Thank you for your patience as we undergo a major system migration to improve the services we bring you. We ARE available to assist you if you encounter any problems. Please contact Us.
Borderless ECM: Addressing the Fragmentation Problem (My AIIM Webinar) by , for
ECM Social Business
Blog Entry
Addressing the Fragmentation Problem Let’s call the challenge we’re discussing the Fragmentation Problem. It’s primarily the outcome of the explosion of “systems... read more
Developing your Assessment Plan for Defensible Disposition by , for
ERM
As I outlined here, an effective defensible disposition methodology primarily consists of developing and then executing four major stages: The Defensible Disposition Policy The Tec... read more
Which Part of E-Discovery Should You Fix First? by , for
The smartest thing I know about information governance and defensible disposition is this: concentrate on focused projects. CMSwire put it this way in a summary of Symantec’s 2012 Sta... read more
Defensible Disposition in a Nutshell -- My AIIM Talk by , for
I just gave a talk on defensible disposition at AIIM, and here are the main points. I spend almost no time on the problem of over-retention – 99% of what I say here is about the solution.... read more
Do you really understand the impact of Exponential Growth? by , for
The information explosion we have seen in recent times will continue at the same rate indefinitely. You are undoubtedly aware of Moore’s Law, named after Gordon Moore, co-founder of Intel... read more
The Dark Side of Big Data by , for
The Dark Side of Big Data The ongoing information explosion is reaching epic proportions and has earned its own name: Big Data. Big Data encompasses both challenges and opportunities.... read more