Remove tag text-message-2
article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? Text analysis takes it a step farther by focusing on pattern identification across large datasets, producing more quantitative results. How does text mining work?

Mining 53
article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Note the types of Metadata that best describe your documents (assets), including strings, integers, free text, date, or date/time fields. We've provided a blank table template in Figure 2 below. Figure 1 – Sample Metadata Model Chart (Source: Taxonomy Strategies, LLC ) : Figure 2: Metadata Model Template ( click for PDF ).

Metadata 163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Security Affairs

Earlier this year, Google Threat Analysis Group (TAG) experts uncovered an iPhone hacking campaign, initially, they spotted a limited number of hacked websites used in watering hole attacks against iPhone users. “Earlier this year Google’s Threat Analysis Group (TAG) discovered a small collection of hacked websites.

article thumbnail

Cases I Will Be Covering Today During Litigation Support Day: eDiscovery Case Law

eDiscovery Daily

Are pictures where you are “tagged” discoverable? 2:17-cv-371 (S.D. Judge Smith did “order curative measures under Rule 37(e)(1)”, allowing the plaintiff to “introduce evidence at trial, if it wishes, of the litigation hold letter and Pauley Motor’s subsequent failure to preserve the text messages.”. In Vasquez-Santos v.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

You know you’re the victim of ransomware if your desktop has a message that reads something like: “!!! These are disguised as text files with names like “readme.txt.js” – and often just visible as “readme.txt”, with a script icon for a text file. Adaptive Monitoring and Tagging. Ransomware attacks and costs.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Yesterday, we looked back at cases related to passwords and Fifth Amendment protection, non-party discovery and mobile and messaging. Oh, and a photo on social media can be discoverable simply because you’re “tagged” in it. NY Appeals Court Extends Discoverability of Social Media Photos to “Tagged” Photos : In Vasquez-Santos v.