The three most important criteria by which to judge file or document classification and coding systems are Consistency Consistency & Consistency The reason is pretty obvious: without consistency a file classification scheme cannot deliver any of the promised downstream benefits, things like enhanced retrievability, selection of appropriate retention schedules, and setting appropriate security access permissions […]

Read More

Document images often have quality issues that make it difficult to extract text or data elements from them. For example: Forms can have lines running through much of the text. Watermarks can interfere with text recognition. Text orientation may be skewed. Once specific issues have been identified, advanced image enhancement techniques can greatly improve the quality and quantity […]

Read More

…Hitting the Sweet Spot The value-complexity curve provides a visualization of the value added to organizations by enterprise search. Initially value grows as the volume of content being managed grows. However, at some point enterprise search becomes more difficult to use as volume continues to expand and users experience increasingly cluttered and incomplete search results. […]

Read More

The decreased costs of cloud storage now enable companies to migrate back-up tape data to the cloud to achieve lower overall operating costs. Companies providing the software and hardware to read tapes and upload their contents have essentially virtualized the existing backup-to-tape paradigm – they’re performing the same functions, just using the cloud as the […]

Read More

Gartner’s Market Guide for File Analysis Software, just released August 4, 2015, features BeyondRecognition along with other 25 other providers. BeyondRecognition is the only provider that classifies documents based on their visual appearance, not on a text-based analysis. The Guide, written by Alan Dayley, Debra Logan, Jie Zhang, and Garth Landers identifies the key use cases for […]

Read More

Perhaps the best way to see how new technology can be used is to in essence “ride along” as it is being put to use by a client. That’s what this posting does – takes you along during the critical phases of implementing a visual classification project. We pick up after the client has mapped […]

Read More

Whether an organization is trying to consolidate individual information silos, incorporate content acquired by merger or acquisition, or permit federated search, the challenge is determining where is true north in terms of classifying content. That is, to find a way to first group or classify documents consistently regardless of any one person’s view or assessment […]

Read More

File-share remediation or defensible disposition reduces the number of files maintained and reduces the amount of storage space used. This makes for leaner, more useful, less expensive systems. In fact, many costs associated with maintaining and using electronic files are driven in large part by one or both of those metrics. As examples: Here are metrics from one […]

Read More

The legal and reputational risks associated with mismanaging PII and other sensitive data are well known, and one of the most challenging areas is managing PII in  “unstructured” content – the files and documents found on file shares, local drives, and removable media. You know that PII (or PCI or PHI or IP) is in there, […]

Read More

Whack-a-mole describes a situation in which attempts to solve a problem are piecemeal or superficial, resulting only in temporary or minor improvement, as in, “the site’s security team has an ongoing battle against spammers, but it’s a game of whack-a-mole.” See Oxford Dictionaries. The whack-a-mole concept is familiar to those attempting to classify documents using […]

Read More
The BeyondRecognition Network

the-beyondrecognition-network-of-companies