Remove Course Remove Libraries Remove Risk Remove Video
article thumbnail

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. Developers have a huge appetite for OWASP content and I'm very happy to now give them even more Top 10 goodness in the course I'm announcing here - Play by Play: OWASP Top 10 2017.

article thumbnail

Feminist leadership, libraries and Covid-19

CILIP

Feminist leadership, libraries and Covid-19. s Library which was established in 1991 and now has more than 20 paid staff ? s was Roly Keating, Chief Executive of the British Library. I have been a lifelong library lover, but have no formal training as an information professional. s Library were sown.? Adele said:

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A place to breathe: UEL students share solidarity and support via Teams

CILIP

Regina Everitt, Director of Library, Archives and Learning Services, explains how and why she organised a forum to help students make sense of George Floyd and Covid-19. s death were immediately fired after the emergence of the video, but were not charged until people took to the streets. Mean- while, the video of Floyd?s

article thumbnail

Cross-Post from Out of the Stacks: How to Convert Your Home Movie Tapes to Digital

The Texas Record

The Talking Book Program, the Library Development Network and the State Librarian himself, Mark Smith all use the blog format to communicate with the people and agencies who rely on us. Digitize your old home videos before it’s too late! Unfortunately, we are facing the obsolescence of videotape and VCRs (Video Cassette Recorders).

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

IRL Analogies Explaining Digital Concepts are Terrible

Troy Hunt

As expected, the internet responded with much hilarity because no-way, no-how are any of the analogies in that video even remotely equivalent to digital piracy: And even if they were - even if you could directly compare the way both a movie and a car can be illegally obtained then yes, of course people would do it!

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? For all the benefits of connectivity, there are, of course, challenges. It’s a complex challenge that we’re only just beginning to address. Device Security is Hard.

IoT 77