Archive for the ‘Digital Issues’ category

Biometric Brain Boggle

May 22, 2017

This is an interesting article that was published in Harvard Business Review this month by Anthony Rjeily and Charlie Jacco.

“Passwords Are Terrible, but Will Biometrics Be Any Better”

Jason R. Baron: why companies should pay attention to growing data volumes and to analytics

September 17, 2015

Jason Baron is awesome!!! Big data, analytics, predictive coding, business ethics and digital humanism… I love Baron’s fannnntabulous mind!!! This is a smart people watch. ~~~Felicia

eDisclosure Information Project

IGIJason R. Baron is Of Counsel at Drinker Biddle & Reath and Co-Chair of the Information Governance Initiative.

He was a keynote speaker at the LawTech Europe Congress in Prague last year, where he gave us many good reasons why companies should be paying attention to the ever-increasing volumes of data which they create and keep, not just to reduce cost and risk but to uncover valuable data.

This is one of two short videos which he recorded for me on that occasion. The other will follow shortly.

Home

View original post

Artificial Intelligence, Deep Neural Networks and Deep Learning: Oh My!!

May 26, 2015
image

♥In Love with Technology♥

I can’t explain how much I love learning about technological breakthroughs. I’m not scared in the least bit by much when it comes to the forefront of intellectualism. I recently read a hard copy article in the May 2015 issue of The Economist titled Artificial intelligence:
Rise of the machines. The byline says… “artificial intelligence scares people—excessively so?” Really? What a bunch of wimps!! People continue to fight enlightenment, progression and change to stay in boxes they have built. Not me.

At a speech in October 2014 at the Massachusetts Institute of Technology, a scholar said that artificial intelligence (AI) was “summoning the demon.” People are paranoid that machines will take over in employment’s race for productivity. With industry powerhouses like Google and Amazon buying AI start-up companies, maybe human worries are justified? We will just find other jobs right? It’s called perseverance.

image

•Photo I snapped while reading the article in the library.•

Will computers continue to replace some of the things that people normally do? Probably. I loved this quote. “The torrent of data thrown off by the world’s internet-connected computers, tablets and smartphones, and the huge amounts of computing power now available for processing that torrent, means that their algorithms are more and more capable of understanding languages, recognizing images and the like.” Why didn’t I visit the San Diego Supercomputer Center many years ago when I had the chance? I also could have ditched my conference last October to go there! Now that would have been a real memory to cherish!

The article in The Economist said “signs of the AI boom are everywhere.” Google recently paid $400 million for DeepMind. Have you ever heard of DeepMind? If not, you should so check it out!! Pure awesomeness if you like video games. Just Google it and see. There is also a great article in The New Yorker which discusses how deep neural networks operate. Deep neural networks are used by companies like DeepMind. These artificial networks are much like the neural networks in the human brain. It is amazing to read about.

The newest form of AI tied to deep neural networks is now capable of “deep learning!” Computers can learn through the analysis of large amounts of data using algorithms. Freak out on the algorithm Facebook recently deployed. Did you think you were anonymous in that untagged photo? Think again… DeepFace “can recognise specific human faces in images around 97% of the time, even when those faces are partly hidden or poorly lit.” I want to be that smart and write programs like this. It’s not fair!! Male engineers created DeepFace and I give them tons of respect, but why are intelligent women often seen as  domineering? That’s not fair either.

image

•Smart Woman Army•

Another thing I found interesting in the article was that since most data is labeled by humans, and algorithms need that data to learn better, another race is on. It is a race to develop “unsupervised-learning” algorithms. This way, the need for human labeling is basically eliminated. How accurate will it be? I guess we will see. Artificial neural networks were invented in the 1950s by people with big brains who wanted bigger, faster, more accurate brains! I lovvvvve brains!! I am so not turned off by them!! Haha… These smart people were simulating the neurons and electrochemicals in a human brain to create artificial intelligence. It worked!!

image

♦"Just watch! Imma make my perfect woman!" (Dr.J before the chemical waste accident that birthed The Joker and this is not Harley Quinn)♦

If you are a brave fellow intellectual and enjoy all things mind blowing, you should read the article in The Economist. It so so worth the read. You can also learn about the interesting problem with AI. Do you know the one thing people can immediately identify that a computer simply can’t define? Porn… Yes… pornography. I guess machines provide plenty of access to porn, but don’t ask a damn machine to intelligently recognize porn lol. We can leave that type of analysis to the humans!

Vu Digital Translates Videos Into Structured Data

May 4, 2015

This is awesome! It basically extracts descriptive metadata!!! Nice!! Useful for sure!
~~~Felicia

Information Value Management (IVM)

April 28, 2015

This is a great read by Ariku. It is awesome how he discusses the culture of “silo type” data management and how this “paralyzes the enterprise view of data.” Yes. It does!! I absolutely love Maslow’s hierarchy of needs model and I can see how the model would apply to data management. This is worth a read.
~~~~Felicia

Ariku's Blog

Introduction and Terminology

Information Management (IM)

a framework for managing all dimensions of enterprise data

This framework includes operational applications and their respective data repositories:

  • operational databases
  • data lakes
  • data appliances
  • data warehouses
  • MDM
  • social media
  • imported data from external sources

The management dimension includes data governance elements such as:

  • quality
  • safety
  • the information life cycle
  • standards and policies
  • and procedures for defining and handling data elements and structures

Information Value Management (IVM)

IVM is the subset of Information Management that focuses on maximizing the benefits that accompany high quality data. It’s a process for transforming raw information into refined actionable intelligence. It’s defined by best practices that ensure data quality by employing processes that determine if the information your organization is collecting is useful.

IVM is based on the premise that information cannot reliably support your business decisions and actions until measures, standards, and best practices designed to produce…

View original post 899 more words

What is a Trusted Content Management System?

March 19, 2015

Review of Preserving Complex Digital Objects

March 17, 2015

Recordkeeping Roundtable

Janet Delve and David Anderson (eds), Preserving Complex Digital Objects, London, Facet, 2014.

In Neil Grindley’s introduction to Preserving Complex Digital Objects he explains that it aims to set out what is currently understood about dealing with complex digital objects and offer a broad framework for starting to manage and address relevant issues. The book is the product of a number of symposia held in the UK in 2011-2012 on different aspects of the preservation of complex objects, funded by JISC, a charitable organisation originally set up by the UK government as the Joint Information Systems Committee in the 1990s. JISC now champions and conducts research and development in the use of information and communications technology (ICT) in learning, teaching, research and administration. Formerly devoting much time to digital preservation research and information sharing, JISC is now more heavily focused on research data management and sharing for the universities and other higher…

View original post 1,564 more words

The 3L’s that kill #data projects

March 10, 2015

Indeed…
~~~Felicia

Content in Context

The typical data project starts with the BA or systems architect asking: “fast, cheap or good – which one do you want?” But in my experience, no matter how much time you have, or how much money you are willing to throw at it, or what features you are willing to sacrifice, many initiatives are doomed to fail before you even start because of inherent obstacles – what I like to refer to as the 3L’s of data projects.

Image taken from "Computers at Work" © 1969 The Hamlyn Publishing Group Image taken from “Computers at Work” © 1969 The Hamlyn Publishing Group

Reflecting on work I have been doing with various clients over the past few years, it seems to me that despite their commitment to invest in system upgrades, migrate their content to new delivery platforms and automate their data processing, they often come unstuck due to fundamental flaws in their existing operations:

Legacy

This is the most common…

View original post 750 more words

Houdini, Meteorites, and Airbursts: Oh My

January 9, 2015

image

~Dr. Boslough and Felicia~


I found myself wondering how many people with a scientific Ph.D. surrounded me in a room of at least 500 people tonight. It is so much more interesting for me to spend the night learning, writing or crafting then doing something completely mindless. I learned so much from the lecture of Dr. Mark Boslough, a physicist and New Mexico’s “expert on planetary impacts and global catastrophes.”

Dr. Boslough’s lecture was titled “2013 Chelyabinsk (Russian) Meteorite and Other Stories of Destructive Impacts and Airbursts on Earth.” It was very interesting and we walked out in amazement. On Valentine’s Day here in the United States in 2013, an asteroid “descended at about 19 kilometers per second exploding at high altitude in a momentary flash brighten than the sun and generating a shock wave that injured over a thousand people.” It was both scary and amazing to learn about because these things can be “more damaging than a nuclear explosion” and can generate more than enough heat (1800°C) to literally melt the Earth.

image

~Yes...I took notes and looked at stars.~

The lecture was sponsored by the New Mexico Academy of Science, which was founded in 1902. The academy was proud to host an event for Dr. Boslough who received his doctorate from CalTech. What did I find most interesting? Learning about the geologic origins of Libyan desert glass was rather cool. It was awesome to find out that King Tutankhamun had a chest plate which featured a scarab beetle carved from this desert glass. What a beautiful piece!!

image

~King Tut's breast plate with a scarab beetle carved from Libyan desert glass.~

Dr. Boslough has been featured on BBC, NOVA, PBS, and the Discovery and National Geography Channels. He even had an asteroid named after him (73520 Boslough, 2003 MB1). Super cool for a man who focused his career on geophysics right? He was very happy to report (he seemed star struck, but who could blame him) about his recent presentation in the Canary Islands with the notorious Stephen Hawking. Dr. Boslough showed us a piece of a meteorite that Hawking felt there. It seemed like he wanted to say “I’ll never wash this thing!”

Of course I had a question at the end… “What software do you use to render models and create simulations?” He stumbled around, but finally said they use Houdini. He also knew all about metadata!!! At first I thought he was joking by saying he used Houdini, because he was kind of comedic. At the end, Gail leaned over and whispered in my ear… “Have you heard of Houdini?” I told her no, but that I would look it up. I checked it out tonight and the physicist wasn’t kidding. Houdini is real. It runs in a Windows based system and is a 3D animation application software developed by Side Effects Software of Toronto. Maybe that was the other thing I found most interesting!

Creative Work for a New York Times Bestselling Author

December 20, 2014

Tonight I finished up some photo work for Anne Hillerman. I just emailed off the final shots. I was honored when the award-winning reporter and New York Times bestselling author asked me to take new author photos of her. I prepared the photos for release to HarperCollins Publishersone of the world’s largest publishing companies. HarperCollins is one of the “big five” leading book publishers. It is an honor to be asked to do creative work for the accomplished daughter of New York Times bestselling author, Tony Hillerman.

Anne Hillerman’s newest book is set for release through HarperCollins in May of 2015, and is titled Rock with Wings. I’m sure the new mystery will feature Shiprock, a natural formation on the Navajo Nation in San Juan County, New Mexico. In Navajo, Tsé Bitʼaʼí means “rock with wings” or “winged rock.”

AnneHillerman_PhotoWork_Dec2014

Unique Identifiers: A Closer Look at Biometric Technology in New Mexico

December 3, 2014
Biometrics_by Felicia Lujan_December2014

|Biometrics~ A digital composite by Felicia Lujan. This composite is composed of 13 layers, 8 masks, 3 color overlays, and a Gaussian blur. The composite includes images of binary code and components of ocular, palm vein, and voice recognition scans.|


**NOTE: This research was
not intended to promote or
renounce the use of biometric
systems, though I do find the
technology extremely interesting
and useful in most cases. I
understand that the use
of this technology is considered
controversial by some. I intend
to continue my exploration into
how biometric technology is
being used around the world
for the greater good.

________________________________
I am an archivist with a deep love of technology, which is one reason I pursued a masters level certification in digital information management. A little over a week ago, I was in a meeting that reignited my interest in biometrics. I must admit that I was naïve in my assumption that my state was not a pioneer in this industry. First off, I didn’t know that the central nervous system of New Mexico state government (aka the State Data Center at the Department of Information Technology) utilizes biometric technology as a method of security. After that meeting I came home curious about how involved New Mexico is when it comes to biometric research and implementation. The writer, the researcher, the analyst, the special agent in me took over and that night I added biometric engineer to my list of dream jobs that I would love to have. So…what type of education does a biometric engineer need? Most commonly, a biometrics engineer has: a computer science degree; a computer language certification like Java or C++; and good problem-solving, people, and technical skills.

I found an informative link online titled “Become a Biometrics Engineer: Education and Career Roadmap.” Hum? Well, according to this plan, there are only 7 “popular schools” specializing in advancing a career in biometrics. The page said that “biometric technologies include complex equipment designed to analyze personal identification markers unique to each individual, such as fingerprints, ear lobes, vein patterns, voices, and iris shapes.” Through this research, I discovered that the technology is not limited to “individuals” or people here in New Mexico. I did know that biometric engineers were software developers, but there was a lot that I didn’t know before I embarked upon this research over the Thanksgiving break. Ear lobes? Veins? Hum? Didn’t know those were used as unique identifiers? We are all well aware of the TV shows touting the sexy use of biometrics, like CSI and most recently my beloved Scandal, but that’s just on TV right? A dead guy’s index finger couldn’t possibly be used to confirm his identity? Could it Shonda? Maybe I should ask Chien Le?

The most information dense white paper I discovered was written by Chien Le of the Department of Computer Science and Engineering at Washington University in November of 2011. Le wrote A Survey of Biometrics Security Systems and his research introduced biometric security systems. It also outlined application fields for biometric technologies, solutions, middle-ware and software, advantages and disadvantages, acronyms, and the future uses of biometrics. Damn! Chien Le beat me to the punch didn’t he?! Here it was…all laid out for my thirsty mind. Le’s paper says there are “seven basic criteria for biometric security systems.” These are “uniqueness, universality, permanence [hummm?? Do I hear digital preservation?], collectability, performance, accessibility and circumvention.” I don’t completely understand some of the criteria, but it was very useful to read over the types of biometric solutions outlined by Le. Current technologies include: facial recognition detectors, fingerprint readers, voice recognition, iris scanners, vein recognition, DNA biometric systems, and 2D barcode scanners, among others.

This technology can have good uses, but there are many privacy advocates who are against the use of any biometrics. In December of 2013, Scientific American published Biometric Security Poses Huge Privacy Risks by Oliver Munday with a byline which read “without explicit safeguards, your personal biometric data are destined for a government database.” The article starts with the sentence “security through biology is an enticing idea.” Yeah it is. Is that all it is though? An idea? I think not. Maybe I’m not worried about privacy as much as I should be? The article is basically a call to United States Congress for “lasting protections against the misuse of biometric data.” Munday quoted an attorney with the Electronic Frontier Foundation who seems to fear that biometric data will be used genetically to test for criminal predisposition. I’m actually not sure that’s a bad thing? I guess my only concerns at this point would be relative to health information and insurance coverage. When it comes to physical security and data security, personally, I think that biometric technology is necessary. It is a way to uniquely protect data, which in the end equals the preservation of knowledge and heightened security.

Over the weekend I started whittling through what I found. I read a great deal of articles and a few white papers before I started to look at projects going on closer to home. The more I researched this topic, the more information I found. I was most interested in how biometric systems actually work, so I focused my mind on the technical aspects. I had questions like…what are the major components of a biometric system? Who uses these systems? One of my questions was answered in Le’s paper. I have a sore throat now, so last night I wondered…what if a person needed to use voice recognition and something was wrong with their voice? How is that accounted for in designing a successful system? According to Le, there was no solution. A voice recognition system will not recognize a hoarse voice wave. So now that we have some background on the basics of biometrics, let’s take a look at what I found going on right here in my state. I was able to locate information on at least ten concrete areas where biometric technology is being used in New Mexico from at least 2003-2014. I’m sure there are many projects I missed, but frankly, this could be a thesis and maybe even a dissertation. This is just a quick look at highly visible projects I came across over the last week.

We will start with the New Mexico Department of Information Technology (DoIT) since it is a meeting with this office that rekindled my interest in this technology. DoIT is “responsible for infrastructure IT services provided 24x7x365 which includes: the State’s telecommunications system, two-way public safety radio, digital microwave, the State’s core data network and internet connectivity, and the State’s Data Center.” It is here, in the State Data Center where biometric technologies are being used for data security. I felt impressed with my state when I learned that and tomorrow I will get a tour of the center. “The State’s Data Center provides a secure facility with redundant power and cooling which houses many of the State’s critical IT systems including the State’s mainframe and agency servers. This division also provides enterprise system services which include the State’s consolidated email system…” It will be interesting to see what type of biometric security the agency is using as of late. I am guessing a finger or palm scanner?

The two strangest projects I found information on were tied to the use of biometrics on kids and animals in New Mexico. On April 3, 2013, there was a news release put out by KOAT (channel 7) titled Los Lunas School Offers Biometric Scans at Lunch. What? Seriously? Yes. Seriously. The school apparently tried to implement a palm vein scanner in the lunch room instead of good old meal tickets or cards. Parents were not happy about the suggestion of using infrared wavelengths (electromagnetic radiation) during the lunch hour to ID their children. The parents fought off the proposal which would have allowed scanners to recognize a unique vein pattern in the child’s palm and they won. I wasn’t sure which seemed stranger…scanning kids or scanning animals? I also read about how the New Mexico livestock industry is using Retinal Vascular Pattern (RVP) for livestock identification. RVP is the pattern of blood vessels at the back of the eye. It’s is being called the new way of branding animals. I wonder how ranchers feel about that since they must prefer the old burn and freeze methods? What’s a brand without cowboy symbology right?

I discovered that the national labs and the air force bases are also using biometrics. Of course, this was no surprise. I read a white paper Chris Aldridge prepared for Sandia National Laboratories and Lawrence Livermore National Laboratory in June of 2013. Sandia Report No. SAND2013-4922 is titled Mobile Biometric Device (MBD) Technology: Summary of Selected First Responder Experiences in Pilot Projects. This report was concentrated on the use of MBDs to enroll individuals in databases and perform “identification checks of subjects in the field area,” for “military, law enforcement, and homeland security operations.” The report was a multi-agency/multi-state project with 3M Cogent Systems and involved: Iowa, Colorado, California, D.C., Texas, Washington (Seattle), Arizona, Virginia, West Virginia, Illinois, Wisconsin, Arkansas, and Idaho. I think the most interesting part of this study used a “mock prison riot” for first responders out of West Virginia. We all know how critical that information is given New Mexico’s prison riot history. Many of the agencies studied for this report are using “Fusion devices.” Fusion was developed by 3M Cogent Systems for the Department of Defense. A large part of studies in this field are tied to law enforcement, but currently the technology trend is leaning towards cyber security.

The National Institute of Standards and Technology (NIST) says biometrics are important because they: secure facilities, protect access to computer networks, counter fraud, screen people at our borders, and fight crime. The NIST says this technology is used to manage identities for: first responders at the scene of a natural disaster, border patrol, soldiers in theater, and police officers on the street. It makes sense that the following projects are closely related to the projects cited in the Sandia report. In New Mexico, the Federal Bureau of Investigation (FBI) uses the Combined DNA Index System (CODIS) to support criminal justice DNA databases. The National DNA Index System or NDIS is part of CODIS. The FBI uses biometrics to analyze data from DNA databases and for latent print analysis. Holloman Air Force Base is using the 49th Security Forces Defense Biometric Identification System which is comprised of hand-held scanners. The scanners are used to screen people entering the base to verify the access authorization. Identity is established using barcode technology and fingerprints. In February of 2011, it was announced that Santa Fe County was using biometrics to “remove aliens convicted of a crime.” It can also be noted that between 2003 and 2005, the National Academy of Engineering (NAE) researched the use of biometrics in handgun grips while working with a New Mexico biometrics company. The NAE was interested in developing biometric grip sensors, but a 2005 report declared the tests a failure.

I also located evidence of the health care systems in New Mexico using biometric technology. The University of New Mexico Hospital (UNMH) offers Biometrics Screening Services as part of Employee Health Plans. These screenings are said to align with recommendations of the United States Preventive Services Task Force (USPSTF). Ommmm…Maybe this is where my privacy fears rest? In 2013, the American College of Occupational and Environmental Medicine released a Joint Consensus Statement on Biometric Health Screening for Employers. According to the “statement,” the United States Center for Disease Control and Prevention defines biometric screenings as “the measurement of physical characteristics such as height, weight, BMI, blood pressure, blood cholesterol, blood glucose, and aerobic fitness that can be taken at the worksite and used as part of a workplace health assessment to benchmark and evaluate changes in employee health status over time.” I am a fitness freak, but that seems crazy? What if something is wrong with me and I don’t know? The statement outlines the “purpose of screenings” and I found it kind of scary. What if they find out I experience shortness of breath or I’m genetically predisposed to cancer? Will they drop me from my insurance plan?

In New Mexico health circles, I also located a “Fingerprint Techniques Manual,” which was prepared by the New Mexico Department of Health. The manual had very interesting graphic illustrations on the fundamentals of fingerprints. This training tool covered from patterns to arches to loops to lines to deltas to cores to whorls to scars of the fingerprints. The machines can read all these intricate things. The Division of Health Improvement uses this technology as part of the Caregivers Criminal History Screening Program. Makes more sense than the biometric screenings. I feel comfortable with this use. This type of use can protect people from abuse or other forms of criminal activity. I was rather impressed with the 36 page manual. It reminded me that about 15 years ago I applied for a finger print technician position with the Department of Public Safety. I was crushed to learn that these people don’t make very much. I don’t know…I guess you have to be a biometrics engineer to make it out there!? What I do know is that I found a great deal of information about how New Mexico is actively participating in the biometric industry.

I gained useful knowledge through this research into biometrics and then regurgitating what I learned. My son just asked me what I was writing about and when I told him he looked at me with the curiosity that I love and see in myself. I told him “I’m writing about biometrics. Do you know what that is?” I explained with words and then decided it was easier to show a nine year old a catchy tech video with visual candy. Together we learned about the future of biometric systems. Between October and November of this year there were several videos on the use biometric technology. The National Science Foundation released information on a project by a young man studying the use of ocular biometrics in the video game industry for disabled people. In October the Telegraph out of the United Kingdom released a video declaring that we would simply kill passwords with biometrics and CBS news declared that biometric palm scans will help keep hospitals secure.

The future of biometrics is here. It is everywhere and happening all around us. Biometrics is about identifying who we are and not who we say we are. Tonight I learned that the most accurate method for a biometric reading is the heartbeat or an electrocardiogram (ECG). Makes sense ha? It’s symbolic actually. Symbolic because the heart is at our biometric core. It is the giver of life. The heart represents how we feel and who we are. That beat is indeed is a unique identifier.


Sources:

News release, Santa Fe County and All New Mexico Now Benefit from ICE Strategy to Use Biometrics to Identify and Remove Aliens Convicted of a Crime, released on ice.gov, February 15, 2011

White paper, A Survey of Biometrics Security Systems by Chien Le, Department of Computer Science and Engineering, Washington University, November 28, 2011

News release, Los Lunas School Offers Biometric Scans at Lunch, released on koat.com, April 3, 2013

White paper, Mobile Biometric Device (MBD) Technology: Summary of Selected First Responder Experiences in Pilot Projects by Chris Aldridge, Sandia Report No. SAND2013-4922, prepared by Sandia National Laboratories and Lawrence Livermore National Laboratory, June 2013

Article, Biometric Security Poses Huge Privacy Risks by Oliver Munday, released on scientificamerican.com, December 17, 2013

Publication, Fingerprint Techniques Manual, prepared by New Mexico Department of Health, Division of Health Improvement, Caregivers Criminal History Screening Program, no date

Various internet searches for basic information in articles and videos

Internet Archive offers 900 classic arcade games for browser-based play | Ars Technica

November 17, 2014

I heard about this a while back.
This is awesome!
~~~F

infophile

As part of its continuing mission to catalog and preserve our shared digital history, the Internet Archive has published a collection of more than 900 classic arcade games, playable directly in a Web browser via a Javascript emulator.

The Internet Arcade collects a wide selection of titles, both well-known and obscure, ranging from “bronze age” black-and-white classics like 1976s Sprint 2 up through the dawn of the early 90s fighting game boom in Street Fighter II. In the middle are a few historical oddities, such as foreign Donkey Kong bootleg Crazy Kong and the hacked “Pauline Edition” of Donkey Kong that was created by a doting father just last year.

READ MORE: Internet Archive offers 900 classic arcade games for browser-based play | Ars Technica.

View original post

Notes: Case Study- How We Did It: Lessons from IG’s Smartest Peers

October 29, 2014

image

Case Study- How We Did It: Lessons from IG’s Smartest Peers (Enterprise Records Management at Comcast) presented by Ralph Furino, Comcast Corporate Records and Information Management and Tamara Hoagland, Information Management Specialst with Information First, Inc.

ARMA Live Conference
San Diego Convention Center

This session focused on the use of HP Records Manager (formerly HP TRIM). The software “is a scalable enterprise document and records management (EDRM) solution that simplifies the capture, management, security, and access to your information in business context.”

•••They ingest records using TRIMport as Text Tabbed Delimited files.

•••Metadata is extracted and
encrypted data is uploaded to a secure FTP site.

•••Files are decrypted in a batch program to concatenate multiple metadata files into one import file.

•••They are able to run an “empty container report” to see which images didn’t transfer.

•••The use WebDrawer is part of the  standard license of HP TRIM/RM.

•••Images displayed in WebDrawer are the masters and not a copy.

•••The system can be set up to host anonymous users, named users or super users.

•••Active Directory is used to control security with regard to anonymous access.

•••Searching is done via WebDrawer in a web portal.

•••Supports more than 1,300 viewer formats.

•••Records can be redacted electronically while preserving the integrity of the master image.

•••When records are destroyed, metadata is retained and the master digital image is overwritten 10 times, which is in accordance with federal destruction standards.

•••It was recommended (for data integrity) not to use leading zeros on any numeric field because data will be truncated and difficult to manipulate/search.

•••Make sure to complete an upgrade and user acceptance testing in a development environment before moving into a production environment.

•••Use the Software Development Kit (SDK) to develop automated electronic image imports instead of HPTrim port.

•••Back end database utilizes Oracle and SQL.

My questions were:

Is there a digital preservation module with HP Records Manager which allows for check sums and object validation? Answer was yes.

Is there a way to search multiple documents which have been retrieved and automatically identify confidential information for redaction? Answer was yes.

Notes: Can You Destroy Paper Records That Have Been Imaged?

October 29, 2014

image

Can You Destroy Paper Records That Have Been Imaged? Presented by Robert Williams and Ronald Hedges, J.D.

ARMA Live Conference
San Diego Convention Center

Take a look at White Paper Cohasset prepared for IBM on the legality of digital image copies.

Uniform Photographic Copies of Business and Public Records Act (UPA) Conditions= records and copies must be made in ordinary course of business

Decision tree under the Federal Rules of Evidence is often used for the steps of admissibility with regard to trustworthy evidence.

For more on authenticity of email look at the Lorraine Decision.

Records can be destroyed once they are imaged if: they are no longer required in the regular course of business; and they are not be subject to any active legal hold order.

Defensible Disposition= complying with all internal processes, you are meeting legal requirements, you are following a retention schedule, use compliance forms.

How do you make the process of disposing records defensible?
1- By what authority were the records destroyed, 2- How were they destroyed, 3- Who destroyed the records, 4- When were the records destroyed

Management Evidence details goals, policies and procedures

Notes: Strategies to Deliver Unstructured Data as Relevant Data

October 29, 2014

image

Strategies to Deliver Unstructured Data as Relevant Data presented by Adele Carboni, CRM, PMP

ARMA Live Conference
San Diego Convention Center

Focus on unstructured data
Unstructured data= 80%
Structured data= 20%

Defining Taxonomy

Taxonomy Support= organizational chart, records retention schedule, review of shares structure currently being used.

Taxonomy goals= develop a controlled vocabulary, metadata relationships, provide non-technical users with a way to visualize and verify data, utilize attributes to allow for search to narrow results

Taxonomy Development= Browsing, Search, Hybrid, Index, Classify, Auto-classify

In a manual taxonomy structure in the electronic environment, if a folder isn’t being used, then it is removed if it hasn’t been used between 3-6 months for a taxonomy filing.

Retention Schedules go hand and hand with taxonomy (functional taxonomy or departmental taxonomy)

Assign retention at the highest level possible. Assign filing at the lowest level possible. Understand parent/child relationships.


betsyrandolph's Blog

4 out of 5 dentists recommend this WordPress.com site Or so I've been told.

Ebony and Crows

A dark spill of worlds and words

Dr. Eric Perry’s Blog

Motivate | Inspire | Uplift

Krivs Studio Blog

Profiles, Features, Interviews, Contest News and more from the Studio

Premier Performance

Become Your Best

Discover WordPress

A daily selection of the best content published on WordPress, collected for you by humans who love to read.

Matiuadex Gallery

Movies, Music, Celebrity, Gists, life style and many more

FITNESS SALVATION

Fitness Without The Fluff

Taylor Network of Podcasts

Podcast, News and Articles

deverepaynept.wordpress.com/

Build the best version of you!

DEDRIAN E COLON

SOCIAL MEDIA CONSULTANT

I didn't have my glasses on....

A trip through life with fingers crossed and eternal optimism.

%d bloggers like this: