So you want to store your information using “Cloud Storage”?

So you want to store your information in the “Cloud” With cloud storage services

Disaster Recovery Weaknesses Are Pervasive

“According to a new study conducted by Quantum, 90 percent of IT decision-makers believe Continue reading

15fb61cae1a9a7b2dfbe43d240f8fcc2

Information overload? Data Deluge? ALERT!

Information overload? Data Deluge? ALERT!

Gartner, A leading Analyst firm reports: Average storage per household will grow from Continue reading

4e82daf3b8e94a49301f3de8f914caf6

Information Overload – Personal Information and an IBM White Paper

If you don’t believe me, Believe IBM!
Information overload is a reality. I am connecting the dots here. The issues are the same when it relates to both Personal Information Management and Enterprise information management.

Excerpts from a White Paper just released by IBM: The Coming Storage Armageddon: What Your Continue reading

51ba2e7644d5dcd5c082d77154d59ff9

Cloud Storage and Personal Information Management Strategy

Personal Information Management – “PIM Coach tip of the day”.

Google is about to announce the specifics of their increased on-line storage capabilities. Microsoft is pushing their online storage for individuals and Small and Mid size business. Proceed with caution. Here’s why… Continue reading

d64b3f29723caf7006c15fe91d8d164b

Personal Information Management – Ever had a disk crash? Read this.

With regard to Personal Information Management – PIM – Millions of people experience a major loss of data every year!!

We all inevitably will suffer a disk crash on our primary personal computing device. This event will end up being either a minor inconvenience, OR a major disaster. Only you have the ability to influence which it is.

Below is a technique that will enable you to avoid the major disaster. It is called Continue reading

75e79ec7d3d678859374cf667234a45a

Personal Information Management (PIM) tips

December 1st is upon us. Personal Information Management (PIM) tips for December.

1.) Pay your bills. Continue to automate your bill paying process
2.) Review and construct your financial planning moves in anticipation of year end.
3.) Start to gather Continue reading

24ab0f23c42550e6b63bc0ebe15a9d59

This is a MUST Read regarding Personal Information Management (PIM)

This is a MUST Read regarding Personal Information Management (PIM)

Results of a survey conducted by Wakefield Research include the following (Note-1):

* 51% of Americans have experienced a computer crash where they lost ALL of their digital files.
* More than one-third (39%) admit they have never Continue reading

5479adbe07884b2245aa2f753e0f24d2

Keep personal information (PIM) and work data seperate! Here’s why.

Keep personal information and work data separate! Here’s why.

Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1

This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading

ab56fc82884023b6c19863b80e43292d

Identity theft: It has happened to you. What should you do?? PIM Tip

Identity theft: It has happened to you… What should you do?? Personal Information Management Tip

Thieves act quickly in Identity Theft scenarios. Your Personal Information will be compromised within hours. The more quickly the bad guys act, the lesser the probability they will get caught in the act. The moment you realize that something is not right, and you suspect your identity has been stolen follow these fairly simple steps Continue reading

9561c9d221e8692f5fa64d1de32e95c4

How to create secure Passwords – Personal Information Management – PIM Strategy

How to create secure Passwords:

A significant part of your Personal Information Management strategy is related to security, and Privacy. Nothing is more fundamental than your Password management technique.

Consequences of not creating secure passwords include – bad people getting into your data and Continue reading

ed2bee5bcc66aab92b4d60744b7c8f59