Motive Systems, the developer of M-Files easy document management software and the Cloud-based document management service M-Files Cloud Vault, announced that M-Files for Salesforce CRM is immediately... View More
Editor\'s Note: Missed the first installment of the article? Click here for Part I. Major risks of cloud computing So what are the risks involved in cloud computing? These risks fall under four categories:... View More
What is a \"Cloud?\" By way of defining the modern concept of cloud computing, it is useful to note that in computer parlance, \"cloud\" is a synonym for \"domain.\" Indeed, it is both relevant and enlightening... View More
KnowledgeTree, provider of cloud-based document management solutions, announced a product update that strengthens user security and alleviates the problems associated with juggling multiple access passwords.... View More
GlobalPrint Systems, Inc. makes "anywhere" printing available to more mobile phone users with the first true cloud printing application for Androidâ-based SmartPhones. With the new application, GlobalPrint... View More
Toshiba America Business Solutions Inc. (TABS) proudly announced the availability of Fasoo.com Digital Rights Management (DRM) solutions to its direct and independent dealers and their customers. Fasoo.com... View More
The University of California, Irvine Extension announces the availability of a new eight-week online course titled "Cloud Computing," beginning Monday, April 12. The course was created to arm participants... View More
Exterro, Inc., the leading provider of legal governance, risk and compliance management solutions, announced Fusion Cloud Legal Hold. Now, AmLaw 200 law firms supporting enterprises of all sizes can have... View More
Pick up an article in information technology, records management or electronic discovery trade press, and you will see that information is moving to the "cloud." What is the cloud? Perhaps the simplest... View More
Perhaps the most document-specific rule of evidence concerns the often misunderstood best evidence rule, which derives from 18th century English common law. The rule states that to prove the contents of... View More
The Importance of Integrity and Flexibility Imagine the scenario where the CIO reviews the long-term goals of the IT organization and outlines an initiative to develop business intelligence (BI) architecture... View More
Caringo Inc., the leading provider of content storage software enabling clustered storage for active and archive content, released CloudFolder, a free application for Windows that simplifies storing any... View More
NetEx, a leader in high speed data transport over TCP, today announced a new solution to overcoming the bandwidth limits of replicating and recovering data from cloud storage sites with the new HyperIP... View More
Digital rights management (DRM) is a child of the Digital Millennium Copyright Act (DMCA), passed by the US Congress in 1998 to heighten the penalties for copyright infringement on the Internet. It amends... View More
RFID, a technology first invented by the USSR for US surveillance at the beginning of the Cold War, is fast becoming the new technology of the late 2000s. RFID, otherwise known as "the Internet of things,"... View More
Recent headlines lead businesses and consumers to believe that the majority of data breaches occur online. According to "Security of Paper Documents in the Workplace," a new study from the Ponemon Institute,... View More
Once the right price points are achieved, the scope of RFID applications is limited solely by the ingenuity and imagination of the user. Aside from supply chain management, here are some of the most popular... View More