Content

Grounded in original research, Jinfo Content helps you turn our insight into action on critical information challenges.

Available through a Jinfo Subscription, our articles, reports and recorded webinars bring you practical ideas, case studies, tips and models for change.

Filter the list below:

Article

James Mullan Better Semantic Search: Google's New Hummingbird Search Algorithm
10th October 2013

Last month Google rolled out a major new upgrade to the algorithm that interprets user searches. Codenamed "Hummingbird", it's the first major upgrade to the Google search algorithm in almost three years. James Mullan explores how our search results will be affected by concepts such as semantic search and conversational search.

Read

Article

Claire Whayman Market Map: the Options in News Aggregation & Beyond
10th October 2013

The pace of technological advancement and the advent of social media has widened the provision and scope of news aggregation resources. Products traditionally focused on legal or financial information, PR, communication and marketing activities, together with those aimed at the news industry itself all provide a potential wealth of business news. This Market Map provides a top-level comparison of the types of news aggregation tools available, from social media aggregation to press cuttings and software-only solutions. It is intended as an aid to the information professional in considering alternative sources of news.

Read

Article

Matthew Baker The Global Regulatory Environment: Regulatory Risks for Businesses
10th October 2013

Identifying the regulatory risks for global organisations is an increasingly-complex task as the amount of regulation and legislation faced by the financial services industry continues to grow at an alarming rate. Victoria Brocklehurst and Matthew Baker explain the differences of approach to compliance between countries and jurisdictions. They outline key risks which compliance teams should consider, from extra-territoriality to the varying rules surrounding the marketing of products into different jurisdictions.

Read

Article

Tim Buckley Owen Combatting Identity Fraud & Online Threats
9th October 2013

If even sophisticated information companies like LexisNexis, Dun & Bradstreet and Kroll can fall victim to cyber attacks who can't? Verizon's latest survey shows that security breaches can take months if not years to discover, and European organisations are concerned that a proposed directive on network & information security will be too slow moving to address the threat. Meanwhile there are plenty of touted solutions - from Gartner, the Cloud Security Alliance and HP Autonomy - with big data analytics playing a key role.

Read

Article

Robin Neidorf Understanding Technology Culture... and What You Can Do About It
9th October 2013

An organisation's technology culture - the attitudes, processes, talents and systems that drive its adoption of new technologies - has a major impact on its approach to moving technology-related projects forward. Robin Neidorf introduces tools for carrying out a technology culture inventory to provide perspective on what's working and what needs attention. For example, where implementation is a weakness, there are some basic principles that a manager can apply, such as project documentation, setting measurable goals and working towards those goals.

Read

Article

Sarah Dillingham What's In It For Me? Dealing with Barriers to Organisational Sharing
8th October 2013

Why don't some people want to share? The answer usually given is "culture", but it could more accurately be "what's in it for me?" This article looks at some practical ways to deal with barriers to sharing knowledge from personalities to internal competition and time constraints. Sarah Dillingham also provides tips for effective knowledge management within organisations.

Read

Article

Victoria Meyer Linguistic Identity Matching
7th October 2013

This article looks at the modern, linguistic approach to identity matching that has improved both the precision and the recall of compliance screening systems. It considers the different sources of variation in the ways identity details can be presented, and goes on to look at the most effective ways of addressing them. The ideas presented here are taken from "Linguistic Identity Matching" by Lisbach and Meyer (2013).

Read

Article

Sophie Alexander Is Our Private Data Due to Become More Open?
7th October 2013

Data privacy has been in the headlines once again and more consumers are beginning to recognise the commercial value of their data. Will recent government initiatives, such as the UK's midata and the US MyData, and the EU's proposed data protection laws be the impetus companies need to rethink their personal data strategies?

Read

Article

Shimrit Janes News Aggregation Solution Gives City Law Firm RPC a Competitive Edge
7th October 2013

As with any technology, simply purchasing and rolling out news aggregation software is not enough to answer the business requirements for which it was chosen. This case study will look at how law firm RPC integrated enterprise RSS feeder "Attensa" with its own bespoke social intranet "Edge" in order to help provide business context to incoming news. The study will also demonstrate how the news aggregation application is just one tool within a larger knowledge management programme, which seeks to harness social software to encourage the flow of information and knowledge within and across the firm’s networks.

Read

Article

Anne Jordan Source Update October 2013: What's Happening with Factiva?
4th October 2013

This month's additions and takedowns in Factiva, researched and compiled by Anne Jordan.

Read