April 2008 [Volume 17, Issue 4]
Features
A critical evaluation of MOSS search
Theresa RegliAdriaan Bloem //
01 Apr 2008
There will be different ways to implement search. Think of it as a "let many flowers bloom" philosophy. You can use what's provided in SharePoint, build or assemble a search system from the bits and pieces Microsoft provides, or snap in a third-party solution.
Web self-service: searching for answers
Judith Lamont, Ph.D. //
01 Apr 2008
Few people who visit self-service Web sites have escaped unscathed from the frustrations that all too often accompany their use or attempted use. Simple transactions such as checking a bank balance can usually be accomplished efficiently, but more complex needs such as finding information about a health insurance policy or how to obtain replacement parts for a product can throw the visitor into an inescapable loop.
E-mail archiving: options for SMBs
Judith Lamont, Ph.D. //
01 Apr 2008
The market for e-mail archiving has experienced remarkable growth over the past several years, driven by compliance requirements and burgeoning volumes of messages. Both Gartner and IDC reported worldwide growth rates exceeding 40 percent in 2006. More modest growth rates over the next few years are still expected to push the market past $1 billion by 2011.
Sharing data in a crisis-State and local groups work on interoperability
David Raths //
01 Apr 2008
Employers & educators embrace e-learning
Phil Britt //
01 Apr 2008
Organizations are counting on e-learning solutions to facilitate in-house training, to stay abreast of security issues, and to locate and consolidate knowledge.
Enterprise Search Industry Spotlights: Coveo
01 Apr 2008
Email Management Market Roundup: KANA Software
01 Apr 2008
News Analysis
E-DRM plugs ECM security gap
Robert Smallwood //
01 Apr 2008
The gaping hole in security schemes for enterprise content management (ECM) systems is that few, protections exist once the information is legitimately accessed. That confidential information, which might include price lists, legal documents, patented designs, blueprints and reports, can often be printed, e-mailed or faxed to unauthorized parties without any security attached.
Google "glue"? Will Google adhere to you?
Stephen E. Arnold //
01 Apr 2008
The hurdles facing social computing
Hugh McKellar //
01 Apr 2008
COLUMNS:
David Weinberger
Online libraries are not libraries at all
David Weinberger //
01 Apr 2008
The Future of the Future
The Future of the Future: Government as a knowledge enterprise
Art Murray, D.Sc. //
01 Apr 2008
We've spent a good deal of space in this column looking at how business needs to transform itself to compete in the global knowledge economy. This month, let's take a look at how the same trends are forcing major changes in government.