See Search Com

broken image
See search history bing

Yes, you will lose your Information!

The ILM2.0 reference model contains valuable reference information and practice methodologies and is a collaborative site where Information Lifecycle Management practitioners can participate in defining and promoting ILM2.0 best practices. Join the ILM2.0 Community. Our domain name search tool lets you search for domain names, domain extensions, and domains for sale at the same time. Results appear instantly.

See Search Com

Yes, you will lose your Information!

The ILM2.0 reference model contains valuable reference information and practice methodologies and is a collaborative site where Information Lifecycle Management practitioners can participate in defining and promoting ILM2.0 best practices. Join the ILM2.0 Community. Our domain name search tool lets you search for domain names, domain extensions, and domains for sale at the same time. Results appear instantly.

See Searches

An email address search provides an available email owner's name and social profiles. This is a useful search for understanding more about an email address to protect yourself from email scams, or to simply append your contact list. The search engine that helps you find exactly what you're looking for. Find the most relevant information, video, images, and answers from all across the Web. Alzheimer's and dementia research – find the latest information on research funding, grants, clinical trials and global research news.

Its easier than you think. Ever save something then not be able to find it again. In the digital preservation world, we have hit the wall. There is just too much information. Loss is inevitable. The question then, is not if, or when, but how much? And in the world of 'how much,' I choose to identify my critical information assets and make sure those are safe, secure, protected, and under my control not someone else's.

Top reasons for information loss:

  1. Poor Storage Practices:
    1. Millions of distributed files, many machines, external disk drives, external media, cloud storage services and no way to manage all this data as information assets.
    2. Which media has my file, is the file or the media corrupted, can I read it, can I interpret it, can I even get to it if it is in the cloud? etc…
  2. Poor Document Control Practices:
    1. Many versions, many backups, multiple cloud services, multiple devices, no index of files and locations
    2. Where is it, where is the master, who has it, how do I find it, how do I know this is the master file, what version is this one? etc…
    3. Loss of authenticity, loss of chain of control, inability to determine changes
  3. Poor Security Practices:
    1. Security breaches, hacking, spam, virus attacks, malware, loss of privacy, loss of confidentiality, identity theft, ransomware, information theft, intentional damage or changes, changed passwords
    2. Anything attached to the network or the internet is at risk of a security breach.
    3. Exposure or theft of personally identifiable information
  4. Human or Operational Errors:
    1. Failure to make redundant copies, to backup and test the restoration capability of your system regularly
    2. Failure to migrate files as operating systems, file systems, interfaces, media types, interfaces, etc. change
    3. Choosing unreliable storage systems or cloud service providers
    4. Failing to protect systems and storage from hackers or prying eyes
    5. Loosing control of the master and versions

Solve all of these and you will have a full-time job on your hands. There has to be a better way! And, there is…

See Search Ranking

About & Contact

This site is operated and managed by a few of the original people who participated in the development of ILM-based practices within the Storage Networking Industry Association (SNIA). ILM2.0 is new and original work building upon service management methods and the prior 7 years of experience helping companies implement ILM-based practices. We currently offer consulting services in many areas based on service management principles and ILM2.0 based practices.

Michael Peterson

  • President of TechNexxus, LLC, a risk management, long-term retention and preservation, and ILM2.0 implementation consultancy. http://secure.technexxus.com/Default.aspx?alias=secure.technexxus.com/infosys
  • Sr. Consultant with IMERGE Consulting specializing in design and implementation of long-term digital preservation repositories and services. http://www.imergeconsult.com/
  • Also Chief Strategy Advocate for the SNIA. www.snia.org
  • CEO of Strategic Research Corp. www.sresearch.com and www.marketfusion.org
  • Phone: (805) 201-3178

Bob Rogers

  • CTO, Application Matrix, a developer of classification software.
  • Bob is also a long-term retention, preservation and ILM2.0 practice consultant.
  • Prior Co-Chair of the ILM Initiative within SNIA.
  • Contact: (240) 632-9361 http://www.applicationmatrix.com

Paul Field

  • Sr. Consultant in a range of ILM2.0 and Information Management services and practices.
  • Sr. Consultant and Principal with Omniscient Solutions http://www.omniscientsolutions.com/
  • Prior Co-Chair of the ILM Initiative within SNIA.
  • Phone: (919) 827-4363


Need implementation advice, guidance, experience, assessments, audits, implementation, or consulting help? See the Consulting Resources page for more information and examples of typical consulting engagements that we support. Talk to us.

Contact us at this email address or the phone numbers above.


Sponsored by:





broken image