Remove 2012 Remove Education Remove Examples Remove Strategy
article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

The ClimateWorks Knowledge Exchange, an enterprise wiki, is a key component of their knowledge strategy. Incidentally, the NSW Department of Education is also a Socialtext customer (see below). NSW Department of Education - put the effort in to get great results. SharePoint, SharePoint and SharePoint (but with some social).

article thumbnail

What are the 10 steps to cyber security?

IT Governance

Originally published in 2012, it is now used by the majority of FTSE 350 organisations. For example, you might request changes or additions to your cyber security policies or staff awareness programme. User education and awareness. In this blog, we explain each step and provide advice on how to get started. Secure configuration.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.” ZB in 2012, and the forecast is a mind-boggling 175 ZB by 2025! IDC estimated the world created.16

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. For example, when learning a new subject area. So getting cybersecurity education materials often comes with a price tag. How did pico CTF get started 2013 Well I guess technically 2012. In a moment we'll hear from someone.

article thumbnail

Q&A: Cloud Providers and Leaky Servers

Thales Cloud Protection & Licensing

The nonprofit GDI Foundation has tracked close to 175,000 examples of misconfigured software and services on the cloud this year. I was one of 68 million Dropbox users that received an email last year asking me to reset my password because they found out that in 2012 they had lost our User IDs and hashed passwords. A: Absolutely not.

Cloud 59
article thumbnail

Working internationally

CILIP

There is also an innovative proposal for a single virtual library presence for the whole of south Asia, with a strategy that is now being rolled out across the region. This is a good example of how the British Council exercises ?soft In a shopping mall, for example, curious shoppers and young families experienced ?library

article thumbnail

Tokyo 2020: when a sprint turned into a marathon

CILIP

For example, we nurture and develop the natural progression in the way people consume content, from data to information to knowledge to learning. We help people understand where knowledge can be found, often, for example, by promoting various community discussions, using a network of champions. focuses on this. The effectiveness of ?what?