Remove Document Remove Examples Remove Exercises Remove Mining
article thumbnail

Pending Updates to Regulations of Archives in Colombia

AIIM

Through this state norm, Colombia and all its public institutions have made substantial progress in document management and archives administration, so much so that it has been recognized nationally and internationally as a reference for several countries to develop their own legal frameworks on their public archive policies.

Archiving 141
article thumbnail

Application modernization overview

IBM Big Data Hub

Many are addressing this via building accelerators that could be customized for enterprise consumption that helps accelerate specific areas of modernization and one such example from IBM is IBM Consulting Cloud Accelerators. We will explore key areas of acceleration with an example in this article.

Cloud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Back in September, a number of people pointed me at Experian's "FREE Dark Web Email Scan" (capitalisation is theirs, not mine) because on the surface of it, it seemed similar to my Have I Been Pwned (HIBP) service. Let's take the recent South Africa situation as an example where the entire country had their data leaked!

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself. For example, organizational restructuring such as mergers and acquisitions can result in staff needing to access multiple, similar systems to respond to a single customer request.

ECM 166
article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. A perfect example is that the house purchase fell through due to the vendor not being agreeable to the terms I set forth. Complete some financial documents. Schedule a meeting.

Sales 142
article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

Here's mine: One of the problems the dashboard approach helps tackle is unsubscribing on an individual domain basis. It was an all or nothing affair that nuked the lot of them whereas now, it's a domain-by-domain exercise. This doesn't fix the pain of doing it once, but it does mean that it's now a one-off pain.

IT 93
article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

Particularly when we're talking about public figures in positions of influence, we need to see leadership around infosec, not acknowledgement that elected representatives are consciously exercising poor password hygiene. The most impactful example of this is Edward Snowden persuading NSA colleagues to provide their credentials to him.