering USA Yes 2.7

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TWAIN Working Group Releases Next Generation Image Acquisition Technology – TWAIN Direct™

Info Source

Driverless Language for Communication Between Scanners and Software Applications Formally Released at Capture 2019 Conference. This allows developers to write to one driver for different scanner manufacturers’ products and to use the operating system of their preference whether it be Windows, Mac, Linux or even mobile applications.”.

article thumbnail

The profession's biggest problem: diversity

CILIP

LIZ Jolly, Chief Librarian at the British Library since September 2018, will give a keynote speech at the CILIP conference in July. experience in a variety of institutions in the university sector, most recently as Director of Student and Library Services at Teesside University. Staff at the British Library may be a ?multi-professional

article thumbnail

Reconciling vulnerability responses within FIPS 140 security certifications

Thales Cloud Protection & Licensing

While some vulnerabilities are found by the product manufacturer, a good number of them originate from the public world from sources such as the CVE database. This database is a public-facing registry that lists all security vulnerabilities found in products or libraries, and catalogs them using a unique identifier.

article thumbnail

The Crowley Company Releases Revolutionary MACH Mini Microfilm Scanner

Info Source

. – On Tuesday, March 26 th , The Crowley Company (Crowley) , a worldwide leader in production and cultural heritage scanning hardware and digitization services, officially released the Crowley-manufactured MACH Mini microfilm scanner. As both a scanner manufacturer and a scanner end-user, Crowley has a huge advantage in the capture market.

article thumbnail

The Production File Tells the Story: How “Death Mills” Came to U.S. Audiences

Unwritten Record

The I&E Division was planning on reviewing the film at the Pentagon for release in May, and CIC Chief Samual Besner wrote on March 7th that, “It is understood that these materials are being manufactured for use by the Information and Education Branch only. ” On March 8th Capt.