article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Metadata resides at the center of many of the essential aspects of content management. In addition to helping organize and classify content, Metadata enables good findability, can trigger workflow and transactional processes, reveals document usage patterns and history, and helps establish retention and disposition events.

Metadata 161
article thumbnail

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

For the most part, I’ve stayed away from blogging about AIIM's training for two reasons. We regularly get questions about AIIM training – what course is right for a particular person, role, or circumstance, what the courses cover, what they cost, etc. So I thought it might be of value to do an overview of AIIM’s training offerings.

ECM 116
article thumbnail

Collibra wins a gold medal for metadata management

Collibra

So, we are incredibly excited to announce that Collibra is a gold medal winner in this year’s SoftwareReviews’ Metadata management data quadrant awards. . According to SoftwareReviews, Collibra was up against a handful of data intelligence tools to determine the best metadata management solution. .

article thumbnail

Cisco Duo warns telephony supplier data breach exposed MFA SMS logs

Security Affairs

The message logs did not contain any message content but did contain the phone number, phone carrier, country, and state to which each message was sent, as well as other metadata (e.g., Attackers also obtained other metadata, including the date and time of the message, type of message, etc. ” continues the notification.

article thumbnail

Training Snapshot: Metadata Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Metadata Searching from CloudNine appeared first on CloudNine.

article thumbnail

SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study

Security Affairs

The SoReL-20M database includes a set of curated and labeled samples and security-relevant metadata that could be used as a training dataset for a machine learning engine used in anti-malware solutions. The availability of large and well-formed training sets is a major problem for the implementation of machine learning models.

Metadata 115