Thank you for your patience as we undergo a major system migration to improve the services we bring you. We ARE available to assist you if you encounter any problems. Please contact Us.
Communication Without Litigation, an AIIM 2013 Preview by , for
Blog Entry
Okay, so your organization has incorporated retention rules against e-mails based on the content that each contains. You now retain them in a secure and well managed archive where you can retrie... read more
The Email Pyramid by , for
One of the key issues in Records Management is how to manage email. Email is the dominant content type requested by FOIA and eDiscovery because it often contains the “smoking gun,” a... read more
Email Discovery by , for
Discussion
In the news today it is being reported that email and the discovery of email related to the Penn State Perjury Case could make the difference on how this case proceeds. It is reported that a ser... read more
Often Overlooked by , for
With all the talk about how Microsoft will bundle Yammer with SharePoint and deploy it on 4.6 gazillion Surface ™ tablets and all 42 Windows phones, it seems we are near the end of the &ld... read more
Activity streams ARE the killer feature (but not app) by , for
Things I love: Activity feeds Soccer Cat photos Things I hate: Being CCed on emails Getting emails Sending emails Clowns What is an... read more
The Audacity of Email by , for
If you are serious about social business and reducing the technostress on your staff and customers, do yourself a favor and make a commitment to go on an email diet in 2012. Need a great rea... read more
Secure Email Portals by , for
ERM
I am looking for any information about sending personal information securely. Examples What is the responsibility of the sender Case studies that show the repercussion wh... read more
Avoid Being the IT Guy by , for
Earlier this week, I added a comment to a SharePoint discussion on LinkedIn. The discussion began with the question “How do I send a file from a SharePoint 2010 Library to someone outside... read more
With more and more business-critical data arriving locked away in email attachments, businesses can’t afford not to automate the extraction process. by , for
If you’ve been in business more than a few years, you remember the “old days.” Back then, important documents – invoices and applications, for example &nda... read more
The Wake-up Call by , for
Having spent most of my career working with structured data, I was initially happy to see that the ECM project plan presented at the AIIM ECM Master class, looked a lot like a systems developmen... read more