Marcus P. Zillman’s new guide comprises a list of actionable financial resources from the U.S. and abroad, organized by four subject areas: Corporate Conference Calls Resources, Financial Sources, Financial Sources Search Engines, and Venture Capital Sources. Content includes: sources for news and updates on business, corporations and marketplaces; sources from the NGO/IGO sectors; data, databases and charts; search applications; resources for investors and money management; and market analysis tools.
Research Attorney Caren Zentner Luckie discusses the many aspects of competitive intelligence and business development, importantly stating that it takes time to perform the work, and it takes even more time to learn which sources to use to find the information. She notes that CI also takes money to deliver comprehensive and accurate work product. Using a range of public and private sources, expert techniques, and a thorough understanding of the specific client requirements is critical to CI research.
If Google can deliver results across the entire internet in seconds, why do I have so much trouble finding things in my organization?” asked Jonathan Adams, Research Director at Infogix, at the DATAVERSITY® DGVision Conference, December 2019. In a presentation titled, “I Never Metadata I did Not Like” Adams outlined successful approaches to understanding and managing metadata – as reported by Amber Lee Dennis.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The High Privacy Cost of a “Free” Website; Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere; Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress; and FinCEN Files Show How Criminals Use Big-Name Banks To Manage Global Financial Corruption.
Chris Meadows discusses the ongoing case by four publishers, Hachette Book Group, HarperCollins Publishers, John Wiley & Sons and Penguin Random House, against the Internet Archives Open Library respective to the scanning, public display, and distribution of entire literary works. As noted, this is “a potentially sensitive, and complex litigation.” The future of the Internet Archive may hang in the balance. This case is shining light on the heightened importance of evaluating fair use during a pandemic that is keeping vast books collections out of users reach for the unforeseeable future, while most education is confined to distance learning.
This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. and foreign governments, academic, corporate, NGOs, and open source communities.
Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.
Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.
As a law librarian, law and technology expert, professor, writer and speaker, with significant work experience in multiple sectors, David Whelan is uniquely positioned to discuss the critical question – What does it take to make a service sticky enough for people to stay?