HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Governance News & Analysis

The Anatomy of a Failed DAM Project

2014-28-August-Operation.jpgAs a consultant, I have seen many DAM projects unfold that ranged from nearly perfect to raging fiascos. In the spirit of learning from mistakes made by others, what follows are some of the most common DAM project failures and tips on handling them.

How to Succeed with DAM

2014-26-August-Horseshoes.jpg“The secret of success is to do the common things uncommonly well.” -- John D. Rockefeller

The question I hear most often from clients in all industries is how do I “succeed” with DAM -- how do I make it a successful system and provide real and meaningful benefits to the organization?

The short answer is that there is no “silver bullet” as to what success is. Success means many things to many people. In many ways, success is having the cognitive capacity to internalize what success may be, and then having the strength to achieve that success and applying that in all that you do. Success in DAM starts by defining what your customers and business want to do with digital assets and then creating the plan to achieve it. What DAM success is not is buying the software and hardware and then pushing the button; DAM is far more than that.

5 Questions to Consider Before Launching a DAM Initiative

2014-25-August-Lights.jpg

In a world with increasing numbers of rich media assets and a diverse set of distribution channels, organizations are taking a closer look at rich media management tools like digital asset management (DAM). However, the market is fragmented, and relatively few big-name vendors offer DAM solutions. The Forrester clients I speak with are often new to DAM (or new to next-generation, customer experience-focused DAM), and are looking for advice on where to get started. What questions should you ask when considering a new DAM system?

HP Fuses Data Management Assets for Internet of Things Play

2014-8-22 HP Strealines Data Business.jpgThe pieces are finally falling into place. Over the past two years since that acquisition, HP has been building up Autonomy’s portfolio and pushing it in a million different directions. Late last night the master plan became clear.

HP is pulling Vertica, HP Autonomy’s core IDOL business, and all of the HP Autonomy Information Management and governance businesses to form the Big Data business group.

It is also taking its Aurasma augmented reality software and tying it into HP Autonomy’s customer engagement solutions to form the Marketing Optimization business group.

Take Back Your SharePoint Governance Plan

2014-21-August-Tug-of-War.jpgLet’s start at the beginning … What is a governance plan? In the IT world a governance plan is typically a set of roles, responsibilities, procedures, policies, etc., that an organization can build around the usage of a particular piece of technology. When you are implementing new software either for the first time or in preparation for an upgrade, a governance plan is important, but depending on the technology, may not always be required.

When you are implementing SharePoint, a governance plan is definitely required.

IBM Focuses on Security Again With Lighthouse Buy

2014-08-12 IBM Identity Access Management.jpg

Hot on the heels of the CrossIdeas acquisition two weeks ago, IBM plans to buy the business operations of Lighthouse Security Group (LSG), again for an undisclosed sum.

LSG and CrossIdeas will be integrated with IBM’s existing identity and access management offering to provide a full suite of software that will protect and manage users’ identity.

My Tolerance for Risk Appetite Is Fading

Making people believe they have effective risk management because they discuss a point-in-time list of so-called “top risks” and set limits for those few risks is making them believe in fairies.

It is setting them up to be surprised and for a failure to deliver success.

CrossIdeas Acqusition Underlines IBM's Security Drive

2014-31-July-crossideas.jpg

IBM seems hungry for acquisitions, even though its revenues are down two percent on the year. The latest buy comes in the shape of CrossIdeas, a Rome, Italy-based cyber security vendor.

Financial details of the deal were not disclosed, which means Big Blue probably got it relatively cheap. It also underlines IBM’s growing strength in the security space after it took third position as the biggest security vendor globally after Symantec and McAfee, pushing Trend Micros into fourth place.

Design Information Systems with SharePoint in Mind

Any company that stores information on a computer is storing knowledge. But not all companies have an effective knowledge management system in place to manage that information. That depends on how the system was planned and how it is managed on an ongoing basis.

Whether you have a new system or an existing one that encompasses several different platforms, it's important to assess whether it is delivering all that it can for your organization. How can you do that? An (enterprise content management) ECM Reference Architecture can help you understand gaps and redundancies from a platform perspective.

Actiance Wants to Help Companies Curb Social Media Mistakes

New York politician Anthony Weiner's sexting scandal. Actor Ashton Kutcher's defense of the late Penn State football coach Joe Paterno. Former corporate communication director Justine Sacco's racist comment.

If mistakes like these have taught us nothing else, it's that social media can create viral reactions that linger on and on. It also proves that, contrary to popular belief, there is such a thing as bad publicity.

What are the consequences?  In an office environment, not only is a job on the line for the offending employee, but companies can easily find themselves at the wrong end of a lawsuit filed by the offended worker.

What's worse, many companies have yet to establish social media polices — and even some that do adopt policies find they may violate federal labor laws.

What Continuous Compliance Success Looks Like

2014-17-July-King-World.jpgThere is no specific, prescriptive path to guarantee your business will be covered for every eventuality and incident it may encounter. But by following three steps, you can get you -- and your organization -- in a proactive compliance and security mindset.

Microsoft Tightens Email Security

2014-01-July-Security.jpg

Edward Snowden has done more for electronic security than anyone else. Singlehandedly, he has forced some of the biggest IT vendors to take a close look at data, data transfer, and how it is stored.

This follows the revelation that security agencies across the world were systematically scanning emails.

In response, Google has made much of its email encryption practices and its efforts to secure the contents of the email itself.

Last night, Microsoft, in turn announced that it has upgraded its encryption standards across all its networks.

Big Data Bits: We're Hooking-Up, But That's Not All

2014-20-june-big-data-bits.jpg

Does an alliance or partnership between two tech companies have as much impact as a new software release? We wonder if anyone has ever done the calculations. If so, please share.

As for us, we’ve taken our valuation hats off for the day to report on the big data and analytics news, which is all about (surprise!) new alliances, new capabilities and new releases.

These Trends are Driving Structured Data Archiving

The growing use of Apache Hadoop, increasing data warehouse volume sizes and the accumulation of legacy systems in organizations are all factors fostering structured data growth. To manage it, organizations are being forced to look at data archiving and how to get non essential data out of mainstream enterprise applications.

The findings appear in Gartner’s first Magic Quadrant for Structured Data Archiving. This is the first time that Gartner has produced such a Magic Quadrant, which features 13 vendors in total including the four leaders.

While many enterprises are yet to embrace data migration and archiving, Gartner estimates that migration will represent about 20 percent of all information governance projects. To help enterprises do this, four vendors have emerged as the leaders in the archiving space: HP, IBM, Informatics, and Solix.

In this article, we will explore this quadrant and take a look at emerging trends and the market in general. In a second article, we'll take a deeper look at the leaders and what they are offering. 

 

Communication Is Key to Continuous Compliance

Compliance is no longer a monthly, or even weekly, task -- it’s something that needs constant evaluation and adjustment. Sources change and applicability of control over data should be under consistent review -- that’s the age of continuous compliance we live in today. One requirement of continuous compliance is ongoing, effective and intelligent communication. There are some ways to help improve communication and ensure your compliance and security teams get the best, most relevant and timely information to keep you secure and compliant -- and remain that way.

Displaying 1-15 of 336 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >