Defensible Disposition

Borderless ECM: Addressing the Fragmentation Problem (My AIIM Webinar) by , for

ECM Social Business

Blog Entry

Addressing the Fragmentation Problem Let’s call the challenge we’re discussing the Fragmentation Problem. It’s primarily the outcome of the explosion of “systems... read more

Developing your Assessment Plan for Defensible Disposition by , for

ERM

Blog Entry

As I outlined here, an effective defensible disposition methodology primarily consists of developing and then executing four major stages: The Defensible Disposition Policy The Tec... read more

Which Part of E-Discovery Should You Fix First? by , for

ERM

Blog Entry

The smartest thing I know about information governance and defensible disposition is this: concentrate on focused projects. CMSwire put it this way in a summary of Symantec’s 2012 Sta... read more

Defensible Disposition in a Nutshell -- My AIIM Talk by , for

ERM

Blog Entry

I just gave a talk on defensible disposition at AIIM, and here are the main points. I spend almost no time on the problem of over-retention – 99% of what I say here is about the solution.... read more

Do you really understand the impact of Exponential Growth? by , for

ERM

Blog Entry

The information explosion we have seen in recent times will continue at the same rate indefinitely. You are undoubtedly aware of Moore’s Law, named after Gordon Moore, co-founder of Intel... read more

The Dark Side of Big Data by , for

Blog Entry

The Dark Side of Big Data The ongoing information explosion is reaching epic proportions and has earned its own name: Big Data.  Big Data encompasses both challenges and opportunities.... read more