Search

1 to 10 of 14
Sort by

Blog Entry
Risk Analysis and Legacy Data: How to make your Big Data Defensible

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the...

Johannes Scholtes's profile image

Blog Entry
Protecting Your Legacy Data in the Great Migration to the Cloud

This is a guest post by Dana Simberkoff, Vice President, Risk Management & Compliance, AvePoint . For most organizations worldwide, it’s no longer a matter of “if” they will move to the cloud but rather “what” they will put in the cloud. Keeping everything on...

Matthew Bretzius's profile image

Blog Entry
Legacy Information Clean-up and Defensible Disposition: What to do if you do not have a filing plan?

There is more than one reason to create a filing plan for your organization. Every business or program must address well-defined objectives which will add value, either directly to the bottom line or toward the achievement of the organization's goals and objectives. Records management...

Johannes Scholtes's profile image

Blog Entry
Do you really understand the impact of Exponential Growth?

The information explosion we have seen in recent times will continue at the same rate indefinitely. You are undoubtedly aware of Moore’s Law, named after Gordon Moore, co-founder of Intel and co-inventor of the computer chip; according to Moore, computer processor and storage capacities...

Johannes Scholtes's profile image

Blog Entry
The Dark Side of Big Data

The Dark Side of Big Data The ongoing information explosion is reaching epic proportions and has earned its own name: Big Data . Big Data encompasses both challenges and opportunities. The opportunity, as focused on by many parties, is to use the collective Big Data to predict and...

Johannes Scholtes's profile image

Blog Entry
Cloud Content Management

Cloud Content Management (CCM) is such a new subject that at the time I wrote this post there is not a Wikipedia entry for CCM. I originally heard the term from Larry Hawes of Dow Brook Advisory Service . Larry was hired by Box (formerly box.net) in 2010 when he was with Gilbane Group. Box...

Shadrach White's profile image

Blog Entry
Text Analysis: The next step for eDiscovery, Legacy Information Clean-up and Enterprise Information Archiving

Text and content analysis differs from traditional search in that, whereas search requires a user to know what he or she is looking for, text analysis attempts to discover information in a pattern that is not known beforehand. One of the most compelling differences with regular (web) search is...

Johannes Scholtes's profile image

Blog Entry
Why Legal, IT, Compliance and Investigators Must Work Together!

Last week, I attended a great conference focussed on eDiscovery, information management and legal technology. The goal of this conference was to get IT, legal compliance and investigators to understand each other better and to work together in every ones interest. Among the speakers were: ...

Johannes Scholtes's profile image

Blog Entry
The Lost Art of Data Destruction: An overlooked key to records management and e-discovery

Although storing 250GB of data can cost less than $250, hiring an external firm to process and review this data for e-discovery can cost up to $1 million. The impact of these costs is particularly noticeable to in-house legal teams and support staff who are often at the front lines of any e...

Johannes Scholtes's profile image

Blog Entry
If you want to be paperless, eat your own dog food

I'm writing this on my iPad, high above California, returning from a conference to which I was invited to present. It was an amazing event save for one oddity: ECM and capture resellers, customers and vendors still rely heavily on paper, almost comically so. At first I thought this...

Daniel O'Leary's profile image