Search

1 to 9 of 9
Sort by

Blog Entry
Global and Proper Information Management in Reach

But, if your organization is involved in a large scale eDiscovery process as a result of a civil matter, or even worse, as part of a regulatory audit, then you have little choice: you have to initiate the (high-cost) process in order to avoid even more costly penalties and sanctions down the road

Johannes Scholtes's profile image

Blog Entry
Cost Of Error In Data Capture

I am constantly reminded in working with clients doing data capture that the cost of error is not well understood or dealt with effectively

Brad Paxton's profile image

Blog Entry
Making Records Management a Part of the Solution

Well this will be a bit of a departure for me as I will only be using the word SharePoint a few times, and only in this paragraph

Dave Martin's profile image

Blog Entry
Give it Away - The Value is in the Knowledge

In fact, if any one of those items were missing, I doubt the software in question would even qualify as an ECM tool...What enterprise is going to live with just core functionality beyond a proof of concept phase, if that long?

Chris Walker's profile image

Blog Entry
ROI for E2.0 – Money Talks

The good news is that there are enough Fortune 500 companies that have embraced and deployed an E2.0 solution in the past 18 months for the start of the emergence of real data available to understand best practices and the real value of their deployments. One of the best practices from these top companies is to focus on one or two very specific business cases that have benefited from the use of an E2.0 solution

Bert Sandie's profile image

Blog Entry
Information Is Currency

When we typically think of currency we think of money, time, hardware and anything that if invested in wisely produces a net profit. For most organization information is one of the most under uitilized forms of currency they have

Jeff Lewis's profile image

Blog Entry
Slash E2.0 Management Costs - Be like an LDAP Service

This often leads to multiple instances of similar technologies, with varying degrees of maturity, being deployed in pockets across the enterprise...Provide a single point of management 3

John Brunswick's profile image

Blog Entry
Is there an ROI in Your Cloud Strategy?

If the CIM system is used to communicate with people outside of the corporate firewall (a typical example), the CIM may be replacing email or FTP services but those services are typically not discontinued because of the CIM

Bud Porter-Roth's profile image

Blog Entry
Business Case War Story – AGAIN

Numbers like the number of FTEs by department or the costs of systems X, Y, and Z tend to be easily accessible...On top of that is the age-old practice of chargeback, or the manner in which internal costs flow through the enterprise

James Watson's profile image