Now, what makes eDiscovery so costly? Well, by far (>70% in many cases) the largest component is the cost of legal review by your external counsel
I am constantly reminded in working with clients doing data capture that the cost of error is not well understood or dealt with effectively
Well this will be a bit of a departure for me as I will only be using the word SharePoint a few times, and only in this paragraph
2 Comments - I’ll comment and elaborate a bit from our perspective on a few of the key points you make: 1. “Exuberance”: Yes, we do have it lately; but often it is being mistaken for something else – i.e., being too pushy for more compliance, or a self-serving attempt to rise out of the (paper) records storage warehouse and intrude upon the domains of IT and Line of Business (LOB)/operational functions. I think we are excited about the Managing Federal Records Directive (at least about the underlying intent/spirit of it, if not some of the specifics)
In fact, if any one of those items were missing, I doubt the software in question would even qualify as an ECM tool...What enterprise is going to live with just core functionality beyond a proof of concept phase, if that long?
5 Comments - I have long maintained that market penetration trumps license revenue (something Microsoft understood a long time ago and the rest of our industry doesn't want to hear...)
The good news is that there are enough Fortune 500 companies that have embraced and deployed an E2.0 solution in the past 18 months for the start of the emergence of real data available to understand best practices and the real value of their deployments. One of the best practices from these top companies is to focus on one or two very specific business cases that have benefited from the use of an E2.0 solution
When we typically think of currency we think of money, time, hardware and anything that if invested in wisely produces a net profit. For most organization information is one of the most under uitilized forms of currency they have
This often leads to multiple instances of similar technologies, with varying degrees of maturity, being deployed in pockets across the enterprise
If the CIM system is used to communicate with people outside of the corporate firewall (a typical example), the CIM may be replacing email or FTP services but those services are typically not discontinued because of the CIM
Numbers like the number of FTEs by department or the costs of systems X, Y, and Z tend to be easily accessible
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use