Remove Examples Remove Exercises Remove Mining Remove Workshop
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Likewise, the ICRM exam preparation workshop—which I’d highly recommend to prospective candidates—gave me a bead on what subject areas to target, especially for the management part, which can come across at first glance as a pan-MBA undertaking. On-the-job experience most certainly helped me to navigate the exam challenge. They were for me.

article thumbnail

DB2 10 for z/OS and Enterprise Identity Mapping

Robert's Db2

Mike Kearney, a colleague of mine who's a z/OS security expert, leads workshops that cover, among other things, enterprise identity mapping. dallas.ibm.com:437')) In this example, 'USER1' is a RACF ID to which you want a distributed user identity to map, 'rsmith' is the distributed user identity of interest, and 'dg27.dallas.ibm.com:437'

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. To start, challenges, and workshop tables. You don't want to give them the hardest exercise or the heaviest weights that will discourage them.

IT 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. To start, challenges, and workshop tables. You don't want to give them the hardest exercise or the heaviest weights that will discourage them.

IT 52
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

For example, I was regularly asked if I'd ever received any legal threats which is apparently pretty normal for any M&A process, but you can imagine why it'd be particularly interesting when dealing with a heap of data originally obtained via illegal methods. of the company.

IT 136
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

And there are the governments around the world using it to protect their departments , the law enforcement agencies leveraging it for their investigations and all sorts of other use cases I never, ever saw coming (my legitimisation of HIBP post from last year has a heap of other examples). That's number 1 on the list here for a reason.