Search

1 to 9 of 9
Sort by



Blog Entry
Stealing Your Content for Fame and Fortune

But we don’t talk about how to use ECRM technologies to protect sensitive information...In both cases, the information was made easier to access through the use of various content management technologies

Dan Elam's profile image


Blog Entry
Occupy IT: John Mancini Peers Behind the Fire Curtain

We don't need information professionals to tend to these organizational knowledge gardens...This is no great mystery because free information results in staggering profits for the owners

Marc Solomon's profile image

Blog Entry
RIM to drive up the value of Time Capsules?

For as much as good RIM is about retaining information to meet compliance obligations, to facilitate productivity and to generate competitive advantage, it’s also about disposing of records, non-records and other transitory bits and bytes in a timely manner to reduce risk, free up storage space and keep people from having to trip over it on their search for information of value

Julie Colgan's profile image


Blog Entry
Pricing Models and What Drives The Decision

Large companies tend to be averse to any information that resides outside of their firewall, despite great studies about the security of the cloud like this one

Nick Inglis's profile image