Resources

Knowledge Management and Information Security Resources

Research, white papers, case studies, articles, and other resources to help organizations make the most of their knowledge, information, and data.  

Responsible Data Use: A 5 Days of Data Twitter Chat

Responsible Data Use: A "5 Days of Data" Twitter Chat By Kelly LeBlanc, Knowledge Management Specialist Over the past few years, responsible data has become a hot topic within the world of international development and humanitarian aid. As funding agencies push for open data and data-driven decision making, and digital technologies continue to evolve, development workers, researchers, and other individuals involved in supporting aspects of the data lifecycle are becoming...

Data Transparency Panel at ICT4D Conference

Responsible Data: Organizational Considerations for Data Transparency & Security May 1, 2019 Join Abby Clobridge (Founder, FireOak Strategies) and Kait Maloney (Project Manager, Data Transparency Initiative, Catholic Relief Services) for a panel discussion about organizational considerations for data transparency and security at the ICT4D Conference. As data transparency is becoming a bigger trend within the international development and humanitarian aid community, organizations are grappling with the practical implications of what...

Adopt a Dataset

Adopt a Dataset and Show Your Support for Open Data and Love Data Week! By Kelly LeBlanc, FireOak Knowledge Management Specialist February 15, 2019 In honor of “Love Data Week” (Feb, 11-15, 2019), Inter-university Consortium for Political and Social Research (ICPSR) is promoting a unique experience for individuals to “adopt a dataset.” This no-cost, no-mess adoption allows the individual to select a dataset hosted by ICPSR and get to know...

Analyzing the Collection 01 Passwords

Collection #1 Password Analysis by Eric Smith, FireOak Strategies Chief Technologist & Information Security Officer February 15, 2019 In January 2019, a massive database of email addresses and passwords was released on the internet. The collection included over 773 million unique email addresses and 21 million unique passwords, credentials that were assembled from many data breaches. The FireOak information security team has analyzed the collection. Two of our key takeaways:...

What We’re Reading 11Feb2019

What We're Reading -- February 11, 2019 The FireOak team keeps an eye out for and shares the most interesting articles, reports, and case studies related to managing, sharing, and securing information, data, and knowledge. Here are some snippets from what we're reading right now. This week: reflections from the University of Saskatchewan on their adoption of Open Educational Resources (OERs). This book chapter explores how the use of OER...

Exporting and Importing AWS EC2 Server Disk Images

We are heavy users of Amazon Web Services (AWS) Elastic Cloud Computing (EC2) and regularly work with clients to help them transition their on-premises systems to the cloud, build a brand-new infrastructure, or evaluate the security of their virtual data centers. Migrating servers to an Infrastructure as a Service (IaaS) like AWS makes sense for most of our clients. Instead of the capital expense of servers and ongoing operating expenses...

Part 1: Create and Export an AWS EC2 Volume Image

This blog post is part one of a 3-part series describing a technique for how to export and import Amazon Web Services (AWS) instance volume images. Read the full introduction for more details. In this post, I’ll demonstrate a technique using standard Linux tools to export an AWS volume to another cloud provider or on-prem storage. For the demonstration, I created an image of a decommissioned ownCloud server and then...

Part 2: Restore and Boot from an AWS EC2 Volume Image

This blog post is part two of a 3-part series describing a technique for how to export and import Amazon Web Services (AWS) instance volume images. Read the full introduction for more details. Part 1 is available here. About the Demonstration In this post, I’ll demonstrate a technique using standard Linux tools to create a bootable AWS EC2 instance from an imported AWS volume image. For the demonstration, I will restore and boot a Windows...

Part 3: Automate the Creation and Export of EC2 Volume Images

This blog post is part three of a 3-part series describing a technique for how to export and import Amazon Web Services (AWS) instance volume images. Read the full introduction for more details. In Part One, I reviewed the steps required to create and export an image of an AWS EC2 volume.  This process works well, but it is somewhat cumbersome and time-consuming for sysadmins, especially when waiting for large...

Want to Stay Informed? 

Sign up for the FireOak Strategies newsletter and have all new resources delivered directly to your inbox. 

Newsletter Signup