The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
Information Security | Privacy
Well. Who would have ever thought that people would EVER pay attention to privacy? I’ve been constantly amazed to see revelation after revelation over the past few years greeted with a bit of a collective shoulder shrug, and then on with business as usual. I guess now, with Apple’s situation, the cat is out of the bag. Before any of this broke, I published an article on privacy that might be of interest - Does the Privacy of Your Personal Information Worry You?, and also did the short Slideshare below.
Share
Kudos to my friend Bob Zagami for bringing this to my attention from the editor of the RV Daily Report, Greg Gerber. RV Daily Report Changes Press Release Publishing Policy Organizations constantly struggle with the question of not only the volume of content and documents they are managing but amidst this chaos; they also wrestle with the question of "what is truth?" Or, in more practical terms, what is the "official" version, who has approved it, and how can we track the chain of custody and modifications throughout the life cycle of a document?
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
Forgive the David Bowie riff. By now, many of you have seen the official announcement of my transition to a different set of responsibilities – and opportunities – here at AIIM. Given that my posts on this blog have often been a combination of information management observations and embarrassing mentions of my kids, with a bit of bizarre humor thrown in – and given that many of my posts have taken the form of “8 things you need to know about X” -- I thought I would not break form today.
Share
Information Security | Privacy
Does the privacy of your personal information worry you? Consider the following from Bruce Schneier’s Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World: “Surveillance is the business model of the Internet for two primary reasons: people like free, and people like convenient. The truth is, though, that people aren’t given much of a choice. It’s either surveillance or nothing, and the surveillance is conveniently invisible, so you don’t have to think about it.”
Share
On January 30, 2006, Terry Menta and AIIM’s Jesse Wilkins were standing in front of a classroom of 8 students at a community college in San Francisco. They were there to teach AIIM’s very first public training course. The subject was Electronic Records Management.
Share
I am so excited about this year’s keynotes at AIIM Conference. They directly tie to the core rationale for the ENTIRE event -- and for that matter, the core reason why AIIM exists.
Share