The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
Business Process Management (BPM) | Process Automation
Today, in the enterprise, nothing is ever at rest; everything is fast and getting faster. From critical business processes, ECM and capture, to human resource management, marketing, or email—everything seems to be running at a breakneck pace. Work is always working, even if we aren’t. Business agility is the coin of the realm.
Share
Intelligent Information Management (IIM)
It's almost Halloween. The time when scary things are on everyone's mind. And now, presenting here for the first time, drawn from a variety of AIIM market research studies...
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
Business Process Management (BPM) | Process Automation
Is "information chaos" in your core business process processes slowing your organization down? Making you less competitive? Frustrating your employees, suppliers, and customers?
Share
I've been collecting examples of "Digital Disruption" -- the negative flip side of Digital Transformation. In other words, examples in which a well-entrenched incumbent just failed to see the writing on the wall.
Share
I recently came across this white paper and rather liked the insights it provided in how to avoid mistakes in choosing a document scanning solution. Here’s a quick snapshot of the ten mistakes contained in the white paper.
Share
Compliance | Information Security | Privacy
The disclosures this week from Yahoo, about government access to private emails, have fueled another round of discussions about the role of privacy and security in an internet/social age. One of the issues that I think is not fully understood about this issue – especially in the U.S. – is the fundamentally different perspectives about privacy that exist in Europe, and how those differences then manifest themselves into policy.
Share