Category Archives: Reporting

Research confirms that Facebook, Twitter and Google are spying on users

big brother

big brother (Photo credit: Vince_Lamb)

Social networks: can robots violate user privacy?

ECM Plus +++ Recent news in the international media has revealed numerous Internet privacy concerns that definitely deserve attention and further investigation, which is why Geneva-based High-Tech Bridge  decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed abuse – the privacy of their users.

According to High-Tech Bridge, the experiment and its results can be reproduced by anyone, as we tried to be as neutral and objective as possible. Continue reading

Leave a comment

Filed under Analysis, Analytics & Metrics, Business Risk, Compliance, Content Curation, Content Governance, Content Management, Content management system (CMS), Content Protection, Content Security, Corporate Civic Responsibility (CCR), Corporate Governance, Customer Relations Management (CRM), Data mining, Data privacy, Data protection, Data storage, Digital asset management, Enterprise Content Management, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Information security, Intellectual Property (IP), Intelligent Search, Legal, Policy Management, Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Security Content Management (SCM), Social Content Management, Trusted Cloud, UGC - User-generated content, WCM

EFF amicus brief urges protection for news search engine

Image representing Associated Press as depicte...

Image via CrunchBase

AP argues for dangerously narrow view of ‘fair use’ in battle over news-tracking service

San Francisco – The Electronic Frontier Foundation has urged a federal judge today to protect fair use of news coverage and reject the Associated Press’ (AP’s) dangerously narrow view of what is “transformative” in a copyright court battle over a news-tracking service. Continue reading

Leave a comment

Filed under ENG - Electronic News-Gathering, Enterprise Content Management, Enterprise Search, Industry News, Reporting, Search

Finance reports ‘out of date’ and ‘inaccurate’ – survey

Stack 'em high

Stack ‘em high (Photo credit: ant.photos)

46 per cent of finance departments believe reports they produce are never used

By ECM Plus staff

ECM Plus /London/ +++ Nearly half of managers and directors view reports produced by someone else no more than once per week. An alarming 46 per cent of finance professionals believe that they produce reports that are never used and 63 per cent believe that senior managers should make more use of financial information. Continue reading

Leave a comment

Filed under Analysis, Balanced Scorecard, Beyond Budgeting, Budgeting, Consultancy/Consulting/Systems Integration, Document asset management, Document Automation, Document Management, Finance, Forms management, processing, eForms, Governance Automation, GRC (Governance, Risk & Compliance), Output management, Planning & Forecasting, Records Management, Reporting, Six Sigma

Big bank insider exposes $20bn UBS tax evasion, awarded $104m

National Whistleblowers Center – www.whistleblowers.org

Whistleblower bags massive $104 million reward for foiling bankster scam

By ECM Plus staff

ECM Plus /Washington, D.C./ +++ Former UBS banker Bradley Birkenfeld has won a massive whistleblower reward of $104 million for his contributions in providing the U.S. Government with insider information on UBS’ illegal offshore banking scheme.

According to the National Whistleblowers Center, this is believed to be the largest reward ever given to an individual whistleblower in the United States and the first major reward issued under the IRS tax whistleblower law. Continue reading

Leave a comment

Filed under Accounting, Asset management, Business Intelligence (BI), Business Rules, Capital Management, Compliance, Corporate Civic Responsibility (CCR), Corporate Governance, Corporate Social Responsibility (CSR), Document Management, eDiscovery, Electronic Document Management & Delivery, Finance, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Internal Controls, Investor Relationship Management, Legal, Policy Management, Private Finance, Private Wealth, Records & Information Management (RIM), Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Segregation of Duties (SoD), Trade & Investment, Wealth Management

Yuan trade prospects good for Britain

Photograph of Brittania statue, taken 13th Jun...

Britannia on Plymouth Hoe

Hong Kong and England exchange would be good for future British prosperity as euro collapses

By PAUL QUIGLEY

ECM Plus +++ As Europe collapses under the strain of its top-heavy, over-debtedness and uber-bureaucratised idealism, the prospects for Britain are looking infinitely brighter in the light of recent exchange trade talks with the world’s second-largest economy, China.

Reports that the current British chancellor Osbourne is glad-handing the Chinese in the former British colony of Hong Kong comes as a welcome refrain for Britain’s social and economic prosperity, following the disintegration of the euro now taking place across the continent. Continue reading

Leave a comment

Filed under Accounting, AIM - Alternative Investment Management, Analysis, Analytics & Metrics, Asset management, Capital Management, Corporate Social Responsibility (CSR), Equity Capital Markets, Finance, GRC (Governance, Risk & Compliance), Private Finance, Private Wealth, Reporting, Wealth Management

Governance overhaul proposals as FRC moots corporate reform

Transparent screen.
Reality check for corporatism. Image – Niklas Barsk

Audit committee overhaul and specificity dominate reform plans

By ECM Plus staff

ECM Plus +++ The Financial Reporting Council has just launched a brace of new documents, enttled ‘Boards and Risk – A Summary of Discussions with Companies, Investors and Advisers’, and, ‘Boards and Risk – A Summary of Discussions with Companies, Investors and Advisers’ discussing effective corporate stewardship, a move to address more corporate transparency. Continue reading

Leave a comment

Filed under Business Risk, Corporate Governance, Corporate Social Responsibility (CSR), GRC (Governance, Risk & Compliance), Industry News, Internal Controls, Policy Management, Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Segregation of Duties (SoD), XBRL - eXtensible Business Reporting Language

WEEKEND PLUS: Jobsworths ponder putsch on small biz red tape

Edward Davey

Minister Edward Davey: "...freedom to innovate and grow..." Image - bisgovuk.

Government and FRC consider cutting financial reporting burden for small businesses

By ECM Plus staff

ECM Plus +++ Proposals to simplify the financial and corporate reporting requirements for the smallest businesses are the subject of a new ‘Discussion Paper’ published by the Department for Business, Innovation and Skills (formerly DTI) and the Financial Reporting Council.

Dubbed ‘Simpler Reporting for Smaller Businesses’, the discussion paper sets out ideas to reduce the amount of reporting micro-entities would be required to undertake.

FRC said this could benefit around 5 million businesses and result in considerable cost savings in relation to the preparation of their accounts. Continue reading

Leave a comment

Filed under Compliance, Corporate Governance, GRC (Governance, Risk & Compliance), Industry News, Regulatory Compliance, Reporting, XBRL - eXtensible Business Reporting Language

German giant gobbles BPM minnow

Robert Bosch GmbH

Business process software gets the Teutonic touch

Bosch plans acquisition of inubit AG

By ECM Plus staff

ECM Plus +++ German indusstrial giant Robert Bosch Group AG has acquired inubit AG, the small software firm specialising in business process management.

According to the company, its 100 associates generated sales of around 10 million euros.

However, the two companies said that the actual purchase price of inubit will not be disclosed. Continue reading

Leave a comment

Filed under Business process automation (BPA), Business Process Management, Industry News, Investor Relationship Management, Regulatory Compliance, Reporting

Sonic taps MetricStream for GRC and SOX

Sen. Paul Sarbanes (D–MD) and Rep. Michael G. ...

GRC solutions - helping to weed out internal corporatist corruption and expose tacit collusion

Fortune 500 auto retailer goes for governance, risk and compliance solution
By ECM Plus staff

ECM Plus +++ Enterprise governance, risk and compliance specialist MetricStream has announced a new deal with Sonic Automotive for a new Internal Audit Management and Sarbanes-Oxley Act (SOx) Compliance system.

According to the GRC provider, the new system will be used to automate and centralise its internal audit system and processes. Continue reading

Leave a comment

Filed under Business Risk, Compliance, Corporate Governance, GRC (Governance, Risk & Compliance), Internal Controls, Policy Management, Regulatory Compliance, Reporting, Risk Management, Segregation of Duties (SoD), Vendor News

‘Lull before storm’ as debt overhang threatens market

Lehman Brothers UK Staff Canary Wharf London S...

Image: conor withonen

CORPORATE FINANCE: US$1 billion of Lehman debt traded on IlliquiDX platform over past eighteen months

By ECM Plus staff

ECM Plus +++ Trading volume of over US$1 billion in Lehman creditor claims have been made since the beginning of 2010 in more than 120 separate transactions, according to London-based platform for securities IlliquidX. Continue reading

Leave a comment

Filed under Asset management, Business Risk, Corporate Governance, Equity Capital Markets, GRC (Governance, Risk & Compliance), Industry News, Reporting, Risk Management

LATEST FEATURE: Compliance: A hybrid marital troika?

Hoard Sklar, senior corporate counsel, RecommendIT

BY HOWARD SKLAR

Compliance is essential for all organisations, not least because of the financial penalties and reputational damage that come with non-compliance.

This, however, is easier said than done when many organisations have no idea that they are failing to comply.

This can often be the case with global companies where they may find they’re complying in one country but not in another, or across the whole. Continue reading

Leave a comment

Filed under Corporate Social Responsibility (CSR), Data Governance, Data privacy, Features, GRC (Governance, Risk & Compliance), Internal Controls, Regulatory Compliance, Reporting, Risk Management, Segregation of Duties (SoD), Web governance

In-house counsel warns over corporate compliance and internal reporting

Eagle with flag in background.

Eagle-eyes and ears of corporate whistleblowers

Association of Corporate Counsel frustrated by SEC ruling on whistleblowing bounty provisions of Dodd-Frank

By ECM Plus staff

ECM Plus +++ The Association of Corporate Counsel (ACC) is strongly disagreeing with a new Securities and Exchange Commission’s ruling that bypasses internal compliance and reporting systems in favour of permitting tips from prospective whistleblowers to be submitted directly to the SEC.

“The SEC’s bounty rule is a Pandora’s box that, when opened, is likely to create new and even unanticipated harms rather than promoting better reporting of potential problems” commented ACC’s senior vice president and general counsel Susan Hackett. Continue reading

Leave a comment

Filed under Compliance, Corporate Governance, eDiscovery, Enterprise Resource Planning (ERP), GRC (Governance, Risk & Compliance), Industry News, Internal Controls, Regulatory Compliance, Reporting

GFI logs on for SharePoint support in compliance, e-discovery move

SharePoint Architecture German

SharePoint architecture

EventsManager 2011 with LOGbinder SP proffers new log monitoring, alerting, reporting and archiving capabilities for SharePoint users

By ECM Plus staff

ECM Plus +++ GFI Software has just added SharePoint logging to its existing security and compliance offerings the company has confirmed.

New features for GFI EventsManager 2011 now include a dedicated SharePoint log managementand auto-update patch management capability, which also enables IT administrators to perform specific network and data security tasks for regulatory compliance, as well as for business continuity and e-discovery requirements.  Continue reading

Leave a comment

Filed under Business continuity, eDiscovery, Records Management, Regulatory Compliance, Reporting, SharePoint, Vendor News

SME market feels the financial heat as time-to-pay initiative ends

The Her Majesty's Revenue and Customs vessel H...

SMEs being scuttled by cessation of business initiative

Taxation killing off small-to-medium sized enterprises say insolvency specialists 

By ECM Plus staff

ECM Plus +++ There is a ‘hidden tragedy’ as the SME community is unravelling as the UK taxman calls in debts

According to one major UK insolvency practioner, debts owed to the Revenue are now the most likely causes of future company failures.

Figures just released by insolvency experts, almost 75 percent of instructions currently received cite Her Majesty’s Revenue & Customs as the largest single creditor at the point that a company enters administration. Continue reading

Leave a comment

Filed under Business continuity, Business Risk, GRC (Governance, Risk & Compliance), Industry News, Reporting, Risk Management

Javascript code cuts off bloggers from the Web

EFF calls for immediate action to defend Tunisian activists against government cyberattacks

Commentary by Eva Galperin

Demonstrations and protests over unemployment and poor living conditions have been ongoing in Tunisia since the beginning of December, but last week the Tunisian government turned up the heat on bloggers, activists, and dissidents by launching a JavaScript injection attack that siphoned off the usernames and passwords of Tunsians logging in to Google, Yahoo, and Facebook.

The Tunisian government has used these stolen credentials to log in to Tunisians’ email and Facebook accounts, presumably downloading their messages, emails, and social graphs for further analysis, and then deleting the accounts entirely. Among the compromised accounts are Facebook pages administered by a reporter with Al-Tariq ad-Jadid, Sofiene Chourabi, video journalist Haythem El Mekki, and activist Lina Ben Khenni.

Unsatisfied with merely quelling online freedom of expression, the Tunisian government has used the information it obtained to locate bloggers and their networks of contacts.

By late last week, the Tunisian government had started arresting and detaining bloggers, including blogger Hamadi Kaloutcha, and cyberactivist Slim Ammamou, who alerted the world to his whereabouts at the Tunisian Ministry of the Interior using Google Latitude.

This weekend, Tunisian citizens began to report on Twitter and in blogs that troops were using live ammunition on unarmed citizens and started communicating with one another to establish the numbers of dead and injured.

Most notably, Tunisians have been posting videos of the protests, including the dead and wounded on Facebook, the only video-sharing site which is not currently being blocked by the Tunisian government, which makes access to Facebook especially important for the protest movement.

Because of the Tunisian government’s attacks on citizens’ login credentials, Tunisians should take the following steps to protect themselves: if HTTPS is available, use HTTPS to login to Facebook, Google, and Yahoo. If you are using Firefox, EFF’s HTTPS Everywhere plug-in will do this for you automatically.

EFF has received reports that the Tunisian government is periodically blocking HTTPS access to Facebook, Google, and Yahoo. If that is the case and you must login over HTTP, install the following Greasemonkey script to strip out the JavaScript which the Tunisian government has inserted to steal your login credentials. If you have logged in to Facebook, Google, or Yahoo recently over HTTP, login using HTTPS and change your password.

Additionally, EFF calls on Google, Yahoo, and Facebook to take action to protect the privacy of its users by alerting them of the potential compromise of their accounts and encouraging them to take the above steps.

Finally, Facebook has reported that is in the process of taking technical steps to protect the privacy of their users. We hope that they include the following: •Make Facebook logins default to HTTPS, if only in Tunisia, where accounts are especially vulnerable at this time. Google and Yahoo logins already default to HTTPS. •Consider allowing pseudononymous accounts for users in authoritarian regimes, where political speech under your real name is dangerous and potentially deadly. Many Tunisian activists are unable to reinstate Facebook accounts that have been erased by the Tunisian government because they were not using their real names. Websites providing services to Tunisian citizens cannot afford to sit on the sidelines while the Tunisian government launches malicious attacks on the privacy of users and censors free expression. Facebook, Google, and Yahoo should take these concrete steps as quickly as possible to inform and better protect their users.

Source: EFF

Leave a comment

Filed under Collaboration platform, Content Security, Enterprise Social Software (ESS), Industry News, Reporting, Security Content Management (SCM)

FEATURE: Getting To Grips With Data Classification

Image representing CREDANT Technologies as dep...

Image via CrunchBase

It has to be done so where do you start, where do you stop
and what do you do the in the meantime? Sean Glynn, VP Product Development Credant Technologies investigates.

Data classification is not a new concept. It is a fundamental requirement for information security, and the consequences for failing to fully implement a data classification scheme can be disastrous. Nevertheless, while many organisations start data classification projects they all too often struggle to complete them. This article outlines what should be included in a data classification project, examines why many fail to get off the ground and the steps companies should take to protect sensitive data while it’s in progress.

Data classification essentially means assigning a level of sensitivity to data used by an organisation, and it forms a critical component of Information Lifecycle Management (ILM). While classification systems vary from country to country, and indeed organisation to organisation, most have levels corresponding to the following general definitions (from the highest level to lowest): top secret; secret; confidential; restricted (or sensitive); and unclassified.

While computer programs exist that can help with data classification, ultimately it is a subjective business and is often best done as a collaborative task that considers business, technical, and other points-of-view. Different departments within an organisation all need to be consulted and will have different views on what is, and isn’t, sensitive and how it is best protected. An additional aspect to consider is whether a document that is confidential today will remain so for the duration of its life.

For example, a public company’s financial results will be extremely sensitive prior to announcement yet, once in the public domain, confidentiality is no longer an issue.

With so many people involved in the decision process, and the constantly changing status of information, it is easy to see what causes delays or even the complete downfall of many data classification projects.

Practical Tips for Implementing a Data Classification Scheme
With these challenges identified, we’ve outlined some practical approaches to implementing a data classification scheme to help you get started:

Understand what is realistically achievable: If you’ve ever tried to do everything at once you’ll recognise that inevitably nothing gets done and the same is true with data classification. That said, it is equally true that something is better than nothing. By breaking the project down into smaller, targeted and manageable pieces with regular reviews and implementation targets, you will start to chisel away at the task.

Set the bar at a realistic height: There are varying degrees of discipline and compliance with a data classification project. Unfortunately, not every organisation is lucky enough to have a completely disciplined workforce so, if there is likely to be resistance, opt for a simpler scheme ratherthan one that is overly regimented or complex and so likely to cause resistance among users.
 
Keep your friends close and your enemies closer: Regardless of how rigid or simplistic your control strategy is, it is going to need support from others within the organisation if it’s to be accepted and embraced. By consulting with key individuals early on in the process, and ensuring they feel part of its design and introduction, the project is less likely to receive hostility during its implementation.
 
Approve the data classification strategy asap, even if full implementation is delayed. First, it costs nothing at this stage; secondly, any new systems can be designed with data classification in mind, narrowing the implementation burden to existing systems; and finally, if confidential information is inadvertently disclosed, the security program can point to the classification strategy and push accountability to the line of business managers that have not yet implemented it.
 
Use regulation to argue your case: Increased legislation is one of the most effective tools that can be used by a security program. Reference these regulations to bring awareness of the need for data classification and give the security program the necessary muscle and support to get implemented.

Classify networks instead of data: For organisations where classification of data appears to be an unreachable goal, try classifying the networks instead of the data.  Whilst network classification is not a trivial exercise, it is often easier than the implementation of a comprehensive data classification scheme for data that is digitally stored in large organisations.

Something is better than nothing: While you’re going through the process of identifying your sensitive data and how best to protect it, it will quickly become clear if you have sensitive data that needs protecting. A comprehensive endpoint data encryption solution, protecting data where it resides on laptops, desktops, smartphones and the now ubiquitous USB Thumb Drives everyone seems to use, is an important tool that can be rolled out across the organisation, even before a data classification project is completed, and can then be utilised moving forwards.

However, be warned, not all encryption solutions offer the same protection. Ideally, you need something that:

- can be rolled out, managed and maintained centrally
is user specific, not device dependant, so that even if a PC is shared the users data isn’t

- will be enforced so users can not circumnavigate its use

- covers all forms of data regardless of the program in which it is created; the network where it resides or the device it is carried on

- should not impede the device’s performance

There is no short cut to faster data classification but there are solid arguments for why it should be undertaken, correctly. While it is true that information can’t be adequately protected if there’s no way of tracking its location, value and sensitivity to leakage, equally while it’s waiting to be rated it is vulnerable to exploitation. If you know you’ve got valuables somewhere in the building, you install an alarm system and make sure entry and exit points are secured – shouldn’t you at least do the same for your data?

Classification Definitions

Top Secret The highest level of classification of material on a national level. Such material would cause “exceptionally grave damage” if made publicly available;

Secret: Such material would cause “grave damage” if it were publicly available;

Confidential: Such material would cause “damage” or be “prejudicial” if publicly available;

Restricted: Such material would cause “undesirable effects” if publicly available. Some countries do not have such a classification;

Unclassified: Technically not a classification level, but is used for documents that do not have a classification listed above.

www.credant.com

Leave a comment

Filed under Content Categorisation, Content Security, Document Management, Features, ILM (Information Lifecycle Management), Reporting, Security Content Management (SCM)

Information Commissioner: Street View breaches data protection laws

Christopher Graham, the UK Information Commiss...

Commissioner Graham finds Street View broke law

Government watchtdog finds search engine giant of unlawful Street snooping in private data dredge

ECM Plus – The UK Government Information Commissioner has found search engine behemoth Google will be subject to audit and must sign an undertaking not to breach data protection laws again.

The Information Commissioner further stated that if the search engine company were to undertake such an unlawful data breach in the UK again, they would ‘face enforcement action’ the ICO said in a statement.

Commissioner Christopher Graham said: “…there was a significant breach of the Data Protection Act when Google Street View cars collected payload data as part of their wi-fi mapping exercise in the UK.”

Commissioner Graham has instructed Google to sign an undertaking in which the company commits to take action to ensure that breaches of this kind cannot happen again.

Furthermore, in light of the breach of data protection, an audit of Google UK’s Data Protection practices will also be undertaken.

However, the Information Commissioner rejected calls for a financial penalty to be imposed on the search engine giant, but said that it was ‘well placed to take further regulatory action if the undertaking is not fully complied with.’

According to the ICO statement, iInternational data protection authorities that undertook in-depth investigations into Google’s activities found fragments of personal data, including emails, complete URLs – and passwords.

ICO said that following the admission by Google that personal data had indeed been collected, and the fact that Google used the same technology in the UK, the Commissioner decided that formal action was necessary.

Commissioner Graham is also requiring Google to delete the payload data collected in the UK as soon as it is legally cleared to do so.

Information Commissioner, Christopher Graham, added: “It is my view that the collection of this information was not fair or lawful and constitutes a significant breach of the first principle of the Data Protection Act.”

Said Graham: “The most appropriate and proportionate regulatory action in these circumstances is to get written legal assurance from Google that this will not happen again – and to follow this up with an ICO audit.”

Leave a comment

Filed under Business Intelligence (BI), Compliance, Content Security, Data centres, Data Governance, Data privacy, Data protection, Data storage, Enterprise Content Management, Enterprise Search, Industry News, Information Governance, Information security, Intellectual Property (IP), Knowledge Management, Reporting, Rights Management, Scanning, Security Content Management (SCM)

Big Blue plucks PSS Systems in compliance swoop

Image representing PSS Systems as depicted in ...

PSS Systems acquired by Big Blue

Deal acquires PSS Systems info governance capabilities

ECM Plus – Big Blue has acquired privately-held PSS Systems for an undisclosed sum

According to the company, PSS Systems’ software analyses, automates and implements information governance policies across massive amounts of electronic business information and disposess of that information in an automated way.

Big Blue said these processes were ‘critical elements to remaining responsive to legal obligations while reducing data storage costs’.

The company also stated that needlessly retaining information increases business risk, impedes the ability to respond to legal requests, and puts costs restraints on organisations in every industry.

“Together, IBM and PSS Systems can help business mitigate legal risk and reduce costs with routine information disposal,” said Deidre Paknad, CEO of PSS Systems. “Poor visibility and ad hoc controls cause companies to over-retain information and significantly overspend on information management, litigation and e-discovery.”

PSS Systems has exisitng clients such as BP, GE and Pfizer.

PSS Systems founded the Compliance, Governance and Oversight Council (CGOC), a corporate practitioner’s forum with more than 800 members. They also developed the industry leading Information Governance Process Maturity Model which includes process assessment and business case methodologies, best practice tools and delivery models for legal and IT professional.

Big Blue will add the PSS business to its existing range of Information Lifecycle Governance solutions, which include content assessment, collection, archiving, imaging, advanced classification, records management, e-discovery search and analytics as well as storage management and smart archive strategy.

PSS Systems will be folded into Big Blue’s Software Group.

Leave a comment

Filed under Analytics & Metrics, Compliance, Data Governance, Data storage, eDiscovery, ILM (Information Lifecycle Management), Industry News, Information Governance, Information Management, Reporting

Bit of awe anchor for new Vizrt IPad app

Behold the iPad in All Its Glory

Look - no hands! Watch that media luvvy's cleavage dangling into the touchscreen and change captions

Norse Intro Viz Anchor App for the iPad

ECMPlus – by Paul Quigley +++ At IBC2010, taking place at RAI Amsterdam from September 9-13, Vizrt is to release the Viz Anchor App for the iPad.

The app runs natively on the iPad and enables control over newsroom playlists, including video and graphics directly from the handheld device.

And as if that isn’t enough to whet the appetites of old gadget farts, the gussets of media luvvies, then Viz Anchor App also integrates seamlessly with existing Vizrt workflows.

It can also do a subset of Vizrt’s control applications and makes that control available on the iPad.

Apparently, with Viz Anchor App, the presenter has an updated version of the playlist available locally and can control video clips and graphics scenes without a PC or queries to the control room. Awesome. No more gallery guffawing or pulling silly faces through the glass.

This results in a more dynamic presentation with a smooth and organic flow. Top notch or what.

The Anchor App also, features an intuitive interface that takes advantage of the iPad’s capabilities, such as support for high-res video and an intuitive, touch-based interface.

Through the device’s wireless connection, the Viz Anchor App can be updated whenever the playlist changes. Thus, the presenter always has all elements of the latest playlist at their fingertips.

Vizrt also offers real-time 3D graphics and asset management tools for the broadcast industry – from animations and maps to online publishing tools.

Now when will Windows get this kind of capability. Don’t hold yer breath.


Leave a comment

Filed under Business Process Management, Content Provision & Creation, Digital asset management, Reporting, Vendor News, Workflow

ERP player tackles SAP certification

SAP AG Headquarters, Walldorf.

SAP making it happen via QIS

Certification for enterprise manufacturing from QiSOFT

ECMPlus.com – by Paul Quigley – SAP certification has been awarded to Leyland based QiSOFT for a new browser-based version of its enterprise manufacturing intelligence software suite, QIS – ERP1.0.

The new version was developed using the SAP NetWeaver technology platform and it fully integrates with the QiSOFT software and other third party systems through SAP XI/SAP PI interfaces.

“In developing the browser version, we have responded to a growing need from SAP customers who seek integration throughout the enterprise. We are offering customers the best of both worlds, combining the stable and functionally rich QiSOFT manufacturing suite with the lean, swift-to-deploy browser version. Customers can make use of the full manufacturing application suite where it makes sense to do so alongside the browser-based version,” says Tim Perris, business development manager. 

“Data can be collected manually or automatically from the process and laboratory and instantly transformed into rich information for analysis and site or enterprise-wide reporting.”

As part of the SAP online solutions directory, QIS ERP 1.0 allows for rapid, cost-effective implementation and is attractive to companies with moderate data needs without investing in costly infrastructure. The QiSOFT mission is to deliver higher and more consistent levels of quality for manufacturers by the gathering, interpretation and clear reporting of data on key process parameters for effective and timely management action. Manufacturing applications arise in food and beverage, pulp and paper, chemical, consumer packaged goods, paints and coatings and textiles.

The ability of QIS software to interpret large volumes of data has also led to the technology attracting wider interest from areas such as law enforcement, healthcare and drug diversion.

Leave a comment

Filed under Enterprise Resource Planning & Management, Reporting

FEATURE: United We Stand – Integrating GRC systems

SocGen

SocGen: Image - Radu Stoita

BY PAUL QUIGLEY

Governance Risk and Compliance (GRC) management has evolved since the knee-jerk reaction days of 2001, post-Enron and the passing of the US Sarbanes-Oxley legislation. In this second article in the series, Paul Quigley looks at what’s out there and considers the challenges facing integrated GRC systems.

Just as the former NatWest Three bankers get sent down for a three-year stretch, SocGen’s rogue trader in custody, many of the recent financial scandals in corporate governance have, amongst other factors, concerned systemic failures. Continue reading

Leave a comment

Filed under Compliance, Corporate Governance, Corporate Social Responsibility (CSR), Features, GRC (Governance, Risk & Compliance), Internal Controls, Records & Information Management (RIM), Regulatory Compliance, Reporting, Risk Management, Segregation of Duties (SoD)

FEATURE: In GRC we trust – more than just another management mantra

Before the signing ceremony of the Sarbanes-Ox...

The signing of the Sarbanes-Oxley Act

BY PAUL QUIGLEY

Governance Risk and Compliance (GRC) has evolved since the knee-jerk reaction days of 2001 post-Enron and the passing of the US Sarbanes-Oxley legislation. Big players from Oracle and SAP to other nascent, niche insurgents are vying for market share in the burgeoning race to comply and explain to regulators and stakeholders. In the first of a three part series on GRC, its systems and processes, Paul Quigley considers the issues. Continue reading

Leave a comment

Filed under Corporate Governance, Corporate Social Responsibility (CSR), Features, Internal Controls, Investor Relationship Management, Records & Information Management (RIM), Regulatory Compliance, Reporting, Risk Management, Segregation of Duties (SoD)