article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? When used strategically, text-mining tools can transform raw data into real business intelligence , giving companies a competitive edge. How does text mining work?

Mining 58
article thumbnail

Pending Updates to Regulations of Archives in Colombia

AIIM

Through this state norm, Colombia and all its public institutions have made substantial progress in document management and archives administration, so much so that it has been recognized nationally and internationally as a reference for several countries to develop their own legal frameworks on their public archive policies.

Archiving 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Power & Light: Russell Lee’s Coal Survey Exhibit

Unwritten Record

Many miners in the area come from farm families and are saving money to go back to their farms but will stay in the mines as long as there is “good money” Kingston Pocahontas Coal Company, Exeter Mine, Big Sandy Housing Camp, Welch, McDowell County, West Virginia, April 10, 1946. June 13, 1946.

Mining 43
article thumbnail

Cyber Security’s Impact on Climate Change: What Can Organisations Do?

IT Governance

Perhaps the most significant example of this is the Cloud. Then there’s blockchain mining. In the early days of bitcoin mining, individuals could create new bitcoins using a standard computer set-up, but the process has grown so complex that it now requires a room full of specialised tools. public Clouds and 2.7 private ones.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. For example, a supermarket that makes home grocery deliveries has empty vehicles returning from those deliveries. Take a modern film, for example. Wed, 01/10/2018 - 15:25. Using data to create new value chains.

Mining 78
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

Charging documents say the seven men are part of a hacking group known variously as “ APT41 ,” “ Barium ,” “ Winnti ,” “ Wicked Panda ,” and “ Wicked Spider.” One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Image: FBI.

article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Risk 144