Remove Education Remove IT Remove ROT Remove Security
article thumbnail

ESI, ROT, and LBJ – Thoughts on Data Management While Visiting the Lyndon Johnson Presidential Library: eDiscovery Trends

eDiscovery Daily

Which made me think of the state of data creation, management, storage, and security in the corporate world today. In 2016, a study by Veritas found that as much as 85% of ESI is Redundant, Obsolete, or Trivial (ROT). most of it ROT. How does your organization keep ROT at bay? So, what do you think?

ROT 34
article thumbnail

Preserving your information from digital disasters

Preservica

Digital disasters of systems are increasingly common due to a number of factors including human error, computer job error, natural and manmade disasters, cybercrime, bit rot, and file format obsolescence. Here are examples of how disk rot, a natural disaster, and data breaches can cause monumental losses.

ROT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

Most of my career has been spent evangelizing the power of technology to positively transform business, education, and politics. I have spent 30-plus years in the tech and media industries, mainly as a journalist, observer, and founder of companies that either make or support journalism and storytelling. It’s Broke. Let’s Fix It.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Part 3 will discuss how to manage the various DT risks. One essential step is developing the DT business case and connecting it with the critical success factors (CSFs) and the product scope.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. Vamosi: For some of us, it's back to school time.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Those of us in academic and legal environments have been dealing with link and citation rot for ages. Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. Journalists are not alone. A Question of Vocabulary.

article thumbnail

Does Your Content Drive Organizational Value?

AIIM

If you’ve been paying attention to the research we conduct and the educational information we share, you know that AIIM describes Intelligent Information Management (IIM) as all the things you want to do with, or get from, your organization’s information. Growing Privacy and Security Concerns. Growing Privacy and Security Concerns.