Many organizations manage their content using enterprise content management (“ECM”) systems like SharePoint, Office 365, FileNet, Open Text, or Documentum. These ECM systems are really databases that permit organizations to associate various classifications, tags, and descriptions (collectively, “attributes”) to the content being managed and to use those attributes to find specific documents. Parties seeking documents […]

Read More

In enterprise content management, tags are used to help find tagged documents. Tags can provide terms that don’t appear on the face of the documents or they can highlight the importance of terms that do appear. Without tags, full-text searching can result in returning large numbers of irrelevant hits while missing key documents that don’t […]

Read More

Psychologist Dr. Paul Ekman summarized his decades of ground-breaking research on nonverbal communication in his 2016 book, Nonverbal Messages: Cracking the Code. He spent years demonstrating that basic human emotions are displayed with the same facial expressions literally around the world, and his approach to cataloging individual expressions that can reinforce or contradict what a […]

Read More

Law firms are coming under increasing scrutiny for potentially lax security measures. Here are five easy-to-check security items, some physical, some electronic. These types of concerns will grow as the Internet of Things (IoT) grows. VOIOP Network Connections. Polycom, Cisco and other VoIP (Voice Over Internet) phones are connected to computer networks using Ethernet connectors. Unless […]

Read More

The objective of supply chain integration is to make better decisions with less risk by receiving timely information about supply and demand factors occurring up and down-stream. Ideally, this would involve IT system-level integration of companies with all their suppliers and customers for real time access to data in both directions. Unfortunately, multiple significant barriers often […]

Read More

Real property ownership is often depicted on 2-dimensional maps or plats having North-South and East-West coordinates. Two dimensions are adequate when property rights only involve surface uses of the earth or near-surface uses like easements, utility lines or cable. Two dimensions even work when mineral leases cover subsurface property rights so long as all the […]

Read More

Architectural and engineering drawings stored by an organization are often created over many years using multiple systems. However, they can be effectively managed by taking a unified approach to how they are indexed and linked. A unified approach includes a machine-based analysis of: All drawing formats, including scanned paper drawings and native CAD/CAM files. All types of […]

Read More

Glyphs can be used to consistently deconstruct, classify, and attribute large volumes of files permitting effective management of them. Deconstruction breaks files into their smallest visual elements, classification uses data visualization at the page level, and attribution selects specified glyphs or their text values from within classifications. Deconstruction The word “glyph” has several meanings. In […]

Read More

Enterprise Content Management systems enable organizations to work effectively with their unstructured content. ECM typically takes a more holistic view of an organization’s documents than e-discovery and enhances the ability to retrieve and analyze documents beyond what e-discovery is typically able to achieve. ECM classifies unstructured content, provides controlled access to it, and assigns granular […]

Read More
The BeyondRecognition Network

the-beyondrecognition-network-of-companies