Phone: 650-474-0955
Email: Info@galaxyconsulting.net

Jun 30

Information Security

Data is not just critical to business it is core. It is the essence of a company’s function. Big data is a major part of that flow, and the more customer data that is out there, the more it needs protection.

As big data gathers momentum, incorporating security into planning and processes in the early stages of a project are becoming more important. The big data revolution is just getting started,” adds Munshani, “and will present major security challenges if its data management is not carefully planned.

Formerly the exclusive domain of IT, information security has now become the domain of everybody including content and knowledge managers.

Read more...

Add Comment | Views: 47
May 17

Yammer and SharePoint

Enterprise social network vendor Yammer was a large and fast growing player when Microsoft acquired it in late 2012. Yammer has users in more than 150 countries, and the interface is localized into more than 20 languages.

At its core, Yammer is a micro-blogging service for employees to provide short status updates. Whereas Twitter asks, “What’s happening?” Yammer asks, “What are you working on?”

Read more...

Add Comment | Views: 103
Mar 27

E-Discovery and its Stages

Every organization should take necessary steps to be prepared for E-Discovery. What is E-Discovery?

Electronic discovery or E-Discovery refers to discovery in legal proceedings such as litigation or government investigations where the information is sought is in electronic format. This information is often referred to as electronically stored information or ESI.

Read more...

Categories: E-Discovery
Add Comment | Views: 196
Feb 28

12 Steps in Knowledge Management

User centered design is important for successful knowledge management. This design can also be called design thinking. Design thinking can help with process architecture, tools, and a knowledge sharing culture. These are important points for knowledge management improvement:

1. The emphasis on emotion and empathy of user would have a great impact, focus on experimentation and testing before scaling and confidence even in the face of uncertainty. Thus, buy-in for KM initiatives increases when adequate empathy has been shown to employees concerns and if participatory design elements have been used to come up with the knowledge management architecture and processes.

Read more...

Add Comment | Views: 267
Jan 26

E-discovery and Legal Processes

When a company has a much stronger handle on the status of each legal hold, the less effort and less financial strain it will be on the company in case of a litigation.

Data must be protected during e-discovery just as it does when it is a part of any other business activity.

The degree of security risk depends on the nature of the data. Standard business contracts might not be highly sensitive and thus create minimal risk, but exposure of intellectual property that represents the crown jewels of a company could be a major risk.

Read more...

Categories: E-Discovery
Add Comment | Views: 232