Search

1 to 10 of 348
Sort by

Blog Entry
Email Management System Requirements

Server operating system and version...User operating system and version. If there is a client or plug-in, it may not run on all operating systems – better to specify and ensure all supported operating systems are identified

Carl Weise's profile image

Blog Entry
Microwave ovens and information systems

Nothing drives me crazier than see organizations throw gobs of money after information systems that were purchased without sufficient diligence being done up front about what they actually need those systems to do

Steve Weissman's profile image

Blog Entry
Time to Scrap Your Existing System?

In my last blog, ECM Vendors Go to War ( http://www.aiim.org/community/blogs/expert/ECM-Vendors-go-to-War ) , it was brought up that upgrades to existing ECRM (CMS) systems will accelerate in the near future

Dan Elam's profile image

Blog Entry
Access Controls in an ERM System

Access Controls are the rules and mechanisms by which an ERM system will restrict access to records by users...This is usually a username which will uniquely identify the user to the system

Carl Weise's profile image


Blog Entry
Tips for Tuning Your ECRM System

It's also the perfect time to take a look at your ECRM system...In order to maximize performance, many ECRM systems take advantage of every feature that the operating system or other applications provide

Dan Elam's profile image

Blog Entry
Proof that Santa has an ECM System

(just kidding) So, in keeping with the Holiday season, I started to look for evidence that not only does Santa exist but that he must have an ECM and workflow system installed at Ye Old North Pole workshop. I admit that my inspiration for this blog post was a November 23, 2010 KnowledgeTree blog post titled “8 Reasons why Santa Claus Needs Cloud-Based Document Management System” that I found on John Mancini’s Digital Landfill feed

Lawrence Wischerth's profile image

Blog Entry
Manually Capturing Records in an ERM System

But even with transitory, or non-record, information that is created in email systems, instant messaging, and a myriad of social networking applications, we can apply structure. In teaching the impact of ERM/ECM systems on organizations’ infrastructure, I found it interesting that many organizations have a number of computing environments with one of them often called the “sandbox” environment

Carl Weise's profile image

Blog Entry
Users Capturing Records into an ERM System

But even with transitory, or non-record, information that is created in email systems, instant messaging, and a myriad of social networking applications, we can apply structure. In teaching the impact of ERM/ECM systems on organizations’ infrastructure, I found it funny that many organizations have a number of computing environments with one of them often called the “sandbox” environment

Carl Weise's profile image

Blog Entry
Users saving their files in an ERM System

But even with transitory, or non-record, information that is created in email systems, instant messaging, and a myriad of social networking applications, we can apply structure. In teaching the impact of ERM/ECM systems on organizations’ infrastructure, I found it funny that many organizations have a number of computing environments with one of them often called the “sandbox” environment

Carl Weise's profile image