Cloudy With a Chance of Success – the Update


I originally posted this back in November 2011. A lot has changed since then, but there’s also a lot that hasn’t. One of the biggest things that’s changed is that Enterprise File Sync and Share (EFSS) has gained… Read More

ECM Isn’t


I finished reading this article from CMS Wire (I don’t mean I actually read the whole article) and it got me thinking … Between that article, others I’ve read, and some of the projects I’ve been working on… Read More

You’re out of Your Mind


You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get… Read More

YOU are the problem


I wanted to try something a little different for this post. I’m doing an assessment of what went wrong with Alfresco for a Canadian university. They purchased Alfresco back in 2008/09, initially to handle some of their web… Read More

Guerrilla Tactics – IG Whether or not they want it


On September 18 the Information Governance Initiative hosted a twitter chat to discuss their 1st annual report. At some point in the chat I referred to myself as using Guerilla tactics to apply Information Governance practices in client… Read More

Information Governance Is


Over the last few weeks some pretty bright minds have been talking / writing about what Information Governance (IG) is and isn’t. Unfortunately, I couldn’t find the restraint to stay out of it. To get some of the… Read More

Give it Away – The Value is in the Knowledge


If I were to start an enterprise software company today, I’d give the licenses away. No, I am not thinking about open source at all. I’m thinking about services, non-core functionality, and integration. I’ll stick to Enterprise Content… Read More

When Information Becomes a Liability


A while back I wrote a couple of posts (one and two) about attempting to value information as an asset, carried on the balance sheet. I took a very accounting oriented approach, and I think I’ve made some… Read More

My Reaction – Laptop Stolen – 620K Patient Records Compromised


Last week a story was reported in the news about a stolen laptop. The laptop contained patient information for more than 620,000 Albertans. This is my response to the situation. It’s far less ranty than what was in… Read More

PHIGs take Phlyte – AIIM Conference Preview


As some of you may already know, I will be speaking about the Principles of Holistic Information Governance at the AIIM Conference in Orlando (my session is at 2pm on April 3). Here’s a brief preview of what… Read More

I Think I Can – Valuing Information Pt 2


Some weeks ago (2013-10-7 to be exact) I posted this about trying to assign value to information. Thanks to the discussions the post generated on Linkedin and on this blog I realised I was approaching the issue from… Read More