Browsing All Posts published on »March, 2014«

Risk Analysis and Legacy Data: How to make your Big Data Defensible

March 27, 2014

0

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the achievement of these goals and targets. We cannot prevent or foresee all […]

Protecting your Intellectual Property

March 17, 2014

0

In today’s global economy the value of an enterprise’s Intellectual Property (IP) assets is very important. In many companies however, IP is not only stored in well protected or encrypted repositories, but also resides on personal computers, laptops, home computers, removable storage, in cloud locations such as BOX.net or in personal email boxes. This vast […]

Increasing Retention Periods require Open Archiving Standards

March 6, 2014

0

Due to the constantly increasing legal retention periods for electronic data, more and more government organizations and enterprises have to deal with old electronic archives from which the original manufacturer can be anything from being acquired to the absence of technical support for an older version of the archive. Once the technical lifecycle of this […]