In this white paper, learn the basics of email classification, what it is, why it could assist your overall email management strategy and learn how to accomplish it.
Download Free Trial - http://bit.ly/vrIxKv
Get a Quick Quote - http://bit.ly/tw8pi3
Contact Us Now - http://bit.ly/sz9x5r
This slide deck provides a survey of research in the field of coreference resolution. We survey 10 significant research papers and also provide a detailed description of the problem and also suggest future research directions.
Topic Modelling: Tutorial on Usage and ApplicationsAyush Jain
This is a tutorial on topic modelling techniques - that informs the reader about the basic ingredients of all topic models, and allows them to develop a new model in the end.
This slide deck provides a survey of research in the field of coreference resolution. We survey 10 significant research papers and also provide a detailed description of the problem and also suggest future research directions.
Topic Modelling: Tutorial on Usage and ApplicationsAyush Jain
This is a tutorial on topic modelling techniques - that informs the reader about the basic ingredients of all topic models, and allows them to develop a new model in the end.
Types of recommender systems in information retrieval. Collaborative filtering is a very widely used method in recommendation systems. Content based filtering and collaborative filtering are two major approaches. Hybrid systems are now being employed to get better recommendations. One such method is content-boosted collaborative filtering.
Recommendation and Information Retrieval: Two Sides of the Same Coin?Arjen de Vries
Status update on our current understanding of how collaborative filtering relates far more closely to information retrieval than usually thought. Includes work by Jun Wang and Alejandro Bellogín. This presentation has been given at the Siks PhD student course on computational intelligence, May 24th, 2013
This is a tutorial about recommender system for CS410 @ UIUC. It summarize some good research paper about how user profile and tags can improve recommender systems.
Summary of a Recommender Systems Survey paperChangsung Moon
This is the summary of the following paper:
J. Bobadilla, F. Ortega, A. Hernando and A. Gutierrez, “Recommender Systems Survey,” Knowledge Based Systems, Vol. 26, 2013, pp. 109-132.
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEijnlc
We propose an automatic classification system of movie genres based on different features from their textual synopsis. Our system is first trained on thousands of movie synopsis from online open databases, by learning relationships between textual signatures and movie genres. Then it is tested on other movie synopsis, and its results are compared to the true genres obtained from the Wikipedia and the Open Movie Database
(OMDB) databases. The results show that our algorithm achieves a classification accuracy exceeding 75%.
Intro to Office 365 Security & Compliance CenterCraig Jahnke
This is a session I gave at SharePoint Saturday Atlanta --> The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Microsoft has been adding many new features and services for those companies that have data protection or compliance needs, or want to audit user activity in their organization. Come to my session to learn how to get started with Security & Compliance Center, and find out you can better manage and secure you data.
Types of recommender systems in information retrieval. Collaborative filtering is a very widely used method in recommendation systems. Content based filtering and collaborative filtering are two major approaches. Hybrid systems are now being employed to get better recommendations. One such method is content-boosted collaborative filtering.
Recommendation and Information Retrieval: Two Sides of the Same Coin?Arjen de Vries
Status update on our current understanding of how collaborative filtering relates far more closely to information retrieval than usually thought. Includes work by Jun Wang and Alejandro Bellogín. This presentation has been given at the Siks PhD student course on computational intelligence, May 24th, 2013
This is a tutorial about recommender system for CS410 @ UIUC. It summarize some good research paper about how user profile and tags can improve recommender systems.
Summary of a Recommender Systems Survey paperChangsung Moon
This is the summary of the following paper:
J. Bobadilla, F. Ortega, A. Hernando and A. Gutierrez, “Recommender Systems Survey,” Knowledge Based Systems, Vol. 26, 2013, pp. 109-132.
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEijnlc
We propose an automatic classification system of movie genres based on different features from their textual synopsis. Our system is first trained on thousands of movie synopsis from online open databases, by learning relationships between textual signatures and movie genres. Then it is tested on other movie synopsis, and its results are compared to the true genres obtained from the Wikipedia and the Open Movie Database
(OMDB) databases. The results show that our algorithm achieves a classification accuracy exceeding 75%.
Intro to Office 365 Security & Compliance CenterCraig Jahnke
This is a session I gave at SharePoint Saturday Atlanta --> The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Microsoft has been adding many new features and services for those companies that have data protection or compliance needs, or want to audit user activity in their organization. Come to my session to learn how to get started with Security & Compliance Center, and find out you can better manage and secure you data.
Making Data Classification Work for You - 18 Things to Consider When Choosing Data Classification Solutions.
For more information, please visit: http://www.secureislands.com/solutions-classification/
Office 365 Archiving Comparison to DropsuiteDropsuite
When small and medium business migrate to Office 365, they should assess whether its native archiving and eDiscovery tools will meet their business needs. For many companies in highly regulated or litigious industries, the native setup, backup, journaling, retention, restoration, search, storage,
migration and eDiscovery features found in Office 365 may be insufficient. Dropsuite’s cloud backup and archiving products such as Dropmyemail Backup and Archiving for Office 365, can be utilized to fill key gaps in an SMB’s compliance messaging, archiving and message management strategy.
Pathway to Email Marketing: Best Practices and How-ToMarketo
Your Marketo Email Marketing application has the power to automatically engage buyers with relevant email conversations automatically and at scale. Move beyond basic batch and blast campaigns to authentic, timely and relevant email communications that drive results. View these slides, as we share best practices and how-to’s from creating email campaigns in Marketo quickly and easily to reporting on results that matter.
Webinar: Small businesses and the cost of poor data management Vaultastic
This webinar discusses the importance of data management for an SMB, the impact of neglecting this and some common myths/queries raised by SMBs in our conversations.
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Ioannis Mandourarakis
We propose an automatic recommendation platform for e-commerce businesses based on multicriteria analysis and hybrid content-based - collaborative filtering, tailored to e-shops and cross-product category analysis, build with Web 2.0 concepts in mind. We are going to describe the input variables as well as methods to obtain them without frustrating customers, possible ways to pre-process the data and create a common query interface, suggest the recommendations output across a variety of scenarios and finally discuss metrics that can be used to measure the real return of the system.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
This presentation will provide an overview of information governance and the solutions available to companies of all shapes and sizes.
Information Governance: A specification of decision rights and an accountability framework to encourage desirable behavior in the evaluation, creation, storage, use, archival and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.
What are your pain points? Information is a corporate asset that needs to be managed and governed. By gaining control of data and considering eDiscovery concerns, you can better plan your corporate IG program.
Here are ways to get started: research options, talk to an expert, test solutions in your data environment.
To learn more, go to www.SherpaSoftware.com or call 1.800.255.5155
Denny Russell of Sherpa Software recently presented a one-hour lunch-and-learn at work, where he shared his experiences and showed how he manages all of his social connections, and not to mention, gather key information that helps drive his everyday life. From free gifts, to discount coupons, to product ideas and inspiration, Denny walked his coworkers through the steps of how to successfully use social media tools like Twitter, Facebook and LinkedIn for their own personal benefit. Using these slides, see what he used in his teachings on how to lurk for the purpose of finding useful information for work and life in general, and how to share that same information with others.
How to use IBM Connections to manage a product buildSherpa Software
Learn how to manage projects such as redesigns, product builds and more with this white paper on "How to use IBM Connections to manage a product build." One of Sherpa Software's resident IBM experts, Denny Russell, takes the reader through his process and helps them to understand how to "work smart and not hard" by using a social collaboration tool.
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
A recent survey, with 104 respondents, asked IT admins questions pertaining to their ESI (electronically stored information). Here's what they had to say!
The following is part four of an ongoing fictional story, based on a true-to-life situation. (If you would like to get caught up, parts one, two, and three are also available.) The names of companies and people are fictitious, but the situations they face are the same as those faced by many companies. Perhaps, as you read the events unfolding at Gensui Acme Imaging, you will see similarities to the challenges you face as well as ways to meet them.
Every so often we have the opportunity at Sherpa to ease back, put our feet up, dream of sitting on a beach with our toes in the sand, sipping a nice drink of our choice and watching the world go by. Oh my, how relaxing and restorative that 60 seconds can be. OK, so now that the time of idleness has passed, we had to decide what product changes we could make. So there we are, sitting in a meeting when someone said, "Hey! It's been a whole week since we've added any functionality to Discovery Attender." Once we all realized that we truly have not added any new features in 168 hours (yes, I did do the math in my head), we decided it was time to get back to work!
So what can we add to Discovery Attender? Well, to be honest, that's not a hard question because we get a lot of feature requests from our customers (thank you!) to help improve our product. Check out the "What's New" document below to get a breakdown of all our newly added features!
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
The following is part two of a fictional story, based on a true-to-life situation. (Part one is available here.) The names of companies and people are fictitious, but the situations they face are the same as those faced by many companies. Perhaps, as you read the events unfolding at Gensui Imaging, you will see similarities to the challenges you face as well as ways to meet them.
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
Sherpa introduces its first short story! Grant Lindsay, Product Manager for Compliance Attender for Lotus Notes, takes us through a fictional scenario, where an employee of a major imaging company, leaks an upcoming merger. Based on real life situations, this story will explain how companies can stop email messages and capture them in a graveyard journal before any confidential information is released. Read the story to learn more!
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
You may be able to implement your policy with the tools you already have in house. Or, you may find that the email platform you are on is limited and you need to search for a third party vendor. This is where Sherpa Software's Attender Utilities suite comes to the rescue. Let us be your Sherpa to the top of the mountain of data that you are trying to conquer. Our uniquely designed products for Lotus Notes & Domino will help you get all this data under control and manage it in whatever way you see fit. No matter what you decide to manage, Domino Mail, Applications, IBM Sametime, Lotus Quickr or your file shares, there is a Sherpa product to help you implement and enforce your Compliance policies.
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
If you’ve wondered what the pros & cons are for using the inherent e-Discovery features of Exchange versus using a 3rd party e-Discovery tool like Sherpa Software’s Discovery Attender, this white paper outlines the details feature by feature.
Is e-Discovery important to your organization? Sherpa recently surveyed hundreds of IT influencers to gain insight into to trending needs and concerns. See for yourself!
Download Free Trial - http://bit.ly/vrIxKv
Get a Quick Quote - http://bit.ly/tw8pi3
Contact Us Now - http://bit.ly/sz9x5r
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Email Classification - Why Should it Matter to You?
1. Email Classification -
Why Should It Matter to You?
A Best Practice White Paper
Written by Grant Lindsay,
Product Manager, Sherpa Software
456 Washington Avenue, Suite 2
Bridgeville, PA 15017
www.SherpaSoftware.com
information@sherpasoftware.com
2. Email Classification – Why Should It Matter
to You?
INTRODUCTION
What is email classification you ask? And should it be on your radar? For this discussion, let's define email
classification as the process of tagging email messages with labels to assist in managing those messages as they
either move through or rest in the email environment. For example, a message might be classified as “privileged,”
“confidential,” “secret,” “private,” or “business relevant.” A message with a “business relevant” classification may be
retained for three years, whereas a message classified as “personal” may be purged after thirty days. A message
marked “secret” may be restricted from leaving the organization’s email environment unless it is encrypted.
The reasons for classifying email vary, but may include: grouping like messages together for electronic discovery
[e-discovery], applying security and access control to messages of a certain type, and managing the life-span of
messages, based on their relevancy to the business or to regulations.
1
Email classification like this can aid the e-discovery process because searches can be targeted to only the
messages classified “business relevant” or “privileged” and leave out other messages not pertinent to the search,
which can greatly reduce the search run-time. In other cases, message classifications may be hierarchical or
relevant to only some people in the organization.
Classifying or tagging emails can be done through several methods. The process of applying these tags (i.e.,
classifying) may be either:
▪ Manual: The message custodian, a human, applies the classification when the message is either
created or received
▪ Automatic: A computer applies the classification, based on rules or contextual analysis
▪ Hybrid: Combining both manual and automatic methods.
IS THERE A NEED FOR CLASSIFICATION?
At a high level, the purposes for classifying unstructured data, like email, could include:
▪ Organizing data into groups: For business reuse and e-discovery retrieval
▪ Tracking and managing data: For access control and retention windows
1
For more information about the e-discovery process, check out the E-discovery Reference Model (http://www.edrm.net)
P a g e | 2
3. Email Classification – Why Should It Matter
to You?
The decision whether to classify email data lies with each individual organization, but it is a question you should be
asking. Other questions pertinent to email classification include:
▪ Will having classified messages speed up e-discovery requests?
▪ Is your organization under industry or government regulations that require us to implement email
classification?
▪ Will email classification help us in other ways, like reducing storage costs or getting the big picture
about feedback on our products or services?
Email is just one component of an organization's unstructured data that might need to be managed with a
classification policy. However, it is an important component. Email often comprises the majority of an organization's
communications, both internal and external. As such, it also constitutes a large part of its unstructured data.
WHERE AND WHY SHOULD EMAIL CLASSIFICATION BE APPLIED?
Classifying email is complicated by the fact that not all email messages are relevant from a business perspective,
and would not necessarily need to be kept. Some experts estimate as much as 60% of email messages held are
not related to business. These are the “where do you want to go for lunch?” and “there is cake in the break room”
types of messages. Should those messages be kept? If so, would they be under the same retention rules as other,
more relevant messages, like a product quote or support question? This is where a strategic email classification
policy could come in handy because these non-business-related emails can be broadly classified and dealt with by
an email archiving system or other email management technology en masse.
If classifying email makes sense in your organization, there are some details to work out. For example, different
schemes are available to classify email such as:
▪ Security or sensitivity (e.g., privileged, secret, etc.)
▪ Retention period (e.g., “keep until...”, “delete after...”)
▪ Locations at various levels (e.g., EMEA, US, Chicago, etc.)
▪ Product lines (e.g., “gizmo,” “widget,” “gizmo 2.0”)
By classifying messages in a way that makes sense for your organization, you can more easily group this data
together for e-discovery, retention, protection, etc.
For example, a product company that makes "gizmos" may want to classify any inbound messages that have
"gizmo" in the body with a header called X-Product and a value of "gizmo". Later, all such messages can be
discovered easily in a search (e.g., find all messages where X-Product = "gizmo"). Additionally, the tagged
P a g e | 3
4. Email Classification – Why Should It Matter
to You?
messages may be collected together into a journal to comply with industry or government regulations or to help
Product Management see feedback from customers and prospects on the gizmo product, regardless of the source
or the recipient.
In a similar way, the confidentiality of a new product, "gadget," can be protected using classification by having the
mail router reject any message for external recipients where the header X-Product has the value "gadget".
However, before any procedure or technology can be applied to the job of classifying email, a policy must be
created. Relevant elements of the email classification policy would include:
▪ Definitions, procedures, regulations
▪ Roles, responsibilities
▪ Actions, monitoring, accountability
HOW SHOULD EMAIL CLASSIFICATION BE APPLIED?
Generally, there are two ways to classify email: automatically by a computer or manually by a human. Additionally,
using a hybrid combination of these two methods might be considered.
Automatically—Machine Assisted
With this kind of classification, a computer process scans message headers and bodies to make a determination as
to what classifications may apply to it and update the headers accordingly. It makes these decisions in various
ways, but in essence it follows a set of rules.
Advantages
▪ Limited human involvement: Once configured, the machine does all the heavy lifting. Potentially, all
inbound, outbound, and internal messages can be processed automatically.
▪ Consistent decisions: Assuming the rules don’t change, the computer will be faithful in applying the
same classifications to like messages without deviation. However, some systems employ a kind of
learning or adapting logic that, in some way or another, bases current decisions on past results.
While some inconsistency may be evident early on, the intent is to make these systems more
accurate at classifying messages over time.
Disadvantages
▪ Computers can’t reason: They only do what they are told. This leads to various degrees of accuracy
when classifying messages based purely on content or addresses, even when sophisticated and
expensive learning systems are employed.
P a g e | 4
5. Email Classification – Why Should It Matter
to You?
Manually—User Applied
This involves the sender applying a suitable classification to a message during composition before it is sent.
Sometimes, the email client software may be able to assist the author in selecting a classification or it may prevent
a message from being sent if the classification is missing. Received messages (e.g., from external sources) may
also need to be classified after the fact by the recipient.
Advantages
▪ People can reason: Presumably the message author can make the best determination as to the
nature of the message and, therefore, what classifications it needs. Or, if the message arrived
unclassified from an external source, the recipient may be able to make that determination.
Disadvantages
▪ Increased workload: Besides additional and on-going training, there is additional work on the email
author’s part to consider and apply classifications.
▪ Inconsistencies: Are users being thoughtful and careful each and every time they classify an email?
Are the policies clear enough that everyone will arrive at the same determination about a given
message's classifications? Inconsistencies can muddy the waters when trying to manage the
messages later as a group of a given type.
MOVING FORWARD
There are several options for moving forward with an email classification system. Once you have identified the
organizational needs for classifying email, there are several steps Sherpa Software experts recommend before
moving forward with implementing.
Get Buy-in
Business needs should drive any classification effort. If the initiative begins with the Leadership team or a
department like Legal or Governance, Risk Management and Compliance (GRC,) then adoption has a
higher level of likelihood. Additionally, these other departments may have important insight into crafting an
email classification policy or strategy. For instance, if the goal of an email classification strategy is to secure
confidential emails from leaving the organization, the Governance, Risk Management and Compliance
team can direct the email administrator to look out for the right keywords or patterns (e.g. patent or credit
card numbers).
P a g e | 5
6. Email Classification – Why Should It Matter
to You?
Draft an Email Classification Strategy
Before you begin shopping for the right kind of technology to support an email classification strategy, it is
vital to write the strategy down and determine what and how you are going to classify emails in your
environment. This will help greatly when researching technologies.
Research Supporting Technology
Identify opportunities present in your existing tools. You may have all the pieces already in place. If not,
understand gaps that will need to be filled by new technologies so that you can compare products based on
just the features you will need. One such tool is Sherpa Software’s Compliance Attender for Lotus Notes
which contains an email classification module. Compliance Attender can classify email messages based on
a wide array of criteria including message content, metadata, message size, etc. Compliance Attender is a
module-based email compliance system for Lotus Notes environments; available modules include
journaling, filtering and ToneCheck (automated tone/sentiment analysis).
As you can see, the answer to the question, should email classification matter depends. But for many
organizations, that answer is an empathetic yes. For others, it may not be as clean cut, but the questions raised
here will help you determine if classification is a good fit for your organization. Regardless of how you answer, you
need to be asking the questions.
ABOUT THE AUTHOR- GRANT LINDSAY
As the Product Manager for Compliance Attender for Notes, Grant is responsible for product
research and development, pre‐sales technical support (e.g., Demos), post‐sales technical
support and competitive research.
Grant joined Sherpa Software in 2007 with 15 years of experience in Information
Technology. Of those, more than 14 were spent building applications with Lotus Notes and
Domino. He worked with a wide range of company sizes and across several industries
including insurance, consulting, venture capital, manufacturing, software and more.
Grant is an IBM Certified Advanced Application Developer and an expert in email
management and compliance, LotusScript, Notes Formula Language, application design, and security. He is also
skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished
in web delivered technologies: HTML, CSS, and JavaScript.
P a g e | 6
7. Email Classification – Why Should It Matter
to You?
He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends
his time with his wife, Lydia, of 16 years and his two retired greyhound racers, Rio and Wavorly.
P a g e | 7