Remove Document Remove Education Remove Examples Remove Presentation
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Microsoft Office Documents.

Libraries 103
article thumbnail

Getting ready for artificial general intelligence with examples

IBM Big Data Hub

Regardless, these are examples of narrow AI. Here are some areas where organizations are seeing a ROI: Text (83%) : Gen AI assists with automating tasks like report writing, document summarization and marketing copy generation. Example : Imagine the best customer service experience that you’ve ever had.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Department of Education and Department of Health and Human Services Release First Update to Joint Guidance on FERPA and HIPAA Since 2008

Hunton Privacy

Department of Education and the U.S. Department of Health and Human Services released joint guidance on the application of the Family Educational Rights and Privacy Act (“FERPA”) and the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy Rule to student records.

article thumbnail

Reining in content sprawl: a consultant’s perspective

OpenText Information Management

Consider a common scenario: a client sends you an important document as an email attachment. One example that jumps to mind was a business that made photocopies of personally identifiable information (PII) such as driving licenses when admitting visitors to secure areas of its facilities.

ECM 57
article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 1

AIIM

Simple Example. Let’s take a simple example. If you had to testify later in court, you could present the statement in the memo as the trigger for your decision to leave the office. If you had to testify later in court, you could present the statement in the memo as the trigger for your decision to leave the office.

Education 169
article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 2

AIIM

The documents will be admitted if they meet the very strict conditions attached to business records under the hearsay rules. If, for example, your policy prescribes that workers store correspondence in a specific corporate records management system, and people actually do that, then that, too, is a slam-dunk. So, let's take a look.

Paper 159
article thumbnail

Using digital preservation in real time to document the global pandemic for future generations

Preservica

In May this year we invited Preservica users to share their own COVID-19 stories with the wider community – six archivists from a range of sectors took to the virtual stage and shared their plans of action, explaining how they’re using digital preservation in real time to address the challenges and opportunities presented by the pandemic.