Articles

Channel: Information Management

  • Why You Need a Unified Information Strategy

    Why You Need a Unified Information Strategy

    Information is one of the most important business assets, yet organizations continue to struggle with growing information chaos.  Even with continuing advances in technology, buying more tech is not solving the problem.

    Continue reading...

  • Should IT Take a Cue From Ray Kroc?

    Should IT Take a Cue From Ray Kroc?

    In “The Founder,” Michael Keaton plays Ray Kroc, the businessman who took a lowly hamburger stand called McDonald’s and transformed it into an international powerhouse that employs 1.5 million people (making it the second largest private employer in the world) with revenues of $25.4 billion.

    Continue reading...

  • How Secure Is Your Search?

    How Secure Is Your Search?

    Not too long ago we had to convince a search conference security had an important role in search. We've come a long way.  Content security within search is now widely recognized as a requirement.

    Continue reading...

  • Who Owns Your Company's Data?

    Who Owns Your Company's Data?

    Gartner predicted in 2012, that by 2017 CMOs would outspend CIOs on IT.   The prediction was right on the money.  Marketing and advertising technology budgets have continued to rise in the years following the prediction, according to a 2016 survey by the research firm.

    Continue reading...

  • 6 Security Technology Startups to Watch in 2017

    6 Security Technology Startups to Watch in 2017

    Fueled by new payment platforms such as mobile wallets and mobile points of sale (mPOS), digital payments are experiencing high growth and acceptance rates. For instance, 54 percent of Europeans regularly used a mobile device for payments in 2016, up from 18 percent in 2015, according to Visa.

    Continue reading...

  • From Burden to Opportunity: Rethinking the EU's New Data Regs

    From Burden to Opportunity: Rethinking the EU's New Data Regs

    A Dutch artist once said his two least favorite words in the English language were, “Yes, but ….”   Most of his ideas for projects were greeted with those words by a skeptical audience. “Yes, but what about the cost?” “Yes, but what about the requirements?” The list went on.

    Continue reading...

  • What Does the Gimmal Acquisition of RecordLion Mean for IG?

    What Does the Gimmal Acquisition of RecordLion Mean for IG?

    In case you missed it (and if you did, where have you been?) Gimmal acquired RecordLion. Consolidation has long been part of our industry. Enterprise content management (ECM) providers acquired records management solutions to be bolted onto their repositories. E-discovery providers consume each other on a regular basis.

    Continue reading...

  • When 'Acceptable' Risk Is No Longer Acceptable

    When 'Acceptable' Risk Is No Longer Acceptable

    We are used to identifying a risk, analyzing the potential consequences and their likelihood and then establishing a "risk level."  We evaluate whether the level of risk is acceptable or not, based on risk appetite, risk criteria or the like.

    Continue reading...

  • Want to Improve Your IT Team? Then Break Down Silos, Adopt Microservices

    Want to Improve Your IT Team? Then Break Down Silos, Adopt Microservices

    Organizations that break down silos to create cross-functional IT teams benefit from quicker deployments, more efficient patching and overall better services. Seattle-based Chef, which provides support for business infrastructure and applications, announced these and other findings this week in its annual state of IT survey.

    Continue reading...

  • How to Lose Your Business in 10 Days

    How to Lose Your Business in 10 Days

    Code Spaces thought it was prepared for a disaster.  The code hosting provider had backups. It used the cloud. It had successfully operated for seven years.  But one day, in the space of about 12 hours, the company was completely and permanently dismantled.

    Continue reading...

  • The Ins and Outs of Search Application Testing

    The Ins and Outs of Search Application Testing

    Before releasing an enterprise software application into the production environment, the application must jump through a final hoop: User Acceptance Testing (UAT). At this point, the application has already gone through a series of internal tests to ensure the system is bug free.

    Continue reading...

  • Information Management Fuels Your Digital Transformation Efforts

    Information Management Fuels Your Digital Transformation Efforts

    We’ve heard industry pundits and solution vendors evangelize the benefits of digital transformation initiatives. Get a mortgage by applying for a loan and submitting tax and ID forms via a mobile phone.

    Continue reading...

  • Why Cybersecurity is a Business Manager's New Best Friend

    Why Cybersecurity is a Business Manager's New Best Friend

    Say "Silicon Valley startup" and people think innovation. And innovation for many is synonymous with the creed, “Move fast and break things.”  But when Zenefits was caught up in a regulatory scandal, the company reinvented itself with a culture of compliance to regain consumer trust in its software.

    Continue reading...

  • 2017 Cloud Trends: 5 Drivers of Cloud Maturity

    2017 Cloud Trends: 5 Drivers of Cloud Maturity

    "The cloud" is a term thrown around again and again. Yet, often times it is difficult for people to comprehend the full spectrum of its power.

    Continue reading...

Displaying 1-14 of 3255

NL-01a
Get the CMSWire Newsletter
  • Receive concise summaries of what's happening in your industry
  • Get access to exclusive reports, white papers and webinars

lock We take your privacy seriously

NL-03a
Get the CMSWire Newsletter

You'll receive:

  • Exclusive Articles
  • Latest White Papers
  • Early Event Invites

Join 55,000 subscribers and growing

We take your privacy seriously

Get the CMSWire Newsletter

Join 55,000 subscribers and growing

We take your privacy seriously

You'll receive

  • Exclusive Articles
  • Latest White Papers
  • Webinar Invites
NL-03a
Join 55,000
of your peers

Get the CMSWire newsletter.
Access exclusive news, best practices and events.