Read All Posts »

I recently returned from AIIM 2014, the annual conference staged by the Association for Information and Image Management, and I have to say, it was a great experience!

Right from the opening keynote by well-known industry pundit Guy Kawasaki, AIIM 2014 signaled that it would be a much different event for IT professionals than, for example, Microsoft’s annual TechEd show. Kawasaki’s topic was “Enchantment,” and he eloquently guided us through some basic rules for enchanting coworkers, customers and even spouses! Certainly technology was sprinkled into that presentation, but it also contained a healthy dose of business advice – a formula that continued throughout the remainder of the event.

681e167120a64cafa5312c7313cdd31c

Photo provided by AIIM

Sessions were organized into three tracks; engage, process and control. Many were led by AIIM members in a type of ”case study” format that really helped us learn from their experiences in solving a specific problem or planning a particular implementation. For attendees that wanted a more intimate discourse, there were also roundtable break-outs that provided for livelier group discussion. By limiting sessions to 30 minutes, AIIM encouraged brevity which really helped keep the attention of the audience.

As a first-time attendee, I was greatly impressed by how prepared the AIIM staff was and how well-organized the event ran logistically. In terms of conferences, the event was fairly intimate with between 600 and 700 attendees, helping to foster some good networking interaction. Overall I would highly recommend the event to any IT or businessperson interested in information governance – I even managed to earn my certification as an AIIM Information Governance Practitioner.

To learn more about information governance and your options, watch this informational video below!

Another Microsoft Exchange Conference (MEC) has come and gone, leaving critics divided.  Like any event, both pros and cons could be highlighted. In my opinion, MEC not only picked a great city in Austin, Texas, but they scheduled perfect weather, planned and coordinated some pretty cool events, had an adequate number of staff on-hand to answer questions and even managed to give every attendee a Dell Venue tablet. OK – that last one is an easy way to persuade the audience to say nice things and, let’s face it, they didn’t have control over the weather. There is no doubt; however, most attendees seemed to leave Austin with a positive impression of this year’s conference.

MEC

Some areas of disappointment included a lack of new topics and thought leadership. In fact, the biggest announcement in the opening session was regarding the tablet giveaway. Nonetheless, there were a ton of sessions and many informative (though not groundbreaking) ideas to take away.

MEC doesn’t attract the largest crowd – perhaps because of its on-again, off-again past – but the crowd that attends is very focused and eager to learn both during sessions and on the exhibit floor. That’s where I fit into the MEC equation; Sherpa Software was on-site exhibiting and meeting with customers and prospects around a myriad of Exchange topics. Chief among them seemed to be PST files.

MECshowfloor

As most of you know, there is no love lost between Exchange administrators and PST files. Many of the organizations we spoke with were trying to migrate, manage or otherwise delete the notoriously difficult file format. There was also a strong focus around eDiscovery search and collection, reporting and archiving as usual, but PSTs and Office 365 commanded the most attention by far.

There was a great deal of interest around information governance (IG) and Sherpa Software’s new SaaS platform, Sherpa Altitude IG. More signs that IG is taking root and that as many predict, all companies will start exploring cloud and SaaS options more seriously moving forward.

All in all, it was a worthwhile show for Sherpa Software. I presume it all depends on what your expectations are, as to whether other attendees agree with me; but my only real complaint was the scheduling and overlap of the exhibit hall and educational sessions. The timing and logistics made for some pretty slow times on the show floor between happy hour events, but those were well attended and the conversation flowed as easily as the adult beverages.image

No word yet on MEC 2015 or 2016 yet, but Sherpa will certainly be looking to make a return trip. Most likely, we will still be solving PST challenges for companies and continuing to lead the discussion around governance and electronic data.

Sherpa Software is the world’s leading authority on PST management and migration. Feel free to download complimentary assets including, white papers, videos, infographics and more! Click here to get started, or email information@sherpasoftware.com.

 PST-Management

Times are a-changing, and it’s no longer a simple battle between companies (specifically, their marketing departments) to have the best showing at trade shows, the most magazine editorial features, the flashiest website and the highest number of followers on social media – it is much, much more than that.

More and more B2B marketers are catching on by utilizing e-blasts and e-newsletters, taking advantage of marketing automation programs and creating effective SEO strategies, but there still remain just a small percentage of these progressive marketers.

b2btrends

Gone are the days that marketers can both stay in their comfort zone and be successful.  The trendier B2B marketers are taking action to create integrated content marketing campaigns, better utilize their data and target their audience in ways they’d never done before – and ultimately, those marketers who are taking great strides to keep up will be the ones with the best results.

We’ll talk about just a few things that marketers are doing differently nowadays:

Content marketing opportunities are endless.

Because of how much the internet has expanded in the last five years or so, opportunities for placement of content marketing have become more accessible than ever. Not only can marketers use their websites and blogs nowadays to distribute material, but now social media, enewsletters and eblasts, landing pages and more are available for uploading case studies, infographics, whitepapers and such.

With these opportunities at hand, it’s easy for companies to get lost in the clutter of all the other marketers using the same strategies; standing out is important. It can’t just be a good-looking infographic – it has to be a good, high-level industry piece to educate the reader. 2014 will truly be the year for content marketing to be used to its full ability instead of just serving as a visual aid to grab attention.

B2B social media use is growing.

Social media for businesses is incredibly advantageous; for instance, a business’ Twitter account can send out as much information as the companies’ heart desires, but the true advantage is the connection that people are able to make with the company. It’s not just B2C customers that want that one-on-one conversations.

Some companies are stuck in the stone age of being worried that social media will open up a can of worms, when in fact it will be much more helpful for their company than hurtful. That said, they need to have the right people engaging with customers on their accounts, proper social media training and an appropriate social media policy in place.

Instead of businesses just spewing out one sales pitch tweet after another, it’s now 2014, the year that they should start engaging with customers and potentials. It’s easy these days.

Video, multimedia will make a big splash in 2014.

QUICK QUIZ: What’s the second most-searched search engine other than Google?

yahoo sherpa software pngyoutube1

 

giphy

If you’re a fan of the show Friends, you’ll appreciate that last image.

And if you guessed YouTube as the answer, you’re correct!

YouTube is second to Google in the competition of top search engines. If you’re confused about this, consider that video pieces are strong contenders. People respond to the power of video because of its ability to evoke emotion. When a marketing department is able to create brilliance in the form of a short video, it will go a long way. 2014 will be the year for short videos to impress upon B2B customers.

Telling a story with multimedia in general is important, whether it be from an insightful infographic, a brief three-page white paper, a presentation of slides or a short Vine video. When marketers create a mix of all of the above, they are then reaching out to all different kinds of readers and viewers. Visual storytelling will speak to a larger audience when done correctly.

Your sales cycle problem might be completely internal.

The internet is great, and has made people smarter.

At the same time, consider what I just said: It has made people smarter. With this intelligence also comes some decreased patience for things the user is not specifically looking for (or so they think). If a potential customer does not see what they want on the page right away, they will bounce to another page – they will get over it pretty quickly.

Pages have to be completely optimized for users to know that they’re looking at exactly what they need. More than ever in 2014, B2B customers are able to find the most amount of information in the shortest amount of time, whether it’s on one company’s domain, or twelve different searches.

With this all in mind, consider how it affects the sales cycle: the customer is able to very quickly move on from a page they’ve viewed for two, even twenty minutes, searching for their business needs. If a salesperson does not make that follow-up call until even thirty minutes later, that person may have moved on completely – even forgotten what the salesperson is calling about in the first place. This process between marketing and sales departments is often disregarded as a main problem in the overall process for generating new leads and closing sales – but it’s one that should be monitored very closely.

What other B2B marketing trends do you see making a splash in 2014? Sound off in the comment section below.

Companies spend a lot of time evaluating different platforms when selecting their enterprise social software, but few take the time to worry about how to effectively put it into production. We’ll take a look at best practices for successfully rolling IBM Connections out to users within organizations. I’m not referring to the technical specifications required for setting up and installing the system, I’m referring to the end-user experience. Getting your users to implement and love the new technology, as well as make it part of their daily routine, is the goal.

7keysIBMconnections_whitepaper

In this white paper, I will discuss the 7 guidelines for deploying a successful IBM Connections environment:

  1. Get management buy-in
  2. Build focus group(s)
  3. Provide training
  4. Encourage the adoption
  5. Reward use
  6. Follow-up training
  7. Prepare for the bumps in the road

My contact information is at the end… feel free to get a hold of me with any questions!

In today’s world of interconnected devices and ubiquitous connectivity, many of us are engaged as knowledge (or information) workers – routinely creating, processing or disseminating information as our primary job function. As a result, information has CIGP_1_Whitepaper_editbecome an essential corporate asset. If you accept the assertion that information is an asset, then like any other corporate asset, information must be tracked, managed and disposed of at the end of its useful life. Instituting this type of lifecycle management is the premise behind information governance and it is an important effort since effective information governance not only helps make business operations more efficient, but also mitigates risk.

In this white paper series, we describe a proven process for undertaking an information governance project: we call that process the Corporate Information Governance Program (CIGP).

The document below is the first of a four-part series that will be delving into each of the distinct phases of the CIGP framework; 1) Understand & Assess, 2) Plan & Document, 3) Implement and 4) Manage. This paper gets started by examining the five steps that comprise the Understand and Assess phase.

 

When looking over commentary from electronic discovery experts in the past few years, it becomes apparent that there is now greater emphasis on eDiscovery as part of a complete ”Information Governance” (IG) picture.  The management of corporate information at an enterprise level is far from new; in fact, organizations of all sizes have been employing strategies to deal with vast amounts of data well before electronically stored information subsumed its hardcopy counterparts.  However, many professionals who have a solid understanding regarding the components of electronic discovery struggle to understand how processing data for discovery purposes falls into the broader world of information governance.

2-eDiscovery-IG-World

 

In the Electronic Discovery Reference Model (EDRM), the far left step is ‘Information Management.’  The EDRM assumes that the organization involved in eDiscovery has implemented at least minimal Information Governance principles.  The ease of electronic data discovery (EDD) is highly dependent on a stable IG framework. In other words, the processes, tools and procedures in place for the effective administration of corporate information will also facilitate the identification and collection of data for litigation or investigation.

The initial steps of eDiscovery as outlined in the EDRM are the bread and butter of Information Governance.  With effective management, updated data maps will be available to identify the location of key custodian data.  Tools will be in place to collect data from these known sources and filtering the data by date, addresses or keywords becomes straightforward.  Analysis and processing tools may be in place as well further streamlining the process.   All other steps (Review, Production, and Presentation) should then follow seamlessly from the strong IG framework.

To help understand the relationship between eDiscovery and Information Governance, let’s talk a bit about what is meant by Information Governance.  Gartner defines IG as “… the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archival and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.”  Also known as ”Information Management,” “Data Governance” and a host of other monikers, IG is simply a set of interdisciplinary policies and procedures used to regulate the electronic assets of an organization from creation to disposal.  Looking at it another way, IG is the administration of the electronic information lifecycle.   As explained here stakeholders from business, records management, legal, risk, compliance and IT should coordinate to create and manage an information governance program.

A very important component of Information Governance is the Generally Accepted Recordkeeping Principles (GARP) created and promulgated by ARMA International.   Using these principles, the goal of companies is to become transformational, in other words, “to have integrated information governance into its overall corporate infrastructure and business processes to such an extent that compliance with the program requirements is routine…”   In this model, the key steps of collection and production for eDiscovery become seamlessly integrated into the entire process.

Unfortunately, this ideal is far from realized; instead, for many organizations, this note from the preface of the Sedona Conference’s Commentary on Information Governance is more apt: ”litigation risk management tail might be wagging the information management dog’.    In other words, for many organizations, critical policies and procedures are implemented as a reaction to the threat of litigation, rather than with an eye to furthering the goals of the business, agency or nonprofit that is tasked with creating them.

In an ideal world, it should be the opposite.  The eDiscovery tasks should flow naturally as a subset of a strong overall Information Governance framework.  With an effective IG implementation, risk decreases as automation in collection, culling and processing make the process quicker, less costly and more defensible.  If eDiscovery is the tail that is wagging the dog, as hinted above, then the many benefits of a strong IG policy are lost as the responses to risk and needs of eDiscovery may outweigh the requirements of other stakeholders.

If your organization needs additional assistance, or needs questions answered about the role of eDiscovery in your overall Information Governance model, please take a look at the solutions and resources Sherpa Software has available to help address your needs.