1 to 10 of 13
Sort by

Blog Entry
Text Analysis: The next step for eDiscovery, Legacy Information Clean-up and Enterprise Information Archiving

The majority of commonly-used search tools are built to retrieve only the most popular hits—which simply doesn’t meet the demands of exploratory legal or investigative search or for more advanced tasks such as document classification for eDiscovery, Legacy Information Clean-up or Enterprise Information Archiving

Johannes Scholtes's profile image

Blog Entry
Cloud Computing and ECM, 5 things you need to know

How do you handle files and secure access to information?...Access to information . A critical question to ask your provider is "who owns the information?...Can you work with your vendor to reproduce information if required?

Daniel O'Leary's profile image

Blog Entry
Protecting Your Legacy Data in the Great Migration to the Cloud

Enterprises have tremendous concerns about storing business data outside their own walls because it means relinquishing control – control of information, user access, authentication, and data exposure (whether intentional or accidental) of sensitive personally identifiable information, classified information, or otherwise non-compliant content

Matthew Bretzius's profile image