January 24, 2013

One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.

January 9, 2013

Doing searches across unstructured data stores and understanding who owns this data are emerging as higher priorities in today’s Big Data era. However archiving software can vary greatly in how it performs these tasks of search and assigning data ownership. In this fourth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he examines how C2C performs search across distributed email and file systems and what techniques it employs to establish data ownership.

October 12, 2012

Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.

April 4, 2012

Server virtualization has effectively broken the one-to-one relationship between servers and applications, enabling more efficient use of the host’s physical resources. But this is not without its drawbacks, as applications like backup software that took advantage of these idle resources no longer have access to them.

December 16, 2011

Companies who execute Information Governance plans are looking for eDiscovery products supporting Early Case Assessment (ECA). ECA is a combination of search, workflow management, information processing, and multilingual user interfaces. ECA requires a cohesive set of technology, business and data science stakeholders to select products.
ECA is powerful business process, but identifying ECA products is a beleaguering task. ECA mashes together eDiscovery and technology requirements. The “mashing of requirements” creates a broad matrix of products and functionality. Without question, eDiscovery has significantly evolved within the last few years.

November 20, 2009

This week I am going to hearken back to a conference call that took place a couple of weeks ago on the morning of November 3, 2009. This is a new quarterly conference call that CommVault is sponsoring. This particular call was hosted by its Vice President of Marketing and Business Development, David West and was intended to provide some insight into CommVault’s Q209 successes. But, to my surprise, Tyco Electronics’ Scott Zeiders who heads its UNIX Tech Support, also joined the call and commented on Tyco’s experiences with implementing CommVault® Simpana®.

April 9, 2008

Business processes, like electronic discovery, offer defined metrics and quantitative impacts on organizations. Historically speaking, electronic discovery review budgets have been rising steadily; creating the need to improve review (better crushing power) or reduce data going into review (refined selection process). Moreover, the team at KVS/Symantec knew in 2005 that “Discovery Accelerator 1.0″ was a stifled product; primarily designed to return email results for people, according to dates and keywords. At the time all the talk was around better “improving review,” but the market has been saying “early case assessment” since early 2007.

March 20, 2008

Carl Frappaolo, AIIM Vice President, Market Intelligence says “Unstructured information drives numerous business processes…” The logical option here would be to deploy a business process management suite (BPMS) of tools. Step one is to identify what departments, project groups and individuals are involved in the business processes. Step two; identify the information that results from those individuals, groups and departments. Step three, once the business process is mapped to the information you simply associate it with a retention management product and policies.

January 29, 2008

Microsoft (NASDAQ:MSFT) and Sun (NASDAQ:JAVA). If Microsoft and Sun were collaborating on a charity picnic this time last year, it would have been a shock. Now these companies are coming together to provide a combined software and hardware solution and going forward arm-in-arm with CommVault (NASDAQ:CVLT) to help companies address their most pressing application data […]