Search

1 to 10 of 16
Sort by

Blog Entry
11 Ways To Use SharePoint for Internal Communications

As part of a recent discussion over on SharePoint-Community.net we have been discussing how to use SharePoint to manage your internal communications. As it turns out there are a lot of features available to you. The list below was created on List.ly and was called '10 (+1) ways to use...

Mark Jones's profile image

Blog Entry
The Public Value of ECM

In addition to sharing some of the experiences my organization has had in this process, my presentation at the AIIM 2014 Conference , April 1- 3 in Orlando, FL, will offer suggestions on how to make a link between internal benefits in a public organization you are striving for and the...

Bryant Duhon's profile image

Blog Entry
Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

Economic crimes such as corruption and fraud are difficult to detect and prevent, but the financial and reputational consequences and the growing public and political demand for harsh action on corporates whose employees break the law are forcing companies to review their security and compliance...

Johannes Scholtes's profile image

Blog Entry
How Technology can Help Investigators to Discovery the Golden W’s

The answers to the “Five W’s” that every investigator knows from school form the basis of the complete story of an investigation: • Who is it about? • What happened? • When did it take place? • Where did it...

Johannes Scholtes's profile image

Blog Entry
The Essential Role of Technology for Law Enforcement and Internal Investigations

Almost every crime leaves a proverbial “paper trail”, but when the probative information spans a vast volume of confiscated documents, electronic records, e-mail, wiretap transcripts, observation reports, cold cases, intelligence, information from telecom and internet providers,...

Johannes Scholtes's profile image


Blog Entry
What Kind of Online Community Do You Have Behind Your Firewall?

As CIOs and Chief Knowledge Officers bring tools that have been used on the Internet – blogs, wikis, microblogs, profiles – behind the firewall, they tend to expect the same results. "We'll have our own Wikipedia!" Or Facebook…or Twitter – you name it....

Steve Radick's profile image

Blog Entry
If You Want a Culture of Collaboration, You Need to Accept the LOLCats Too

This post originally appeared on my blog, "Social Media Strategery." "Even with the sacred printing press, we got erotic novels 150 years before we got scientific journals." - Clay Shirky at TED Cannes in June 2010 This is one of my favorite quotes from one of my...

Steve Radick's profile image

Blog Entry
Enterprise 2.0 Isn't About Social Business, It's Just About Business

Last night, while flying home from the Enterprise 2.0 Conference - Santa Clara , I thought about all of the sessions I attended, the people I spoke with, the demos I watched, and I kept thinking back to something that Dawn Lacallade said in her presentation on Wednesday afternoon: "...

Steve Radick's profile image

Blog Entry
Competing on the Field But Cooperating in the Office

It's not difficult to find examples of sports teams using social media. From the player (Gilbert Arenas' landmark blogging in 2006) to the team (the Red Sox using Twitter to give away free tickets during a rain delay) to the league (the NHL's tweetups ), social media has gone from...

Steve Radick's profile image