Home /Result for tags: "Information management | governance"
March 12 2015
“Organizations which unify customer communications management (CCM) and web content management (WCM) will receive higher value and improve customer experience versus organizations that keep CCM and... View More
Aug. 18 2015
I’ve covered collaboration technology for many years now and have also been focusing on the people aspect of collaboration as well. After all, collaboration is between people. One thing many enterprises... View More
Aug. 20 2015
Digitech Systems, innovator in enterprise content management (ECM), capture and workflow technology, has released the latest version of its PaperVision Capture solution specifically optimized for the healthcare... View More
Aug. 24 2015
In order to keep me sane on the plethora of planes, trains and automobiles that I use to traverse the world every spring and autumn chasing conferences—or more precisely, the European Union and North... View More
Sept. 2 2015
Last time, we briefly analyzed nine of the most common issues that prevent an effective implementation of electronic document management (EDM) in organizations. Basically, they were all related to the... View More
Sept. 9 2015
Square 9 Softworks, developers of SmartSearch, a highly scalable ECM solution for process automation that drives productivity across all business applications, announced today its partnership with Konica... View More
Sept. 10 2015
If you read the news headlines, you know that gaps persist in the way many organizations deal with information security. Often, the gaps are due to an information security program that relies on a one-size-fits-all... View More
Sept. 14 2015
The results of Protiviti’s 2015 “Vendor Risk Management Benchmark Study,” conducted in partnership with the Shared Assessments Program, can be viewed as cause for optimism—or concern,... View More
Sept. 15 2015
In this multi-dimensional world of business information, where information is created, captured, accessed, shared and managed globally, there is potential for chaos. By chaos, I mean lost or missing information,... View More
April 2 2015
My last article, “Let’s Make RFPs Better–and More Definitive,” presented four keys to making your request for proposal (RFP) process more efficient and more valuable. At least one... View More
June 10 2013
One of the things I hear over and over is that information capture is a challenge due to the magnitude of information creation. We create information at an astounding rate and store it with the expectation... View More
June 24 2014
Leader in mobile and voice customer service, SpeechStorm (www.speechstorm.com), has collaborated with automated customer experience testing software provider, Cyara (www.cyara.com), to develop ‘S-Connect... View More
July 2 2014
After years of consulting, I have learned that the biggest problem we face when looking at implementing a document management system is the status quo. People, whether happy with existing technology or... View More
Nov. 3 2014
We have all been there. The current content management system (CMS) doesn’t seem to be doing the job anymore. People are unhappy, and there doesn’t seem to be any further productivity to be... View More
June 11 2014
Once the need for a signature has been established, there are several methods that can be employed for signing electronic forms. The validity of the signature is all about the process used to collect... View More
July 9 2014
While smartphones still dominate worldwide device sales and many business users rely on their phones for making calls and checking email, the smaller screen size of a smartphone limits their ability to... View More
March 9 2015
In Forrester’s latest report “Brief: Ten Trends Will Reshape Customer Communications Management,” Vice President and Principal Analyst Craig Le Clair writes, “Enterprise architects... View More
July 30 2015
While on the surface, adopting electronic signatures looks pretty slick: send a document, get it signed and, badda bing, you’re done. Well, not so fast there Hondo—these are some of the major... View More
Sept. 29 2009
The high-tech approaches of fighting spam vary widely. The most sophisticated anti-virus, antispyware and anti-spam software programs employ algorithms that attack spam from a broad, structural perspective,... View More
Sept. 11 2014
I’ve talked at length about automation and a bullet-proof process in recent posts. It may seem futuristic, but it’s closer than you think, or want it to be, if you’re not prepared. Considering... View More