…Hitting the Sweet Spot The value-complexity curve provides a visualization of the value added to organizations by enterprise search. Initially value grows as the volume of content being managed grows. However, at some point enterprise search becomes more difficult to use as volume continues to expand and users experience increasingly cluttered and incomplete search results. […]

Read More

The decreased costs of cloud storage now enable companies to migrate back-up tape data to the cloud to achieve lower overall operating costs. Companies providing the software and hardware to read tapes and upload their contents have essentially virtualized the existing backup-to-tape paradigm – they’re performing the same functions, just using the cloud as the […]

Read More

Gartner’s Market Guide for File Analysis Software, just released August 4, 2015, features BeyondRecognition along with other 25 other providers. BeyondRecognition is the only provider that classifies documents based on their visual appearance, not on a text-based analysis. The Guide, written by Alan Dayley, Debra Logan, Jie Zhang, and Garth Landers identifies the key use cases for […]

Read More

Perhaps the best way to see how new technology can be used is to in essence “ride along” as it is being put to use by a client. That’s what this posting does – takes you along during the critical phases of implementing a visual classification project. We pick up after the client has mapped […]

Read More

Whether an organization is trying to consolidate individual information silos, incorporate content acquired by merger or acquisition, or permit federated search, the challenge is determining where is true north in terms of classifying content. That is, to find a way to first group or classify documents consistently regardless of any one person’s view or assessment […]

Read More

File-share remediation or defensible disposition reduces the number of files maintained and reduces the amount of storage space used. This makes for leaner, more useful, less expensive systems. In fact, many costs associated with maintaining and using electronic files are driven in large part by one or both of those metrics. As examples: Here are metrics from one […]

Read More

The legal and reputational risks associated with mismanaging PII and other sensitive data are well known, and one of the most challenging areas is managing PII in  “unstructured” content – the files and documents found on file shares, local drives, and removable media. You know that PII (or PCI or PHI or IP) is in there, […]

Read More

Whack-a-mole describes a situation in which attempts to solve a problem are piecemeal or superficial, resulting only in temporary or minor improvement, as in, “the site’s security team has an ongoing battle against spammers, but it’s a game of whack-a-mole.” See Oxford Dictionaries. The whack-a-mole concept is familiar to those attempting to classify documents using […]

Read More

In simplest terms, information security involves identifying and protecting information that could somehow damage an organization legally or competitively if it were misused. Achieving those objectives in unstructured content is far easier if the organization first classifies documents by document type and evaluates the types and levels of risk associated with each type. Once that […]

Read More

“Unstructured” content is a term used to describe content stored on file shares, personal computing devices, and content management systems. A major challenge to making effective use of such content is that words can have multiple meanings, and a name can refer to more than one person. Even worse, there can be multiple forms of […]

Read More
The BeyondRecognition Network

the-beyondrecognition-network-of-companies