Remove Examples Remove Exercises Remove Mining Remove Presentation
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. They were for me. It’s almost ubiquitous.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Back in September, a number of people pointed me at Experian's "FREE Dark Web Email Scan" (capitalisation is theirs, not mine) because on the surface of it, it seemed similar to my Have I Been Pwned (HIBP) service. Let's take the recent South Africa situation as an example where the entire country had their data leaked!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And in this hacker mine episode, I'm going to be giving some practical insight around the world of bug bounties through the eyes of various hackers I have previously interviewed on the show. I would say primarily two and a half years and I still don't do exercises that well because I never look for exercise. I'm Robert Vamosi.

Mining 40
article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself. For example, organizational restructuring such as mergers and acquisitions can result in staff needing to access multiple, similar systems to respond to a single customer request.

ECM 166
article thumbnail

Monitoring DB2 for z/OS: What's in YOUR Subsystem?

Robert's Db2

While several of the DB2 DISPLAY commands provide information that's useful for monitoring activity on a DB2 subsystem (a favorite of mine is -DISPLAY BUFFERPOOL(ACTIVE) DETAIL), for an in-depth view into what's going on you really want the capabilities of a monitor tool at your disposal. Take, for each part of the report (i.e.,

Mining 48
article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

There are presently 201k people monitoring domains in Have I Been Pwned (HIBP). Here's mine: One of the problems the dashboard approach helps tackle is unsubscribing on an individual domain basis. It was an all or nothing affair that nuked the lot of them whereas now, it's a domain-by-domain exercise.

IT 92
article thumbnail

Creating a LaMetric App with Cloudflare Workers and KV

Troy Hunt

I had this idea out of nowhere the other day that I should have a visual display somewhere in my office showing how many active Have I Been Pwned (HIBP) subscribers I presently have. Here's how it works: Firstly, the whole point of this exercise is to build a LaMetric indicator app (that link gives you a full walkthrough of the process).

Mining 106