HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Governance News & Analysis

Hoarders Anonymous for Unstructured Data

2014-19-September-Pez-Collection.jpgDo you have a storage area where you keep items you rarely or never use? Do you periodically sort out your stuff, or do you keep collecting items of debatable value? It’s human nature to hold onto things we never use for extended periods of time -- it's like the junk drawer everybody has somewhere in their house that holds a collection of random items we think are important, but we usually use the same few items every time we open the drawer.

It’s called a “JUNK drawer” for a reason -- because it’s mostly junk, and most of it should be tossed in the trash. So why do we keep these items of questionable value or use?

Why You Must Identify Risks in SharePoint Technology #SPTechCon

information management, Why You Must Identify Risks in SharePoint Technology #SPTechCon

SharePoint stakeholders can't know their risks without knowing their requirements.

And they can't know their risks without knowing the potentially adverse effects of those risks.

Bill English, 11-consecutive SharePoint MVP winner, champions these thoughts. Knowing your risks and potential outcomes can lead to strong governance and compliance.

And as English told an audience here today at the SharePoint Technology Conference at the Boston Park Plaza hotel, "Governance is the enforcement of compliance." 

The Anatomy of a Failed DAM Project

2014-28-August-Operation.jpgAs a consultant, I have seen many DAM projects unfold that ranged from nearly perfect to raging fiascos. In the spirit of learning from mistakes made by others, what follows are some of the most common DAM project failures and tips on handling them.

How to Succeed with DAM

2014-26-August-Horseshoes.jpg“The secret of success is to do the common things uncommonly well.” -- John D. Rockefeller

The question I hear most often from clients in all industries is how do I “succeed” with DAM -- how do I make it a successful system and provide real and meaningful benefits to the organization?

The short answer is that there is no “silver bullet” as to what success is. Success means many things to many people. In many ways, success is having the cognitive capacity to internalize what success may be, and then having the strength to achieve that success and applying that in all that you do. Success in DAM starts by defining what your customers and business want to do with digital assets and then creating the plan to achieve it. What DAM success is not is buying the software and hardware and then pushing the button; DAM is far more than that.

5 Questions to Consider Before Launching a DAM Initiative

2014-25-August-Lights.jpg

In a world with increasing numbers of rich media assets and a diverse set of distribution channels, organizations are taking a closer look at rich media management tools like digital asset management (DAM). However, the market is fragmented, and relatively few big-name vendors offer DAM solutions. The Forrester clients I speak with are often new to DAM (or new to next-generation, customer experience-focused DAM), and are looking for advice on where to get started. What questions should you ask when considering a new DAM system?

HP Fuses Data Management Assets for Internet of Things Play

2014-8-22 HP Strealines Data Business.jpgThe pieces are finally falling into place. Over the past two years since that acquisition, HP has been building up Autonomy’s portfolio and pushing it in a million different directions. Late last night the master plan became clear.

HP is pulling Vertica, HP Autonomy’s core IDOL business, and all of the HP Autonomy Information Management and governance businesses to form the Big Data business group.

It is also taking its Aurasma augmented reality software and tying it into HP Autonomy’s customer engagement solutions to form the Marketing Optimization business group.

Take Back Your SharePoint Governance Plan

2014-21-August-Tug-of-War.jpgLet’s start at the beginning … What is a governance plan? In the IT world a governance plan is typically a set of roles, responsibilities, procedures, policies, etc., that an organization can build around the usage of a particular piece of technology. When you are implementing new software either for the first time or in preparation for an upgrade, a governance plan is important, but depending on the technology, may not always be required.

When you are implementing SharePoint, a governance plan is definitely required.

IBM Focuses on Security Again With Lighthouse Buy

2014-08-12 IBM Identity Access Management.jpg

Hot on the heels of the CrossIdeas acquisition two weeks ago, IBM plans to buy the business operations of Lighthouse Security Group (LSG), again for an undisclosed sum.

LSG and CrossIdeas will be integrated with IBM’s existing identity and access management offering to provide a full suite of software that will protect and manage users’ identity.

My Tolerance for Risk Appetite Is Fading

Making people believe they have effective risk management because they discuss a point-in-time list of so-called “top risks” and set limits for those few risks is making them believe in fairies.

It is setting them up to be surprised and for a failure to deliver success.

CrossIdeas Acqusition Underlines IBM's Security Drive

2014-31-July-crossideas.jpg

IBM seems hungry for acquisitions, even though its revenues are down two percent on the year. The latest buy comes in the shape of CrossIdeas, a Rome, Italy-based cyber security vendor.

Financial details of the deal were not disclosed, which means Big Blue probably got it relatively cheap. It also underlines IBM’s growing strength in the security space after it took third position as the biggest security vendor globally after Symantec and McAfee, pushing Trend Micros into fourth place.

Design Information Systems with SharePoint in Mind

Any company that stores information on a computer is storing knowledge. But not all companies have an effective knowledge management system in place to manage that information. That depends on how the system was planned and how it is managed on an ongoing basis.

Whether you have a new system or an existing one that encompasses several different platforms, it's important to assess whether it is delivering all that it can for your organization. How can you do that? An (enterprise content management) ECM Reference Architecture can help you understand gaps and redundancies from a platform perspective.

Actiance Wants to Help Companies Curb Social Media Mistakes

New York politician Anthony Weiner's sexting scandal. Actor Ashton Kutcher's defense of the late Penn State football coach Joe Paterno. Former corporate communication director Justine Sacco's racist comment.

If mistakes like these have taught us nothing else, it's that social media can create viral reactions that linger on and on. It also proves that, contrary to popular belief, there is such a thing as bad publicity.

What are the consequences?  In an office environment, not only is a job on the line for the offending employee, but companies can easily find themselves at the wrong end of a lawsuit filed by the offended worker.

What's worse, many companies have yet to establish social media polices — and even some that do adopt policies find they may violate federal labor laws.

What Continuous Compliance Success Looks Like

2014-17-July-King-World.jpgThere is no specific, prescriptive path to guarantee your business will be covered for every eventuality and incident it may encounter. But by following three steps, you can get you -- and your organization -- in a proactive compliance and security mindset.

Microsoft Tightens Email Security

2014-01-July-Security.jpg

Edward Snowden has done more for electronic security than anyone else. Singlehandedly, he has forced some of the biggest IT vendors to take a close look at data, data transfer, and how it is stored.

This follows the revelation that security agencies across the world were systematically scanning emails.

In response, Google has made much of its email encryption practices and its efforts to secure the contents of the email itself.

Last night, Microsoft, in turn announced that it has upgraded its encryption standards across all its networks.

Big Data Bits: We're Hooking-Up, But That's Not All

2014-20-june-big-data-bits.jpg

Does an alliance or partnership between two tech companies have as much impact as a new software release? We wonder if anyone has ever done the calculations. If so, please share.

As for us, we’ve taken our valuation hats off for the day to report on the big data and analytics news, which is all about (surprise!) new alliances, new capabilities and new releases.

Displaying 1-15 of 338 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >