SlideShare une entreprise Scribd logo
1  sur  34
Jesse Wilkins, CRM April 28, 2011
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Jesse Wilkins, CRM April 28, 2011
[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technology supports each phase of the lifecycle – both physical and electronic records
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishGuillaume Lagache
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Alexis Brown
 
EUGENIA TEN BOOM Resume for 2016
EUGENIA TEN BOOM Resume for 2016EUGENIA TEN BOOM Resume for 2016
EUGENIA TEN BOOM Resume for 2016Eugenia Ten Boom
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Togethermyeaton
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technologydmeyeravc
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 

Tendances (20)

Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Data security
Data securityData security
Data security
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009
 
EUGENIA TEN BOOM Resume for 2016
EUGENIA TEN BOOM Resume for 2016EUGENIA TEN BOOM Resume for 2016
EUGENIA TEN BOOM Resume for 2016
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technology
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 

En vedette

20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business AssessmentJesse Wilkins
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keepingRex Mwamba
 
Electronic Records Management An Overview
Electronic Records Management An OverviewElectronic Records Management An Overview
Electronic Records Management An OverviewKen Matthews
 
Application of information technology in different areas
Application of information technology in different areasApplication of information technology in different areas
Application of information technology in different areasRobiul Awal
 
Electronic records management
Electronic records managementElectronic records management
Electronic records managementKirti Joshi
 
Effective Records Management Introduction
Effective Records Management   IntroductionEffective Records Management   Introduction
Effective Records Management IntroductionFe Angela Verzosa
 
How to implement Electronic Records Management?
How to implement Electronic Records Management?How to implement Electronic Records Management?
How to implement Electronic Records Management?Atle Skjekkeland
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySukanta Biswas
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?Atle Skjekkeland
 

En vedette (10)

20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment20130602 ARMA Canada Conducting a Social Business Assessment
20130602 ARMA Canada Conducting a Social Business Assessment
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keeping
 
Electronic Records Management An Overview
Electronic Records Management An OverviewElectronic Records Management An Overview
Electronic Records Management An Overview
 
Application of information technology in different areas
Application of information technology in different areasApplication of information technology in different areas
Application of information technology in different areas
 
Electronic records management
Electronic records managementElectronic records management
Electronic records management
 
File And Records Management
File And Records ManagementFile And Records Management
File And Records Management
 
Effective Records Management Introduction
Effective Records Management   IntroductionEffective Records Management   Introduction
Effective Records Management Introduction
 
How to implement Electronic Records Management?
How to implement Electronic Records Management?How to implement Electronic Records Management?
How to implement Electronic Records Management?
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI Technology
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 

Similaire à 20110428 ARMA Amarillo IT for Records Managers

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 

Similaire à 20110428 ARMA Amarillo IT for Records Managers (20)

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Document Life Cycle
Document Life CycleDocument Life Cycle
Document Life Cycle
 
Dstca
DstcaDstca
Dstca
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Critical Water and Wastewater Data Security
Critical Water and Wastewater Data SecurityCritical Water and Wastewater Data Security
Critical Water and Wastewater Data Security
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 

Plus de Jesse Wilkins

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 

Plus de Jesse Wilkins (20)

20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
 
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
 
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

20110428 ARMA Amarillo IT for Records Managers

Notes de l'éditeur

  1. At this point I’d be pleased to entertain your questions.