Message Image  

Blogs

Be the first person to recommend this.
Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally. ( PHIGs IMC Inc – 2014 ) The above graphic, courtesy of the Information Governance Initiative , presents facets of Information Governance. I don’t agree that everything in the graphic belongs under IG, but it does illustrate how all encompassing and complicated IG is. With cloud content management, collaboration, and storage offerings becoming more and more accepted, IG needs to adapt. No longer can organizations...
0 comments
1 person recommends this.
Sehr bedrückend, aber zu erst einmal Ruhe bewahren. Den großen Bruch werden sich weder Groß-Britannien noch die EU leisten können. Dennoch wird ein Exempel statuiert werden. Zumindest wird es lange brauchen, bis neue Verträge die EU-Verträge ersetzen. Über politische und wirtschaftliche Konsequenzen wird aller Orten diskutiert - aber gibt es auch Auswirkungen für das Informationsmanagement? ( http://bit.ly/BrexitInfoMngmnt ) Ja, es gibt sie - oder es wird sie geben. Betrachten wir nur einige Felder, die durch den Austritt Groß-Britanniens aus der EU betroffen sein werden. Da ist zuerst die Frage, ob England die aktuellen EU-.Richtlinien übernehmen...
1 comment

Policy Paralysis

1 person recommends this.
I’ve worked in a number of places, both as an employee and a consultant, that lack a substantive RIM, or Records Retention, policy. On a number of occasions I’ve been in meetings with senior executives who explain that for better or worse, in the absence of a real policy, they have adopted a “save everything policy”. It seems misconceptions persist about what an adopted “save everything policy” really means, especially at the senior executive level. A formal approved policy requiring an organization to save everything would not only be hugely expensive over time, but almost impossible to enforce. Does this mean every draft or aborted effort at something...
0 comments
Be the first person to recommend this.
While much of the advice about how to maximise your chances of success with social collaboration technology adoption focuses on the period following (and including) the launch of your platform, in practice you should be laying the groundwork for this success much earlier, as part of your pilot stage. Most organisations carry out a pilot of some sort before rolling the technology out to a wider audience within their organisation, but often not enough is done to take full advantage of this period. The default purpose of a pilot is typically to make sure that your chosen technology was the right choice for you - or at least that it meets the primary...
0 comments
1 person recommends this.
ECM = Enterprise CHANGE Management Das Akronym ECM hat vielfältige Bedeutungen: die Firma Espresso Coffee Machines, im Militärbereich Electronic Counter Measures und natürlich in der IT Enterprise Content Management. In dem Maße wie sich ECM Enterprise Content Management in Richtung EIM Enterprise Information Management weiterentwickelt, kann man zukünftig das Akronym ECM für Enterprise Change Management verwenden - so die Meinung von PROJECT CONSULT seit dem Jahr 2008 ( http://www.project-consult.de/ecm/in_der_diskussion/ecm_enterprise_change_management ). Letztlich geht es auch bei der Einführung von Enterprise Content Management um die Herbeiführung...
0 comments
Be the first person to recommend this.
In today’s business world, time is a tremendously valuable resource, and efficient use of time by employees is essential in determining the overall productivity of a business. When valuable time is wasted in searching through drawers and file cabinets for elusive paper documents, frustration—and markedly diminished productivity—ensues. Market research firm International Data Corporation estimates that “the typical enterprise with 1,000 knowledge workers wastes $2.5 million to $3.5 million per year searching for nonexistent information, failing to find existing information, or recreating information that can’t be found” 1 . More startling statistics come from...
1 comment
Be the first person to recommend this.
Traducción y adaptación del original publicado por Bob Larrive, Vice President and Chief Analyst of Market Intelligence at AIIM. Durante 2015 el número de Grandes Corporaciones que citan “Riesgo y Cumplimiento” como el mayor driver para Information Management ha aumentado de 38% a 59%, según el informe de AIIM “Information Management – State of the Industry 2016”. Adicionalmente, el 44% de las organizaciones medianas y grandes también indican “Riesgo y Cumplimiento” como el mayor motivador. Entonces, ¿que significa esto realmente? Significa que hay una creciente conciencia y preocupación entre los líderes de negocio: ya no pueden mantener...
0 comments
Be the first person to recommend this.
Another important role of the Information Professional is that of content advocate. This is not a gatekeeper role. It’s a role that ensures the best solution for a particular case is implemented and that the content is managed within the guidelines of corporate standards. Information Professionals look at specific content requirements first, regardless of where and how it’s kept. There Can Be More Than One In the past, many ECM (Enterprise Content Management) vendors believed there could be only one ECM platform inside an organization. This had meant that documents, web content, and digital assets (rich media) all were stored in one system. This...
0 comments
Be the first person to recommend this.
Cerber ransomware has been around since the end of winter 2016. It is one of the most lasting infections among the viruses that keep your data for hostage. The ransomware applies advanced encryption standard so that the files proper gets scrambled without a realistic chance to undo the decryption without the native decryption key. The key is only available from the servers controlled by the crooks. The IT security industry, however, applies effort to block the hackers’ servers. Sometimes they succeed to block all the hubs, and the ransomware makers give up releasing the decryption key to a wide public. That is not the case for the Cerber encryption, though....
0 comments
Be the first person to recommend this.
Yesterday (May 30, 2016) I read this article which contends that Box, Dropbox, and others are not content management platforms. I was considering not linking to the article and just putting up screen shots of the main points, but I decided on the link instead. The article is nothing but FUD (Fear, Uncertainty, Doubt) being spread by an on-premises content management provider (props for dropping Gartner, Forrester, and AIIM names though). As a bit of a refresher on where I stand, you might want to read this whitepaper I wrote last year (sponsored by Box, 12 pages long). By the way, I tried to post a comment to the article, but it seems the site’s not taking...
1 comment
Be the first person to recommend this.
Over the last few weeks I attended the AIIM Conference (the theme was Digital Transformation in Action) in New Orleans, Louisiana, USA and the IRMS Conference (the theme was Information Superheroes) in Brighton, UK. It was my third time at AIIM, at which I did one of the roundtables, and it was my first time at IRMS, at which I did the opening keynote (a genuine honour to have been selected). Both the AIIM roundtable and the IRMS keynote (slides available here ) were innovation themed. This post is not going to be so much a recap of the conferences as much as it will be my take on how innovation, disruption, and transformation fit into the whole Information...
2 comments
1 person recommends this.
Alle Ausgaben des PROJECT CONSULT Newsletter gibt es als Open Access (kostenfrei, registrierungsfrei) in verschiedenen Formaten: Web, Mobile, PDF, ePUB u.a. Der PROJECT CONSULT Newsletter hat die ISSN 1349-0809. http://bit.ly/PC_Newsletter Von 1999 bis 2010 hat PROJECT CONSULT einen öffentlichen Newsletter zur ECM-Branche herausgegeben. Der "PROJECT CONSULT Newsletter" enthielt Meldungen und Kommentare zu Märkten & Trends, Unternehmen & Produkten, Informationen von Verbänden usw. Er berichtete über Ergebnisse von international arbeitenden Marktforschungsinstituten und bot Hintergrundinformationen zu allen Themen von Enterprise Information...
0 comments
1 person recommends this.
Everyday it seems as if another breakthrough is made in tech. Another big moment, cool invention, new business use, or fun toy seems to appear out of thin air. This week, its bigger than usual. Google, one of the internet staples has been open sourcing code and designs for some time. Open-sourcing means to share on the internet and make public to all users. While they are careful to only share relevant information that doesn’t effect their business negatively, sharing code has cemented Google as a brand of innovation, tech leadership, and knowledge. Most recently they open-sourced an important AI code. AI, or artificial intelligence, is the idea that computers...
0 comments
1 person recommends this.
The benefits of providing self-service, community-oriented support to customers and partners in an externally-facing context are broadly recognised - helping to improve the level and speed of service that people have access to, while reducing calls to the helpdesk and lowering organisational costs as a result. However, it's not just your customers and partners that can benefit from this type of approach; there are major advantages to be had from applying the same thinking to your internal support environment too, using social collaboration technologies. One of the key challenges that organisations have when implementing these types of tools...
0 comments
Be the first person to recommend this.
RSA-4096 encryption virus contributes to cyber extortion. It transforms nearly every bit of data on the host device. The files become gibberish. That is, appropriate software cannot read the data. Once the modification completes, a victim is presented with a notification. Unlike the scrambled files, the message by ransomware is readily available for reading in three formats. Those files containing the same message are created in every folder on the computer concerned. The malicious software deploying the crypto attack is currently spreading worldwide. It targets, first of all, the devices registered in the regions with the highest per capita income....
0 comments
2 people recommend this.
As people use more web and mobile applications in their personal lives, they’re expecting more out of technology in their professional lives. The role of the Information Professional has become even more important in these new buying cycles. The Information Professional is to minimize the costs, both in time and money, to the rest of his or her organization as these new technologies are being reviewed. It's the Information Professional's role to clarify all of the various dialects. The Information Professional was a Translator I used to think that one of the roles of an Information Professional was to be a software translator. I like to think...
1 comment
Be the first person to recommend this.
Forrester forecasts B2B e-commerce sales to skyrocket by 2020 as a result of the digital turn. As B2B customers tend to buy more and more online, manufacturers, wholesalers and distributors can benefit from this emerging opportunity to cut their operating costs by providing self-service customer portals. An intuitive customer portal with a coherent structure, rich functionality and relevant information becomes a hard-to-copy competitive advantage that appears much stronger than price discounts. It’s obvious that a good customer portal requires an efficient customer portal software, but for now let’s turn to the pre-development stage and consider...
0 comments
1 person recommends this.
This was taken from the next to last slide (full presentation available here ) from my keynote session at the IRMS Conference in Brighton, UK from 15-17 May, 2016. These things were also included in the ebook Digital Transformation in Action by John Mancini , that was put out in advance of the AIIM Conference in April 2016. These are five things, in my view, that you need to do if you want to foster innovation, transformation, and disruption (the good kind) in your organization. Focus on value, forget risk. - If your entire approach to managing information is based on minimizing risk (litigation, leaks, etc) you are never going to be...
0 comments
1 person recommends this.
I'm a big advocate of AIIM Training, and I have the honor of teaching some AIIM courses on occasion. As with the CIP, when you earn an AIIM training certificate or any other industry credential, you should display it proudly! The Challenge I have seen AIIM training certificate designations typed several different ways. It is easy enough to format these in rich email clients using superscripts for the level (Practitioner, Specialist, Master). But what about text-only fields on sites like LinkedIn and Twitter? Some use something like "ECMm" for Enterprise Content Management Master. That might be okay if only it would work on all designations. Unfortunately,...
0 comments
1 person recommends this.
You may not have heard the term very often, but we are nevertheless on the cusp of a new era: the era of mobile records management . What is mobile records management? At TAB, we define mobile records management as a set of activities, including accessing tracking, organizing and managing information, that are carried out using mobile devices. This new era is being ushered in with the help of mobile-enabled records management software that leverages the computing power of devices such as smart phones and tablet computers. For example, the latest release of TAB FusionRMS allows users to conduct a number of records-management tasks on a mobile app that...
0 comments