Optimizing SharePoint Recovery, Retention, and eDiscovery

SharePoint Archiving Journal

Subscribe to SharePoint Archiving Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get SharePoint Archiving Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

My good friend and colleague, Tommy Patterson, recently blogged about leveraging the Windows Azure Infrastructure as a Service (IaaS) preview offering to build a FREE lab environment in the Cloud.  You can read Tommy’s step-by-step article at: Building FREE Lab VMs in the Microsoft Cloud What about a SharePoint 2013 Lab in the Cloud? Now that SharePoint Server 2013 has been released, I frequently get asked about ways in which a SharePoint 2013 lab environment can be easily built for studying, testing and/or performing a proof-of-concept.  You could certainly build this lab environment on your own hardware, but due to the level of SharePoint 2013 hardware requirements, a lot of us may not have sufficient spare hardware to implement an on-premise lab environment. This makes a great scenario for leveraging our Windows Azure FREE 90-day Trial Offer to build a free lab en... (more)

The Hidden Business CoST: Consumerization of Sharing Tools

Sharing files with friends has never been easier. Whether it is via old-school hard copy methods like CDs, DVDs and USB drives, nefarious peer-to-peer torrents like BitTorrent or new shared, private cloud storage services like Dropbox, getting a photo or music file from one person to another takes mere seconds. The problem is that people inside businesses aren't using these services just to share personal files. They are circumventing secured content management systems like SharePoint in favor of consumer-friendly services in order to share files with third parties. For businesses, Consumerization of Sharing Tools (CoST) can encourage insecure file sharing and the impact can be startling. WikiLeaks was the result of a failed SharePoint deployment. The user simply circumvented the SharePoint system, downloaded extremely sensitive data and made it available to the w... (more)

Avoid the Seven Common Software Marketing Mistakes

Marketing Automation on Ulitzer Software is ubiquitous these days, and there are so many flavors to choose from.  We have business software as well as personal/consumer software.  We have software that barely dents the wallet as well as software that requires a complex business decision-making process and millions of dollars.  We see Software as a Service (SaaS) models as well as Software as a Product (SaaP) models. The broad range of software types makes it difficult to identify the most common marketing mistakes, but not impossible.  Having worked as employee, consultant and agency for multiple software companies, I possess a somewhat unique perspective on what often goes wrong on the marketing side of the house.  Let’s take a look at 7 common software marketing errors and offer some quick mindset fixes: 1) Allocating marketing resources and dollars to the big pr... (more)

Integration Concerns No Barrier to Enterprise Cloud Adoption

Study from Mimecast Finds that Security and Integration Concerns are not Preventing Enterprises' Cloud Computing Adoption London - February 4, 2010 - Mimecast®, a holistic email management company offering SaaS-based email archiving, continuity, security and policy control, today announced the results of its Cloud Computing Adoption Survey, which examined the perception and adoption of cloud computing solutions among 565 respondents responsible for managing their organization's IT operations and budget across the U.S. and Canada in the Fall of 2009. Data from the recently completed online survey highlights the complex, often contrasting, thought process of IT decision makers regarding cloud computing. While security and integration issues are clearly users' biggest fears about cloud computing, these concerns have not dissuaded companies from implementing cloud-based... (more)

Fujitsu and Mindtouch Partner Up to Offer Enterprise Cloud Collaboration

Cloud Computing on Ulitzer Microsoft SharePoint's open source clone, MindTouch, is integrating its platform with Fujitsu's ScanSnap family of scanners to help clients upload, store and share business documents on the web. The companies say that through this partnership, they have removed one of the biggest adoption barriers to scanning. The scanned images can be accessed by different team members in an enterprise who will be able to edit the piece within a MindTouch page irrespective of physical location. Complete IT governance and security is maintained during the process which eliminates cumbersome procedures like sending faxes or making physical copies. MindTouch has been carving a niche for itself in enterprise collaboration market that is a necessity in today's business environment comprising of geographically dispersed teams and complex outsourced structures r... (more)

SaaS Sales Model and Organization Strategy

One of the most difficult SaaS challenges is choosing and evolving the right SaaS sales model for your business. While the most common SaaS sales model is characterized by a transactional inside sales organization, frequently split into new business focused sales reps and retention focused account managers, this is by no means the only SaaS sales model, and may NOT be the best SaaS sales model for your business. SaaS businesses come in many flavors from consumer-ish freemium services like Box.net and Cloudflare to high-end enterprise solutions like Workday and BazzarVoice. Choosing the right SaaS sales model is often a bet-the-company decision, as second chances are rare in the fast moving world of the Internet. Plus, as your SaaS product offering and customer base grows, you are likely to find yourself supporting several distinct and varied SaaS sales models. How to ... (more)

HP Cloud Is All Set to Enter the Public Beta

OpenStack gets one of the most crucial endorsements as HP goes into the public beta on May 10th. I got the private beta access a couple of months ago and I tried a few scenarios. Though it has a long way to go, HP Cloud looks complete in its approach and is ready to take Amazon head on! HP Cloud has three major components in its current form: HP Cloud Compute that provides on demand compute instances as well as custom instances to handle workloads. HP Cloud Compute also enables the addition of new instances through RESTful APIs based on industry standards for quick scale out HP Cloud Object Storage offers on-demand scalable storage capacity ideal for archiving and data backup, serving static content for web applications, and storing large public or private data sets HP Cloud Content Delivery Network (CDN), powered by the Akamai Intelligent Platform™, reduces latency... (more)

Adobe Delivers Web Experience Management in the Cloud

Adobe Systems on Tuesday announced the availability of Adobe® CQ Cloud Manager, a Software-as-a-Service application that provides enterprises the ability to easily and quickly launch marketing initiatives in the cloud. With CQ Cloud Manager, part of the Adobe Digital Marketing Suite, digital marketers have access to an integrated set of cloud-hosted Web Experience Management (WEM) services to create, manage, measure and optimize personalized experiences on websites, mobile devices and social media. Organizations have the flexibility to work with interactive agencies and infrastructure providers for hosting and management of Adobe CQ in the cloud. And today, Adobe also announced its own managed and hosted service, Adobe CQ Cloud. With Adobe CQ Cloud Manager, enterprises can: Quickly launch marketing campaigns and e-commerce sites Set up Web, mobile and social initiat... (more)

SharePoint Gone Wild: When Governance Lacks Accountability

In a webinar entitled ‘Business Drivers and Checklists for Successful SharePoint Governance', Randy Williams, SharePoint MVP and AvePoint Enterprise Trainer & Evangelist, and I discussed the business drivers that come from individuals outside the IT department for SharePoint as a service within an organization. These drivers often result in policies being defined to set the expectation with the business and to focus alignment with the IT department. Over a series of posts, I will focus on horror stories, from some of our 8,000+ customers we have here at AvePoint, which provided the genesis for these business drivers. The intention of this series is to proactively help your organization understand what "could happen" and what the business drivers are to help you structure your organization's governance system. I'm fortunate enough to get to meet a lot of our custome... (more)

Microsoft Fined $733M for Flouting Browser Pact

The European Commission Wednesday levied a fine of €561 million ($733 million) on Microsoft for failing to keep its legally binding 2009 promise to offer European Windows users a choice of rival browsers. Microsoft claimed an accidental technical glitch prevented the new Windows 7 Service Pack 1 from displaying the agreed browser screen of 12 alternative browsers between May 2011 and July 2012. The original deal was to show the browser screen until 2014. The EC estimates that 15 million Europeans were never made aware that they could use a browser other than the default Internet Explorer. It also said that prior to May 2011 when the browser screen was available 84 million browsers were downloaded. Europe's competition commission Joaquin Almunia said, "Legally binding commitments reached in antitrust decisions play a very important role in our enforcement policy. A... (more)

Microsoft's Report: Cyberspace 2025

Our dependency on Internet will only grow and with new countries maturing and entering it can only be exponential. Innovation in technology and unparalleled mobility can only accelerate it. The report estimates upward of 4.7 billion people of which 75% from emerging economies entering the Internet and this can only bring in more forces to contend with. What kind of a model can be predictive of such an enormous change? The report tries to lay down the scenarios and make recommendations. The list of recommendations is long and each of it looks undoable given the diversity of nations; national beliefs; priorities.... Here is a summary of the six chapters: Chapter 1: Navigating the Future of Cybersecurity Policy Challenges we will be facing The Model The possible scenarios and the outcome Chapter 2: A map of the future terrain of cyberspace: The Cyber 2025 Model "The Cyber 2025 M... (more)