Management Blog and case study

Back

Structured or Unstructured Information?

May 1st 2009

Referring to the article titled “Legal IT 3.0” produced last April by Alain Beaulieu of the Direction Informatique magazine, I find it reassuring that we are bringing to the fore the notion of “sound management practices” as a start of an effective solution for the exploitation of organizational information.

Indeed, in a web universe where unstructured information is now proliferating, we are almost at the point of evacuating the concept of structured information so much that it leaves an impression of obsolescence.

Is the concept outdated, or has the web universe just lost control? Is there a loss of control, or is it just a new reality to be addressed? I think there is a bit of both here.

Despite the growing presence of software solutions dedicated to the analysis of unstructured information to extract or enhance it with a helpful meaning in a given management context, it is essential to remember that a significant portion some of the prowess of these tools would probably become “obsolete” if sound document management practices had framed the creation of basic information at the outset.

Moreover, a GIS architecture whose semantics have been structured and optimized directly offers two levers during an ad hoc information search: an increased quality of the informational result and an accelerated interrogation speed. These two key aspects can directly influence the final impact of an action or a management decision.

However, as this is a fundamental trend, we can no longer ignore the presence and value of unstructured information in the future management environment of enterprises.

Therefore, it is a question of remaining vigilant and insisting on the structuring of information without making a priority when the context lends itself to the exercise, that is to say when the impact on efficiency operational efficiency of your business is negligible. The potential for managing your corporate information will only be more significant and more easily exploited.

I invite you to read the full article by Alain Beaulieu using the following link: Legal IT 3.0.

Back
Frequently Asked QuestionsContact MeGet In Touch With Us