“Unstructured” content is a term used to describe the seemingly infinite types of documents that can be found in file shares and personal computing devices. In my last posting I considered some of the differences between structured and unstructured content and discussed how enterprise content management systems represent an attempt to provide the advantages of […]

Read More

In the IT and Information Governance (“InfoGov”) worlds, organizational data is usually thought of as being structured or unstructured. This posting looks at differences between the two, and in the next posting I’ll suggest a best practices approach to thinking about and managing unstructured content. Overview of Structured vs. Unstructured Information professionals often prefer dealing […]

Read More

Every major transition period has its own unique set of risks and rewards. For corporate legal departments consolidating after mergers or acquisitions, risks include not gathering all needed documents, and not being able to integrate the gathered records into one system. The potential rewards lie in having an opportunity to use the integration budget to […]

Read More

Many organizations manage their content using enterprise content management (“ECM”) systems like SharePoint, Office 365, FileNet, Open Text, or Documentum. These ECM systems are really databases that permit organizations to associate various classifications, tags, and descriptions (collectively, “attributes”) to the content being managed and to use those attributes to find specific documents. Parties seeking documents […]

Read More

In enterprise content management, tags are used to help find tagged documents. Tags can provide terms that don’t appear on the face of the documents or they can highlight the importance of terms that do appear. Without tags, full-text searching can result in returning large numbers of irrelevant hits while missing key documents that don’t […]

Read More

Psychologist Dr. Paul Ekman summarized his decades of ground-breaking research on nonverbal communication in his 2016 book, Nonverbal Messages: Cracking the Code. He spent years demonstrating that basic human emotions are displayed with the same facial expressions literally around the world, and his approach to cataloging individual expressions that can reinforce or contradict what a […]

Read More

Law firms are coming under increasing scrutiny for potentially lax security measures. Here are five easy-to-check security items, some physical, some electronic. These types of concerns will grow as the Internet of Things (IoT) grows. VOIOP Network Connections. Polycom, Cisco and other VoIP (Voice Over Internet) phones are connected to computer networks using Ethernet connectors. Unless […]

Read More