Premium Content

Access "Our View: Seek and ye shall not find"

Published: 22 Oct 2012

When I try to find a document on my company's intranet--the latest mileage reimbursement figure or help with our Web content management program--I usually spend more time than it's worth trying to locate this information. And we're a relatively small company compared to behemoth enterprises with 10,000-plus employees. So I was pleased to read a new study by the Association for Information and Image Management (AIIM) that found that 49% of survey respondents share my frustration in trying to locate work-related information, assuming it's online, indexed to a well-defined taxonomy and searchable. And that's a big assumption. A couple of years ago, The Wall Street Journal quoted a VP of marketing, responsible for his company's intranet search, who said that some content was purposely not indexed because it might fall into the hands of those not authorized to see it. Fair enough. But does that include the company phone directory? --Rich Friedman Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

  • Columns
    • Storage Bin 2.0: The life and death of information

      We sometimes complicate our processes to create a perception of increased value. Forget information lifecycle management and tiered storage; concentrate on the four simple stages of life for any kind of information.

    • Get your iSCSI game on: Best Practices by Ashish Nadkarni

      iSCSI is a mature protocol for accessing storage and a solid alternative to Fibre Channel. Technologies such as blade servers and server virtualization benefit from iSCSI as it lets you minimize the number of connections required. And because everything is IP-based, there's no more need to waste slots for host bus adapters, which simplifies your configuration.

    • The big pipe: Editorial

    • Backup gets a boost: Hot Spots by Lauren Whitehouse

      Snapshots, continuous data protection and deduplication are making their way into traditional backup products. By capturing, transferring and storing less data in the backup process, organizations can back up more data to disk--retaining data on disk for longer periods of time or enabling disk-to-disk backup for more sets of data than before.

More Premium Content Accessible For Free