InfoGov Links of The Week 03-10-2017

Blockchain & ECM

Blockchain in some ways defeats the point of centralized records management but the likelihood is that more specialized applications will be adding this kind of functionality to their systems.  Potentially disrupting the traditional approach to RIM.

The More Things Change – ECM Isn’t Really Dead

ECM is not a technology, methodology, or process. Rather, it is a mindset or framework designed to get the right information to the right audience, in the right context, at the right time. ECM is enabled by tools and processes that help capture, manage, store, preserve, and deliver information…relabelling ECM is rather pointless. I’m fairly certain the buyers don’t care, and the vendors are going to have to use terminology that resonates with the buyers. “Wanna buy ECM? or “Wanna buy Content Services?” are likely to get the same none too friendly response. Content Services is not a market. Content services are what content management tools provide and it’s been that way ever since someone coined the term “Enterprise Content Management”.

Why It’s Time to Think Differently About Information Management

Do the processes we ask end users to go through align with the way they work? Or are they at odds with modern working life?1

It’s essential to build easy-to-use information management practices for how users work today — not how things worked 20 or 30 years ago.

How to Make Your Information Management Program Successful

You’d think that if the program’s stakeholders get it right by understanding their current environment (e.g., being attuned to the needs of the business and planning the major organizational elements of their program, systems, and organization of content, etc.), that they would be primed for success. Well, they are, but ultimately, enterprise programs aren’t successful because the board approves the project. They are successful because they are executed well. In too many cases, leaders, who have exceptional strategic skills, lack the day-in/day-out, persistent approach needed to deliver on a three-year vision.

5 Trends Shaping Information Management

  1. Data Teams Bridge the Gap Between IT and Business
  2. The tools of the Clouds Era Emerge
  3. Security Gets Worse Before It Gets Better
  4. IoT Transforms Physical Environments and Social Conventions
  5. Opportunity Spikes in Cloud Management Arena




InfoGov Links Of The Week 03-03-2017

AWS, Microsoft and Google take different paths to the cloud

An outage at Amazon Web Services Tuesday rekindled the debate about whether it is wise to rely too heavily on one cloud service provider. Such snafus are rare for AWS so CIOs worry more about the potential for vendors to turn off their service without notice.

But CIOs who bet on multiple providers often invite challenges, including committing resources to work with each vendor…
Understanding the keys to enterprise information management success
all information, whether structured or unstructured, electronic or printed, or raw or derived, can benefit from the same kind of asset management discipline and EIM program. I’d like to see the day in which all forms of data/information/content/records are managed under some unified approach.

6 Personal Observations about “ECM” and “Content Services”

  1. In the end analysis, “Content Services” is just another label.
  2. The term “ECM” DOES need retirement and/or modification.
  3. “Content Services” means applications and processes are center stage.
  4. “Content Services” DOES need a definition.
  5. The change represented by “Content Services” is a fundamental one for solution providers.
  6. “Content Services” ultimately is a story of disruption.

Technology Standards and the New EDRM

Standardization of technology has the promise to cut business and legal risks through the identification of challenges and development of mechanisms to prevent actual and potential issues and downtime. Standardization also many times is the precursor to the rapid uptake of new and beneficial approaches to solving problems with technology. If the EDRM, under its new leadership, can contribute to industry standardization by helping create technology standards besides task and process frameworks, the development of data and legal discovery technologies may see a new level of acceleration that should positively impact all members of the eDiscovery ecosystem.

How to Avoid Big Data Mistakes

Looking for a way to keep your customers happy and feeling safe, your bosses relaxed and confident, and the rest of your company’s teams protected from major mistakes? Just as a solid accounting system ensures and demonstrates that a business is being well managed, a data governance program is a necessary element of any business today that deals with data. And that’s basically all businesses.

Best Practices For Lowering Ransomware Risk

While ransomware actors in many cases return the data as promised, they may leave backdoors to return for more money, time and time again, or may not return data at all.

How I Pulled Myself Out Of The Waterfall

I was an IT executive several years ago at a large biotech company that was drowning in the waterfall method and our team knew it had to stop. We instituted an early experiment in DevOps, an organizational construct that calls for software developers and operations teams to exit their silos and collaborate closely to accelerate the frequency of code releases into production.

Top Cybersecurity Posture Also Aids Organizations With Innovation

cybersecurity is no longer just a means to avoiding a PR disaster, but rather it’s become a necessity for engendering digital innovations, goodwill, and user loyalty, as well as driving revenue growth. Those companies that refuse to invest in it are doomed to be left behind.




#InfoGov Links Of The Week 02-24-2017

Why Technology Won’t Solve Your Business Process Problem

When I talk with folks about workflow issues, the focus of discussion typically turns to technology or the potential use of it. Until we understand the underlying reasons for the issue, technology alone will not resolve it completely and, in fact, has amplified the issue in some cases. My point is that in order to address workflow issues, organizations need to be aware of and embrace the concept that process management and automation are about more than just the technology.

ECM or Content Services? What Is the Big Deal?

The acknowledgement of a single platform for enterprise content has never worked, which came as no surprise. Most practitioners have been pointing to the fallacy of a single repository for years. ECM platforms had stopped being used to manage web pages and rich media years ago. In fact, documents have started to move outside of their traditional platforms and into line of business and operational content solutions, like contract life cycle management.

How Cybersecurity Analytics Are Evolving

Predictive analytics analyzes behavior that indicates threats, vulnerabilities, and fraud. Slowly, but surely, cybersecurity budgets, analytics, and mindsets are shifting from prevention to detection and remediation because enterprises need to assume that their networks have been breached.

Gartner Study Finds a 31% Spike in IoT Worldwide

There is always the chance that security concerns will cool the consumer’s desire for smart products in the home. The 2016 distributed denial of service attack from a botnet of insecure connected cameras and DVRs is expected to have an impact. Said Middleton, “It could cause consumers to think twice about employing connected devices.”

ARMA International points out that in addition to security concerns, a host of information governance concerns should be addressed, particularly in the business market for these devices. Privacy concerns are already hitting the marketplace and cost considerations go beyond the cost of the devices. Businesses using these devices are collecting large quantities of data, which must be handled responsibly. Information governance experts have an opportunity to help organizations maximize the value of the information collected while putting safeguards in place to ensure the information is handled responsibly.

‘Liberating’ data to drive insights at Northwell Health

The job of the chief data officer is to break down the silos, remove roadblocks to innovation and help move this whole thing along with a degree of urgency that can only occur if the CDO has a direct link into the senior leadership group—which has to buy in and support that individual.

4 Steps to Better Manage Cybersecurity Risks

  1. Double down on the basics
  2. Watch and secure the supply chain
  3. Invest in employee training
  4. Track metrics and work as a team

Information Management: The Critical Thing You’re Overlooking in the Digital Workplace

In most organizations, information management policies are not a priority of end-users. Few of them have deep understanding or the policies or the expertise to apply them correctly.

But information is useless if it can’t be found in a timely and efficient manner. Organizations need to have policies to ensure the data is organized and complete, as well as to address when data can be deleted.

Cyberwar Talk Is Getting Real

“Our democracy itself is at risk,” he said. Russia had crossed a “red line”, and America’s ability to win in cyberspace depends on its ability to deliver “meaningful consequences”.

“Unfortunately, we still do not have clear proportionate response policies for striking back against nation-states,” McCaul said. “Today, in some cases, the United States government is fighting 21st century threats with 20th century technology, and a 19th century bureaucracy.”

Will agencies get the full value of their information?

As the government continues to adopt analytics technology, it is vital that agencies invest in the talent and knowledge necessary to enable those efforts. Addressing the skills gaps is the first step in getting ahead of future information management requirements. Doing so will allow the government to unlock the full potential of analytics by boosting faster decision making, driving cost savings, creating program efficiencies and unleashing the potential of agency information.


#InfoGov Links Of The Week 02-17-2017

Yesterday I passed two parts of the ICRM exam.  The lead up to it caused me to delay links of the day.  Sorry for the delay.  Please read, enjoy, share and do your part to mature the InfoGov community.

Companies Still Struggle With Information Governance, Survey Finds

Despite years of talking about information governance and compliance, less than half of companies surveyed have a compliance culture  — and many companies apparently have no governance strategy at all.

The Need for Information Governance Has Never Been Greater

Corporations need information governance programs in order to minimize compliance risk and reduce costs associated with eDiscovery and litigation response. Corporations must establish consistent and logical frameworks for how employees handle data. They can do this through information governance policies and procedures that help guide organizations and their employees in handling electronically stored information.

Future Technology Be My Valentine

when it comes to information management solutions too often businesses accept a box, err, I mean a list of “appropriate” solutions providers from experts. Unfortunately, some of these lists are born from criteria often outdated and not indicative of what your organization is actually looking to achieve. Blindly following leaves companies to bend to the limitations of poorly selected solutions. I have witnessed amazing human work-arounds that serve solely to overcome such tragic shortcomings, I refer to these human heroes as our “ultimate integrators”. My advice, push to ensure your solutions can interoperate, play nice, and aid in empowering your entire business ecosystem. Your environment is unique and only you know the complete picture, while these lists can inform you, do not blindly accept them. Perform your due diligence and research to understand if a solution will grow with your business objectives and strategic roadmaps.

7 ways MDM threatens employee privacy

  1. SSL MITM exposes private communications
  2. Wide open access to users’ browsing histories
  3. Mobile apps give MDM access to personal info
  4. Location data revealed
  5. Poor User Experience
  6. Risk of personal data loss
  7. Restrict core device functionality

The Conflict between Data Science and Cybersecurity

Cybersecurity is in direct conflict with the basis tenants of data analysis, especially big data analysis, predictive analytics and data mining. Data analysis, especially big data, is about opening access to a lot of the data in an organization to find new some interesting ways to solve business problems. For example, giving a marketing team information that they typically don’t use so they can find new and interesting ways of positioning your products or do some predictive analytics for sales forecasting.

5 ECM Lessons from a Non Verbal Communication Expert

  1. Spoken or written words are only part of the story
  2. Classification starts by objectively defining basic elements
  3. Classification is ongoing
  4. Use multiple viewpoints to guard against bias
  5. Overconfidence in accuracy of results may be misplaced

Big Data: Why Should You Be Aware of It

  1. Customer Engagement
  2. Increase the Accuracy of your projections
  3. More Efficient PRoject Performance
  4. Understanding the impact on clients

Only 39% of hospital CIOs are working on a digital health strategy

The survey of 112 hospital CIOs found that 38% are making electronic health records integration their top spending priority, followed by accountable care (population health technology) and consumer, clinical and operational analytics at 21% and 16%, respectively. Other technology spending priorities for hospital CIOs include virtual/telehealth technology enhancements at 13%, revenue cycle systems and replacement at 7% and enterprise resource planning systems at 6%.


The Functions of #eDiscovery

In today’s information age Information Governance is essential to be prepared for eDiscovery.  People are hungry for information and submit Freedom of Information Act (FOIA) request at a startling pace.  We live in a very litigious age and the only way to be prepared for eDiscovery request whether via FOIA or a lawsuit is by having a strong Information Governance foundation.

The first step in the eDiscovery process is identification.  You can’t place a legal hold on what you haven’t identified.  To be able to identify relevant Electronically Stored Information (ESI) you need to develop an identification strategy and plan, establish the identification team, identify potentially relevant sources of ESI and certify sources of potentially relevant ESI.  This step isn’t just about identifying sources, but also identifying custodians of information.  Having a data map is essential to identify ESI.

After ESI has been identified the second step is preservation.  This is the act of placing a legal hold and halting any destruction of ESI that has been requested.  To mitigate risk a preservation plan should be put in place with a defensible audit trail and the plan should be validated with quality control.  Spoilation of evidence occurs when ESI isn’t preserved and it is intentionally or recklessly destroyed.  An organization can face sanctions if spoilation occurs.

Following preservation is the collection phase.  Preservation stops the destruction of information and collection is the transfer of information to legal counsel.  Preservation and collection works hand in hand. The purpose of preservation is that information can be collected.  If information is collected without preservation taking place then all of the request information will not be available and an organization can face massive legal troubles.

Once data is collected and acquired by either FOIA that is fulfilling the request or legal counsel it now needs to be processed.  Processing involving looking at the universe of information submitted and reducing the volume down to only what is necessary and converting it to a usable format for review and analysis.  Example of processing ESI is removing duplications, coverting to PDF or TIFF, addings Bates numbers.  Many times text will be extracted and OCR’d for advanced analytic tool to perform an efficient review of information.

The purpose of processing information is so that it may be reviewed and analyzed.  Review and analysis are the two phases that come after processing information and both involve evaluation information for responsiveness to discovery requests and for privilege.   as well as content and context.  Review brings to light the information in ESI to give counsel facts and strategies for when they are in court.  Analysis is crucial to review as it helps to interpret documents and information so that only relevant ESI is reviewed and non pertinent information is culled.

Production  is taking the ESI that has been processed, reviewed and analyzed and producing a product that can be given to the opposing counsel or FOIA requester.  Specifications must be agreed upon for how ESI will be delivered and it is typically delivered with accompanying metadata.  ESI can be delivered in its native format format, near native format (best for databases and e-mail), Image/near paper format (converting to PDF or TIFF) or paper/hard copy format. Different forms of production are appropriate for different types of ESI so typically ESI will be produced in a combination of formats.

The last function of eDiscovery is Presentation. Typically in litigation ESI is presented before a disposition, hearing, trial etc. If Information Governance is the process, a defensible presentation is the end product.  At this point in the eDiscovery Reference Model records managers and IT have pretty much turned the process over to the lawyers to present information in court.  You can go here to learn more about the EDRM.

#InfoGov Links of the Day 02-03-2017

I took a hiatus from posting for the past few days, so there are a plethora of links to keep you busy for the weekend.

Study: Social Media Making People Anti-Social, Jealous

A recent global study conducted by Kasperksy Lab reveals that social media users are interacting less face-to-face than in the past because of this newfound ability to constantly communicate and stay in touch online. In the study, researchers found that about one-third of people communicate less with their parents (31%), partners (23%), children (33%) and friends (35%) because they can simply follow them on social media. This may be doing more harm than good, in a world where editing one’s life to make it appear perfect is more appealing than naturally existing.

Federal workers turn to encryption to thwart Trump

Federal employees worried that President Donald Trump will gut their agencies are creating new email addresses, signing up for encrypted messaging apps and looking for other, protected ways to push back against the new administration’s agenda.

Whether inside the Environmental Protection Agency, within the Foreign Service, on the edges of the Labor Department or beyond, employees are using new technology as well as more old-fashioned approaches — such as private face-to-face meetings — to organize letters, talk strategy, or contact media outlets and other groups to express their dissent.

The goal is to get their message across while not violating any rules covering workplace communications, which can be monitored by the government and could potentially get them fired.

Law Firm Hogan Lovells Learns to Grapple with Blockchain Contracts

A blockchain distributed ledger may not replace all lawyers, but one firm is studying how the technology could eliminate many of the manual steps typically needed to execute contracts.

Law firm Hogan Lovells is experimenting with so called smart contracts and exploring the legal and organizational issues raised by the agreements executed automatically using blockchain.

Smart contracts, a key application facilitated by the blockchain technology, are software that can automatically execute a contract with no human intervention once coded conditions are met. After one company pays another for a product, for example, a shipper may be notified to pick up the package, after which it would then be paid. A blockchain distributed ledger can electronically verify the parties and payments, keeping a secure record of each step.

One sign of analytical maturity is the effectiveness of cross-functional problem solving. IT likely has the data, the data team needs to surface insights for the business, and the business has to be confident that the decisions they make advance their objectives. In today’s rapidly changing business environment, cross-functional teams are necessary because their collective knowledge and skills enables more effective problem solving, faster.
In our experience, a breach can go from initial entry to full compromise in just a half hour. “Full compromise” means that you cannot get the hackers out without taking extreme measures like taking your system offline or wiping everything. From there, hackers can exfiltrate data undetected within one to three hours.

Disparate customer data is actually a customer experience killer.

Without a timely and comprehensive view of the customer, businesses are unable to tailor relevant offers, resolve issues quickly and optimize customers’ experience across channels and throughout the customer life cycle.

Creating this comprehensive view of customer should be a seamless, integrated and largely automated process and not an ad-hoc exercise. Then only will be the businesses be able to unleash the true power of customer data.

Harnessing the value of big data with MDM

Big data analytics coupled with MDM backbone is going to offer the cutting edge advantage to enterprise towards managing the customer-centric functions and increasing profitability. However, the pairing of MDM and big data is not free of complications. The enterprise needs to work diligently on the interface points so to best harness these two technologies.

Traditional MDM systems needs to get enhanced to accommodate the information coming from big data sources, and draw a meaningful context. The big data system should leverage MDM backbone to interlink data and draw meaningful insights.

8 ways big data analytics can be applied by any CEO

Data analytics is about searching, testing and discovering answers to new ways to drive business value – the responsibility of any CEO or board. As the CEO you have a responsibility to consider how your data can define new strategies for success, and you can drive this process by setting context, objectives and purpose – C-O-P.


#InfoGov Links Of The Day 01-30-2017

Physical Mail Still Puts Your Data Security at Risk

While it may be more convenient to receive paper mail versus e-delivery, you have to ask yourself: “Which is really more secure—paper or e-delivery?”

E-delivery, done right, is protected by encryption and multiple levels of authentication. Yes, it is a nuisance to remember all of the usernames and passwords, and yes, it is inconvenient to have to log on to five to 10 websites every month to get your bills and statements, but it looks like that is a small price to pay to keep your identity safe.

Workers Still Need Printers in Paperless Offices

Mobile printing can help provide standardization across the sea of devices used in today’s workplaces and give employees the capabilities they expect to have in an office, no matter how unconventional the setup or where people do their work.

Health Information Governance Strategies for Unstructured Data

Eventually, the untapped wealth of information in images, audio, video, narrative text, environmental data, and other unstructured datasets will be able to feed advanced artificial intelligence programs that could provide critical insights into a wide variety of patient care concerns.

AI in the Workplace in 2017: Cooperation not Replacement

In 2017, AI technology will drastically change the workplace – but the fear that such change will replace the need for people is misplaced. Instead, especially in B2B, where the complexity of products and solutions necessitates a more consultant architype of seller, AI will be more of a cooperative force – one that equips sellers with insights to help drive a higher level of sophistication in sales conversations.

Latest CGOC Information Governance Process Maturity Model Details How to Reduce Cost and Risk in the Age of Massive Data Stores

The CGOC (Compliance, Governance and Oversight Council) today announced the release of a major update to its Information Governance Process Maturity Model (IGPMM). The CGOC was established more than a decade ago to advance IG practices through research, thought leadership and peer-developed content. The IGPMM is a guide to maturing information governance (IG) processes, improving information economics, and enabling the defensible disposal of data debris. Practitioners have used the Maturity Model to benchmark their organizations’ IG programs against best practices, enabling them to build a step-by-step roadmap for reducing cost and risk.


#InfoGov Links Of The Day 01-27-2016

AI Ushers in a New Era of Business and Tech

The impact of AI is already rippling through several key areas: predictive analytics, speech processing, image processing, chatbots, virtual assistants, augmented reality (AR) and virtual reality (VR), robotics, cyber-security and more. In fact, artificial intelligence and its associated technologies—machine learning, cognitive computing and deep learning business applications—are steadily transforming the business and IT landscape, along with enterprise requirements. – See more at:

Apple joins Amazon, Facebook, Google, IBM and Microsoft in AI initiative

Following Bloomberg’s report, the Partnership on AI to Benefit People and Society (what a name) officially announced that Apple is joining other tech companies as a founding member of the AI initiative. Companies will work on research projects, AI best practices and more.

The Partnership on AI was officially unveiled back in September 2016. At the time, Amazon, Facebook, Google, IBM and Microsoft were the only founding members. Apple, Twitter, Intel and Baidu didn’t participate in the initiative.

Hey Hey, Ho Ho, Email Attachments Have Got to Go

After 20 years of email attachments, two new, but completely disconnected technologies are converging to provide a competitive alternative to inbox-based business management. They are the cloud and artificial intelligence…Eventually, the cloud and AI will deliver what has proven elusive for so long: a way to view and manage the business without complicated apps, massive integration projects — or inbox-based business management.

Following the Data Through a Digital Transformation

The creation of dynamic digital processes — whether highly personalized marketing, effective fraud detection or real-time responsiveness in operational or analytical dashboards — requires a dynamic data platform more akin to a data lake than a data warehouse. This is not to denigrate the usefulness of the data warehouse, but rather to follow where the data leads: to flexibility and variances in structure, speed, scale and context.

Artificial Intelligence Doesn’t Just Cut Costs, It Expands Business Brainpower

The majority of decision-makers (71%) believe that business-to-consumer is the model that is most likely to be impacted by AI and almost all (97%) feel that there are “customer benefits to be had from the adoption of AI.” They see AI as helping in the  creation of new, improved products, services and business models (55%) and in giving faster access to existing ones (55%). Half also feel that AI can help with the quicker resolution of problems (50%) and over two fifths (42%) say it can help with greater personalization.

Two-thirds of decision-makers also believe AI will “bring out the best in their organization’s people.” Most respondents seem optimistic about redeploying displaced employees with higher-value work. The majority, 85%, plan to train employees about the benefits and use of AI, and 80% of companies replacing roles with AI technologies will retrain or redeploy displaced employees.

How I Would Hack Your Network (If I Woke Up Evil)

There has been a shift in security, and the old security fundamentals aren’t effective any longer. The new security fundamentals include implementing application whitelisting, firewalls enabled down to the host level, and user behavioral analytics (UBA). UBA is exceptionally interesting because it is looking at user access patterns for indicators of compromise rather than just looking at program signatures…

Let’s summarize. First, your AV (Antivirus)won’t be a problem for me and will easily be bypassed. Second, I will phish your employees by using as much social media and reconnaissance as I can. Third, I will exploit all externally facing interfaces, portals, and servers. Finally, I will pivot as much as possible. How do you defend against me? Stop using your AV as a crutch, keep a smarter social media image (and encourage employees to do the same), implement whitelisting and firewalls, even at the host level, and UBA. Good luck.


#InfoGov Links Of The Day 01-24-2017

OpenText / Documentum Deal Closes. What Do I Do?

Steve Weismann recommends, “that you take a hard look at what your Documentum ecosystem looks like, and begin imagining what would happen if – when – OpenText begins insisting you migrate to its information management platform.”

Why Interest in the Cloud Keeps Growing

hybrid cloud CCM enables a more agile, responsive, and less costly way for insurers and similar enterprises to achieve customized customer communications. The risk of penalties from non-compliance as well as operating costs will be less, and the opportunities to differentiate from the competition and enhance the customer experience will be improved.

Business Must Deal With Women’s Concerns

In the case of business and IT, there’s a war for female talent and leadership. Yet, while the data is overwhelming and virtually everyone acknowledges the issue, a wage gap and perceived lack of support persists…Women in many other industrialized countries enjoy nationalized childcare, living wage provisions and extended paid maternity leave. (Some countries also offer paid paternity leave.) But the U.S. has none of those benefits.

3 Factors Impacting DAM in the Year Ahead

Geospatial and IoT technologies are changing the very definition of what a digital asset is …and where it comes from. As more and more companies become mass producers of digital content, DAM is expanding into untraditional areas. Advancements in VR and AI will continue generating new formats and file-types, too.

When everyone (and every thing) is a content creator, how do you share assets and still protect yourself legally? How do you stay proactive instead of reactive?

Cybersecurity in the Age of Digital Transformation

The automation of virtually all business processes and the increasing digital connectedness of the entire value chain create agility, but they also significantly raise cybersecurity risks and threat levels.

Why the Coca-Cola Archives is Digitizing More than 6,000 Analog Tapes: The Coca-Cola Company

.rsDefault .rsBullet span {
behavior: url(/etc/designs/journey/main/styles/;


One of the key components of my job is the preservation of the assets of the Coca-Cola Archives. With all of the artwork, photographs and artifacts in our holdings, it may surprise you to learn that one of the most difficult media formats to preserve is videotape…

Video tapes are so difficult to preserve because of the way they were created. Explained simply, magnetized iron oxide is applied to a thin plastic strip spooled on two cores. Everything about the makeup of the tape can, and often does, go bad…

In the digital age, everyone assumes we can just digitize our collection. That’s the outcome we are looking for, but the road to success with video tape is more challenging due to the variety of formats. VHS, Quad, D1, D2, ¾ in Umatic… the list is nearly endless.
Tech Savvy: Avoiding the case of the missing government emails

The things state and local government workers talk about are captured not in a paper trail, but in an email trail. The question facing the Minnesota Legislature is, how long should government workers keep their electronic records before they can delete them, sending those juicy information tidbits to electronic oblivion? The subject of data retention, or how long emails are kept before they’re deleted, is far from hammered out.


#InfoGov Links Of The Day 01-13-2017

There Is No “Privacy” When It Comes to Social Media

I was speaking with a vendor this morning who made an interesting point in the course of talking about the data they’re collecting from social networks: a single “like” on a piece of content could generate 100 data points.

Big Results From Big Data Still Elude Most Organizations

Investments in big data are getting bigger, but big results are still eluding most organizations, according to a new survey of big data professionals…

According to the survey, respondents generally believe that big data will provide their company with a competitive advantage. But they cite several challenges to achieve that goal: data integration, complexity and integrity, as well as unstructured data capture and management. Other issues are associated with culture, skills and access to appropriate technology.

3 Lessons From The Yahoo Breach

The Yahoo breach, like most advanced cyberattacks, was carried out over a long period of time, with attackers hiding their communications in the normal flow of network traffic. According to the latest Verizon Data Breach Investigations report, dwell time — that is, the length of time an attacker is in a system before being detected — is averaging more than 200 days.

Don’t Be Blinded by Big Data

“Data-driven strategy” is the latest buzzword being tossed around by marketing professionals in companies of all sizes, not just large corporations. And while the value of data is clear, there’s a limit to what hard data can reveal.

Data is about numbers. It reflects quantifiable information—how many survey participants selected this or that response option, how many customers chose Product A over Product B, which demographic said they would value this or that feature at this or that price point.

What data can’t yet tell us are the stories, the nuances behind that quantifiable information. The background behind why the preferences are what they are and the factors that influence decision-making. And, ultimately, what will cause these preferences to evolve in the weeks, months, and years ahead.

The stories behind the data are, arguably, even more valuable than the easily-quantifiable.