AIIM True North would like to invite you to a webinar on November 23, 2021 at 1:00 PM ET. The presentation will describe how to build a predictive Machine Learning model using historical data. This webinar is eligible for 1.0 CEU . Please use the CEU submission process at this link: CIP...
11-23-2021 | 13:00 - 14:00 ET
Missed AIIM 2014? Or did you just miss out on a session or three you wanted to see? In the coming weeks, we'll be sharing many of the presentations with you. Actionable advice and thought leadership brought to you by some of the smartest people in the information technology industry. ...
Missed AIIM 2014? Or did you just miss out on a session or three you wanted to see? In the coming weeks, we'll be sharing many of the presentations with you. Actionable advice and thought leadership brought to you by some of the smartest people in the information technology industry. Jason...
Once again, I want to say you thank you so much for choosing to attend my session. You were a great audience and I am sorry about going over and not having a chance to answer everyone's questions. Below are answers to questions from the app as well as the sources I referenced: ...
On Wednesday, April 2 at 8:30, get ready for a cognitive reboot as we kick off AIIM 2014 with Thornton May's keynote presentation, Don't Blow your (S.M.A.C.) Stack. Thornton explains, as a futurist I am obligated to attempt to identify inflection points — things that fundamentally disrupt...
In today’s big data economy, it is widely held that companies that invest in and leverage information outperform those that don’t. Those that have adopted a data-driven culture are seeking better ways to access and capture key information to help continually improve their analytic capabilities....
One of my favorite memes of the modern technology era are those funny texting autocorrect disasters , where people mean to say one thing, but the ever-helpful device replaces a few choice words to make the actual reply, once you've committed and hit 'Send,' something comical. It'...
As I outlined here , an effective defensible disposition methodology primarily consists of developing and then executing four major stages: The Defensible Disposition Policy The Technology Plan The Assessment Plan The Disposition Plan This...
Last week, during the AIIM Conference, I heard a lot of speakers talk about failure. I heard speakers suggesting that we should “ avoid impossible projects ” in order to insure that failure won’t be an option. I heard speakers suggest that “ if we never fail, we aren’t reaching far enough ” and...
Al Linden previews his AIIM 2013 conference session. Enjoy, and follow #AIIM13 and @AIIMcon for all of the latest news and noise about next year’s event. Alan Linden Senior Technical Consultant EID Inc. Records management and text analytics - a powerful marriage for ECM ...
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use