Pick up an article in information technology, records management or electronic discovery trade press, and you will see that information is moving to the "cloud." What is the cloud? Perhaps the simplest... View More
Perhaps the most document-specific rule of evidence concerns the often misunderstood best evidence rule, which derives from 18th century English common law. The rule states that to prove the contents of... View More
The Importance of Integrity and Flexibility Imagine the scenario where the CIO reviews the long-term goals of the IT organization and outlines an initiative to develop business intelligence (BI) architecture... View More
Caringo Inc., the leading provider of content storage software enabling clustered storage for active and archive content, released CloudFolder, a free application for Windows that simplifies storing any... View More
NetEx, a leader in high speed data transport over TCP, today announced a new solution to overcoming the bandwidth limits of replicating and recovering data from cloud storage sites with the new HyperIP... View More
Digital rights management (DRM) is a child of the Digital Millennium Copyright Act (DMCA), passed by the US Congress in 1998 to heighten the penalties for copyright infringement on the Internet. It amends... View More
Recent headlines lead businesses and consumers to believe that the majority of data breaches occur online. According to "Security of Paper Documents in the Workplace," a new study from the Ponemon Institute,... View More
RFID, a technology first invented by the USSR for US surveillance at the beginning of the Cold War, is fast becoming the new technology of the late 2000s. RFID, otherwise known as "the Internet of things,"... View More
Once the right price points are achieved, the scope of RFID applications is limited solely by the ingenuity and imagination of the user. Aside from supply chain management, here are some of the most popular... View More
Today, financial institutions can realize continued growth in one of the most mature of treasury management services — wholesale lockbox (WLBX) — even as B2B check payments inexorably relinquish... View More
Even if you are not a programmer, you have likely heard some mention of XML within your organization and throughout the industry. Certainly, your technologists are using it when explaining how they are... View More
The form is the thing. In fact, it lies at the heart of all document-centric applications. Yet, as science marches on and technology convergence runs its inevitable course, it becomes easier and easier... View More
As companies grow, processes and systems that operate well at a certain capacity often cannot keep up with larger demand, which inevitably complicates workflows and slows operations
When we look at evolving customer communications, we often focus on improving the experience by adding new delivery channels, improving content by adding color and variable images based on the audienc
In a world where data breaches are a daily reality, safeguarding critical communications — like bills, invoices and healthcare documents — has become paramount. With sensitive personally identifia
A dashboard that consolidates data from all of your applications and systems into a single view is critical to optimizing performance and avoiding dangers
As companies strive to meet customer expectations, it’s no surprise that communications have become a focus to ensure customer needs are met and that customer experience is seamless across touchpoints