Search

1 to 10 of 12
Sort by

Blog Entry
Selecting the Best Security Information Management Tool

IT specialistspurchasing SIM tools need to concentrate on several important characteristics whenexamining and evaluating vendor offers. As environments inwhich SIM systems will be implemented mayvary, all IT supervisors searching for security information management productsshould ask themselves...

David Balaban's profile image

Blog Entry
How to get started with IA, metadata, and taxonomy for EDRMS implementations

In a three-part blog series, we are taking a look at the value that records managers can bring to the implementation of EDRMS systems. In our final post, we provide suggestions on how to successfully apply information architecture (IA), metadata, and taxonomy to EDRMS. As we talked about last...

Ross Nepean's profile image

Blog Entry
A Little Web Security Goes a Long Way

As the opportunities to do business grows more and more each day in the world of ecommerce, it is easy to get swept up in the excitement of completing deals and transactions online. It is simple to focus on the many benefits the internet provides, but that same spirit of excitement and...

Nolan Grayson's profile image

Blog Entry
A Roundup of ECM Usage Patterns

This is a simple guide to ECM usage patterns and solution options to get you started in planning and rolling out ECM. And here in this post I've pulled together a few more resources on usage patterns. Some are more complex than the simple guide. Some are more focused on particular...

Richard Medina's profile image

Blog Entry
5 Points to Consider when Choosing a Project Manager

Picking the right project management tool can be a long and painful process. Apply this quick 5-point test to packages you’re evaluating for your business, and if one passes with flying colors, it could be the right choice for you. Here are the 5 points to consider: 1) Functionality: If...

Sanjeev Kumar's profile image

Blog Entry
Back and Back and Back and Back and Back to Basics

Last week, two members of my small team were preparing a short Introduction to SharePoint training session for a few of our engineers. In a few weeks, one of my team members will be working with Steve Weissman of the Holly Group to prepare a training series on ECM Fundamentals which will be...

Daniel Antion's profile image

Blog Entry
Help us to better understand the use of Process Mapping & Modelling Tools

Some of you may recollect that In 2009, I conducted a survey into the use (or non use!) of mapping and modelling tools, for process improvement. At the time the survey was said to have been the most comprehensive of its kind to have been undertaken. Now I need your help. Much has changed...

Mark McGregor's profile image

Blog Entry
Tool Safety and SharePoint

The use of tools is one of the things that sets humans apart from other animals. Sure, there are other animals that use tools to achieve a task, but only humans have developed a complex set of tools AND the necessary safety precautions to insure we can use them over and over again....

Jeff Shuey's profile image

Blog Entry
Records Matter, Declaration Doesn't

This is a follow up, inspired by Scott’s comment, to my post “ Records – Do They Matter? ” There are two things to keep in mind when reading this: 1) only electronic records are in scope; 2) ISO 15489 . Formally declaring a piece of electronic content as a...

Chris Walker's profile image

Blog Entry
MOSS to MOSS Resuscitation

Information Today's KMWorld held its first ever SharePoint Symposium this past week in Washington DC. A personal highlight was when one of the presenters summoned the cognitive glue that drew an affirming nod in the gallery and binds many KM managers to our critical and often measurement...

Marc Solomon's profile image