Remove Analytics Remove ECM Remove Security Remove Survey
article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Gather Your Requirements: Metadata requirements gathering can be done during the business and technical assessment phase of an Enterprise Content Management (ECM) deployment. During this step, conduct interviews, surveys, or workshops to gain input from business, IT, and records management stakeholders.

Metadata 163
article thumbnail

Reveille Expands from APM to Broader Analytics

Info Source

Reveille has historically collected data on capture and ECM applications, with the purpose of enabling its customers to proactively manage performance. In other words, if an ECM or capture process is broken, Reveille’s software is designed to help users fix it in real time. It is built in HTML 5, utilizing CSS3 style sheets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wednesday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

We’ve compiled intriguing data from high-profile FOIA releases to contextualize how leading practitioners are using visualizations, analytics, and AI as a force multiplier for investigations. How to leverage data security practices to ensure appropriate protection of personal data under the GDPR. Tired of looking at Enron data?

article thumbnail

What is a SharePoint Architect?

JKevinParker

looking for just such a person, I can testify that a true SharePoint (or any other ECM system) Architect is a rare animal. Information Security. Other major ECM platforms. Network Security. Web Analytics. Infrastructure Security. Application Security. SharePoint Architect Skill Set. Governance").

article thumbnail

Introducing the Information Governance Maturity Model (IGIM)

ARMA International

At ARMA InfoCon 2019, we launched a survey. The results of that survey will be used to create an IG Maturity Index, a point-in-time assessment of IG maturity. These include applications and software, networks and connectivity, content services and APIs, hosting/cloud/servers, SLAs and licensing, and information security.

article thumbnail

Digitalizing Core Business Processes — Part 3 of 3 — How can you not just improve processes, but totally rethink them?

AIIM

An important question to answer is how the technology will support information security, operational efficiency, regulatory compliance, and improving the customer experience. Over 40% of survey participants either already have an ECM or BPM solution or are actively looking at one.

article thumbnail

Digitalizing Core Business Processes — Part 3 of 3 — How can you not just improve processes, but totally rethink them?

AIIM

An important question to answer is how the technology will support information security, operational efficiency, regulatory compliance, and improving the customer experience. Over 40% of survey participants either already have an ECM or BPM solution or are actively looking at one.