Recent revelations about the Equifax data breach can be used as a learning moment for managers and business leaders both in terms of specific causes and, perhaps more importantly, as a way of developing systems to prevent similar vulnerabilities. Specific Causes Criminals appear to have accomplished the Equifax data breach by exploiting a website vulnerability […]

Read More

A pirate walks into a bar after many months at sea. As he finishes his second glass of rum, the bartender builds up his courage to ask about the pirate’s missing leg. The pirate replies, “Sad to say mate, but a cannon ball took that off years ago, the first time we exchanged broadsides with […]

Read More

In content management, negation involves the ability to focus on items that are relevant for a particular purpose by removing irrelevant items from consideration. The basic idea of negation is familiar to people who have used the Boolean logical operators “NOT” or “XOR” for full text search – those operators remove irrelevant documents from search […]

Read More

A popular quote on data transfer from the 1980’s reads: “Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway. ” – Andrew Tanenbaum Tanenbaum’s point remains true today: the physical transfer of media containing information can be faster than using the Internet. Of course, today we use FedEx and removable drives, […]

Read More

Migrating unstructured content can involve many moving parts. This can include substantial investments of time and money to extract and then load the files themselves as well as to quality control, aggregate, and supplement existing file attributes. Here are some points to consider when migrating content: 1 – Identify Relevant Stakeholders What business units or […]

Read More

It can cost over $8,000 to originate a mortgage and take a month to complete the processing. A good part of the cost and delay is attributable to the use of non-delineated, multipage and non-searchable TIF/PDF “Blobs” to store scanned or faxed copies of the underlying documents. This is an overview of problems associated with […]

Read More

Email is a valuable tool while you’re alive and could be just as important for your survivors when you die. Email systems store valuable information about many online accounts that contain information of financial and sentimental value, e.g., banking, credit card, investment, utilities and tax information as well as stored photos and videos. Furthermore, personal […]

Read More

Simple text search architecture – where every non-noise word of every document is indexed – doesn’t work well at enterprise scale. This approach consumes considerable IT resources and, from an end-user perspective, returns considerable numbers of irrelevant results for searches. This approach may work on small personal collections where it’s not too burdensome to wade […]

Read More