The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Capture and Imaging

What Is Intelligent Document Recognition and How Does it Work?

Intelligent document recognition provides three key capabilities that transform unstructured information into the fuel that ignites better processes and insight:

Read More

Blog Feature

Business Process Management (BPM)  |  Process Automation

12 Things You Can Do NOW to Use BPM to Drive Digital Transformation

Process improvement and workflow are not new; in fact, they have been around since the late 1980s. Yes, they have evolved and continue to do so, but as was true of ECM, Business Process Management -- once seen as a nice to have -- is now considered a critical part of business operations.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Business Process Management (BPM)  |  Process Automation

Why Is Getting Rid of Paper Critical to Digital Transformation?

Process improvement and workflow are not new; in fact, they have been around since the late 1980s. Yes, they have evolved and continue to do so, but as was true of ECM, Business Process Management -- once seen as a nice to have -- is now considered a critical part of business operations.

Read More

Blog Feature

Digital Transformation

Digital Transformation: What Part of Being Blockbustered Don’t You Understand?

It has become almost standard fare in most presentations involving Digital Disruption to bring up the Blockbuster and Netflix example. So I thought it might be worthwhile to quickly review what happened to Blockbuster and then think a bit about other radically disruptive scenarios in a few other Industries.

Read More

Blog Feature

Capture and Imaging  |  Information Security

Four Safeguards You Can Take to Protect Your Information

A typical document imaging system is creating four major vulnerabilities that substantially increase the potential for data theft and violations of information management regulations: Not encrypting the data while it's in motion. Unsecured log files. Poor visibility into operator activities. Poor security management. New technology can help mitigate the above risks. I'm not here to sell you a system, I'm here to sell you an approach to a system. I'm telling you that if you're sitting on years old document scanning system, you're probably at risk, and it's time for you to look for a system. Get out your legal pad. Get out your pen and get ready to write down the four things I'm about to tell you to look for in a new document scanning system.

Read More

Blog Feature

Certified Information Professional (CIP)  |  Intelligent Information Management (IIM)

Defining the Information Professional of the Future

In the mainstream, the focus is still on on-premise applications built on and for the PC. The core skills that are valued in the mainstream are focused on building and developing systems. At the edge, the focus shifts to the cloud, mobile technologies become the Lego building blocks of systems, and the skill sets that are valued within our IT staffs shift from building and developing to configuring and connecting.

Read More