HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Eim News & Analysis

FBI Warns Businesses to Brace for Foreign Hacker Attacks

The threat of International electronic terrorism appears to be rising, following two separate reports of hacker attacks on US business and government interests.

The FBI issued a warning about a highly destructive malware attack that may be coordinated by a foreign country and could be continuing over the next few weeks, according to a Reuters report. The warning comes in the wake of last week's devastating hacker attack on the Sony Pictures Corp. that kept many of its systems, including corporate email, down for as much as a week.  

In a separate report security firm Cylance noted that it has identified a hacker group out of a Iran — Operation Cleaver.

Look Who Just Became the Dropbox for Business

Every Enterprise File Sync and Share vendor that is trying to be Dropbox for Business can now take a seat because the actual Dropbox for Business has you beat.

With more than 300 million individual users, Dropbox has become pervasive in our lives, and we’re no more likely to refrain from using it on the job than we are to leave our mobile devices at home when we go to work.

We’d like to do this with our employer’s blessing, of course, and come tomorrow we’ll be one step closer to being able to do so. That’s because Dropbox is opening its API to developers to create enterprise applications and apps on top of the Dropbox for Business platform.

At the Edge of Impossible

2014-02-December-Supernova.jpg

Consider Doctor Who’s Clara, the Man of La Mancha’s dream and Star Trek’s deflector shields. What do they have in common? All are impossible … or are they?

At the beginning of this year, I looked at technology trends and made some predictions. For one trend, I cited fictitious research from Spacely Sprockets: “By 2020, traditional supply chains will no longer exist. Instead all objects will be created at the point of use by 3-D replicators.” Then I predicted that this “dimensional disruption” would drive all supply chains to zero length.

This prediction was intended to be interesting, yet quite impossible. But look at what is happening in our digital universe: fantasy and reality appear to be converging to achieve impossible things.

How to Interpret the Gartner ECM Magic Quadrant

2014-01-December-Interpreters-G20.jpgAmong the many tools organizations use to evaluate enterprise content management (ECM) solutions lies Gartner's research, specifically its Magic Quadrant (MQ), which scores ECM solutions and solution providers in specified categories. But before you turn to the MQ when seeking your next ECM solution, take the following factors into consideration.

What Comet Landers Can Teach Us About Metadata

2014-26-November-Rosetta-Earth.jpgThe recent success of the European Space Agency (ESA) sending the Rosetta probe in orbit around a comet, and the more bittersweet successful landing of the Philae lander has made me nostalgic for the days when I worked with space scientists.

Cyber Monday Phishing Scams Intensifying

2014-26-November-computerdog.jpg

Thanksgiving turkey may symbolize the holiday for most people, but messaging security firm Proofpoint is warning businesses to watch for a whole flock of cyber security threats that peak around Thanksgiving.

In preparation for the rise in phishing scams expected over the weekend, Proofpoint is urging businesses to take particular care with email and social media scams.

Google for Work Puts Security in the Hands of Employees

Microsoft may be making a lot of noise about additional security features in Office 365, but Google has been working away behind the scenes too, if perhaps in a less vocal way. Yesterday, it launched the Devices and Activity dashboard, which monitors Google accounts on enterprise devices.

The new dashboard provides IT administrators a way of monitoring who has been accessing what accounts, where and why, but adds an underlying current to the security discussion that's becoming increasingly important in enterprises: responsibility.

Gartner Names 6 Leaders in Resurgent Information Archiving Space

The financial crisis that started in 2008 changed many things. Financial companies closed down. CEOs lost their jobs. IT changed, too. Over the past few years data governance preservation has become a critical enterprise need. And Enterprise Information Archiving (EIA) is making a reappearance as a key technology to meet that need.

According to Gartner’s Magic Quadrant for EIA (registration required), technologies in this space are getting a second life as businesses turn to them to underpin enterprise strategies for compliance, information governance, e-discovery and the historical preservation of data.

EIA has been around for a long time -- Gartner estimates almost 20 years -- but with the economic crisis came increasingly complicated compliance requirements, resulting in enterprises searching for technology to help manage these complexities.

You Don't Need New Toys to Succeed at ECM

2014-25-November-Too-Many-Toys.jpg

Victory!

We finally did it.

My wife and I have been threatening to throw away, donate or sell the majority of our kids' toys for years. If you are a parent you know the drill. You've accumulated a massive horde of cheap plastic dolls and plush animals with enormous cartoon eyes. Every birthday, Christmas and (let's be honest) trip to the grocery store adds to the collection. Then after what seems like mere hours that toy joins the others in the trash heap you generously refer to as a "play room."

We all know this is the pattern and still most of us fail to correct it or clean up the junk. I'm happy to say that as of Sunday evening 80 percent of the toys in my house have been sorted for disposition, to borrow an industry term. And with the holidays around the corner my wife and I are having conversations about how to handle this gift giving season without falling back into our bad habits.

451 Research's Scoop on Enterprise File Sync and Share

Surprise.

That’s what you’ll find in 451 Research’s latest survey on the Enterprise File Sync and Share (EFSS) market.

“The research presented in this and subsequent reports will be divisive -- welcomed and indeed lauded by some, but very uncomfortable reading for others,” writes analyst Alan Pelz-Sharpe, author of the study. 

Office 365 Digs Deeper Into Lucrative Government Market

2014-24-November-Digging.jpgMicrosoft took a significant step forward late last week in overcoming security concerns related to cloud computing in government agencies. The step came in the form of an announcement that the watchdog body governing the Department of Health has given Office 365 the thumbs up to operate in the department.

Office 365 will be the first cloud based email and collaboration and communication product to obtain a FedRAMP authorization. The authorization could potentially open the doors to a rush of deployments across government services.

Big Data is Getting Smaller and Smarter

2014-24-November-Big-Snail-Little-Snail.jpgBig data is out, small, smart data is in. That’s the word from the folks who have tried to tame big data and failed.

Big data is unwieldy…“useless, or even more than useless because it can distract businesses and consume a lot of resources for no value return,” according to Mike Fauscette, IDC analyst and Group Vice President. In a recent series of articles entitled Transforming Data in Action, Part I and Part II, Fauscette primarily lays the blame with the difficulty of finding "information needles hidden in Big Data haystacks."

Chaos Reigns at Content Management Vendors

2014-24-November-Chaos.jpgThis year has seen a lot of change at the executive levels of multiple Content Management vendors. This has spawned a long list of articles of people speculating what must be going on at the various companies. All the speculation I’ve been able to validate has been wrong. What is really happening is quite simple.

People are starting to panic.

Prevent Enterprise Search From Going to the Weeds

2014-24-November-Overgrown-Greenhouse.jpgAs an Enterprise Search expert, I get a lot of questions about Search and Information Architecture (IA). And what I've discovered is that people have plenty of misconceptions.

I'll share some of them in this article — and hopefully help you avoid some common mistakes about planning and implementing Enterprise Search.

Extracting Insight from Unstructured Data

The pace of digital information has resulted in the world's aggregate data doubling in size in shorter intervals than ever before. According to Gartner, about 80 percent of data held by an organization is unstructured data, made up of information from customer calls, emails and social media feeds. Add to this the large volumes of diagnostic information logged by embedded and user devices. While it's difficult to make a proper analysis from organized data, making sense of unstructured data comes with its own challenges.

Organizations now have to study structured, semi-structured and unstructured data sets to arrive at meaningful business decisions, including determining customer sentiment, cooperating with e-discovery requirements and personalizing offers for their customers.

But while sifting through vast amounts of information can look like a lot of work, it comes with rewards.

Displaying 31-45 of 1673 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >