Remove 2008 Remove Education Remove Examples Remove Strategy
article thumbnail

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. Her qualifications include a doctorate in education (on the topic of e-mentoring and women into leadership). Barbara Allan said: ?

article thumbnail

Preserving your information from digital disasters

Preservica

Here are examples of how disk rot, a natural disaster, and data breaches can cause monumental losses. This story demonstrates the criticality of having a preservation strategy built into your organization up front. Higher education institutions also face some unique security challenges , such as legacy hardware and an open culture.

ROT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Day one at OSNBC 2008

ChiefTech

Also, different cultures use social networking sites in different ways - for example, in the west authentic social networking is the norm, but is less typical in north Asia. For example, internal blogging has been more successful than their wiki. Different public social networking sites are successful in specific geographies.

Access 40
article thumbnail

Time for Australian government to wake up to mobile?

ChiefTech

They used two specific testing tools, a W3C tool based on standards developed in 2008 and another that looks like it was designed to test to baseline of phones like the Nokia 6680 (from 2005). Now, there are some very good examples of government in Australia using mobile. They need to think about medium term strategies for mobile.

article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

The first is that ever since 2008, corporate clients are much more cost-conscious and in pursuit of the best available deal. In addition, firms are exposed to business, compliance, and reputational risks (and fines) if something goes wrong, for example, the wrong information falls into the wrong hands or data privacy laws are breached.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. For example, let them hear the sounds of the location where your story is set.

article thumbnail

Gleanings from LegalTech NY

Positively RIM

IG came to prominence during the Great Recession of 2008. F For example, why do my dental and vision insurance work off my social security number? Two strategies combat that. One, of course, is education/change management. A smaller target may have lesser value, should a security breach occur.