Search

1 to 8 of 8
Sort by

Blog Entry
Risk Analysis and Legacy Data: How to make your Big Data Defensible

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the...

Johannes Scholtes's profile image

Blog Entry
Protecting your Intellectual Property

In today’s global economy the value of an enterprise’s Intellectual Property (IP) assets is very important. In many companies however, IP is not only stored in well protected or encrypted repositories, but also resides on personal computers, laptops, home computers, removable storage...

Johannes Scholtes's profile image


Blog Entry
What's on the top of your list for 2013 Priorities?

http://www.conceptsearching.com/wp/whats-on-the-top-of-your-list-for-2013-priorities/ We recently completed a survey on the key priorities for executives in 2013 as it relates to any application that requires the use of metadata. The respondents included our clients as well as the broader...

Cate Evans's profile image

Blog Entry
How we can make EHR even more secure

Browsing through news online recently, I came across a troubling story. Last month, Emory Healthcare in Atlanta announced that 10 discs containing electronic records on 315,000 patients had gone missing. That’s sensitive information on every patient who had surgery at three...

Greg Bartels's profile image

Blog Entry
A proper backfile conversion is key to EHR implementation success

I recently spent some time participating in a LinkedIn discussion about the most common reasons behind the failure of electronic health records implementations. As I thought through my posts, something dawned on me: The key to successfully transitioning to EHR (or EMR; whatever your preferred...

Greg Bartels's profile image

Blog Entry
Why Legal, IT, Compliance and Investigators Must Work Together!

Last week, I attended a great conference focussed on eDiscovery, information management and legal technology. The goal of this conference was to get IT, legal compliance and investigators to understand each other better and to work together in every ones interest. Among the speakers were: ...

Johannes Scholtes's profile image

Blog Entry
How to Make Content "Intelligent"

I really like the AIIM "Intelligent Information Management" theme. I would like to take that a bit further and propose a "wouldn't it be nice if" scenario, and then explain what I think it would take to get there. This means that the content becomes "intelligent...

Mike Clarke's profile image