The Gilbane Group Report - Cloud Content Management: Facilitating Controlled Sharing of Active Content


Click here to download now

Source: Box
Date: July 2011
Type: White Paper
Rating: (0)

Overview: The nature of how business is conducted and organizations function is rapidly evolving, as a result of fundamental changes in demographic, technological,and economic realities. Workers are increasingly Web savvy; they use and like consumer Web 2.0 collaboration applications on the public Internet and are expecting and demanding similar software user experiences in the enterprise.

Enterprises themselves are changing. Organizations are more networked, internally and with other entities, as a result of improvements in computing networks, globalization, and an increasingly mobile workforce. All the while, IT department budgets have shrunk during the current recession, forcing IT staff to tackle an ever-growing list of corporate computing requirements and projects with fewer human resources. These challenges are driving organizations and their workers to think differently and to seek new content management strategies and solutions that complement existing content management systems. Continuing to manage and share content solely with "yesterday's logic" is not a viable option. One promising approach is Cloud Content Management.

This Gilbane Group Beacon examines how large-scale trends are changing enterprise collaboration and content sharing requirements and expectations. It defines Cloud Content Management, an emerging set of content management practices and a category of software that supports those practices. Lastly,it demonstrates how Cloud Content Management is a value-adding complement to Enterprise Content Management today and has the potential to expand its ability to control the sharing of content more tightly in the future.

Not what you're looking for? Search again
Go Advanced »
More From the Hosted Software/Applications Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management

Development : Architecture & Design, C/C++, Database, Development Tools, Embedded Systems, High Performance Computing, Java, Mobility, Security, Web Development, Windows/.NET, Open Source

Government : Cloud/SaaS, Enterprise Applications, Enterprise Architecture, Federal, Information Management, Leadership, Mobile & Wireless, Policy & Regulation, Security, State & Local

Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers

Healthcare : Policy & Regulation, Leadership, Security & Privacy, Mobile & Wireless, Electronic medical records, Clinical information systems, Administration systems, Interoperability, The Patient

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business

Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends

Mobility : 3G Wireless/Broadband, 802.11x, Fixed Mobile Convergence, Mobile Business, Mobile Messaging, Muni Wireless, RFID, Smartphones, Wi-Fi VOIP, Wi-Fi/WiMax, Wireless Security, WLAN

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds

Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats

Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services

Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Call Centers, Presence, Collaboration Systems, Business, Regulation, Internet policy

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Office Suite, Open Source, Operating system, Security


More Software Resources

Demystifying Industry Standards
A B2B standards e-book that helps demystify the industry standards for the commerce life-cycle. "Although industry standards were designed to make business communications ......



More On Software