Your SlideShare is downloading. ×

00 14092011-1130-jesse wilkins

680

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
680
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 1141 First, - let me start by introducing AIIM….AIIM is non-profit industry association for more intelligent information managementStarted in 1943Have approx 65,000 Associate and professional membersHQ just outside Washington, DC, - where I also live. More then 18,000 professionals have attended the AIIM Certificate programs.More classes will be scheduled, - don’t miss it, learn technologies and best ways to manage content.
  • Last year we said that everything is social. Not only is this still true, but if anything the pace is increasing.
  • Moving into mainstream
  • 1st 3 Q – iPAD scaled 4X as quickly as the iPhoneIn Q4 2010 the number of smart phones and tablets shipped was greater for first time than number of PCsFacebook 662MM users -- +41% Y/Y
  • During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  • During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  • It’s also true that Web 2.0 is profoundly changing the way we work. You can work on a computer at your work, home, or Internet café, a laptop at the airport, a tablet PC at the local starbucks, or on your iPhone in a pub. It generally requires Web access, though even this is starting to change, but the tools are lightweight enough and the computers are both mobile enough and powerful enough to let you “work where you want, when you want, and be able to conduct real business.“[twitter]Web 2.0:work where you want, when you want, and be able to conduct real business. – blognation Canada[/twitter]
  • 350,000 apps in the iStoreOver 10 billion downloads
  • 1544 One of the most famous cases studies of Emergence is the beginning of Intellipedia. Now this has led to an entire suite of collaborative tools behind the firewall. Led by champions Don Burke, Sean Dennehy, and Andrea Baker of the Intellipedia Development cell. Social Business tools were brought in for testing in quick and short pilots: urls were shared with test users and programs either stuck or failed-fast. Today the tool set available to users is not as wide as it is on the open net, but it is focused based on best use cases and adoption by the internal community. Tools are inter-connected and a single sign on is available.
  • Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””
  • ClassificationWorkflow
  • Transcript

    • 1. The Future of Information Management 20118 Trends That Will Change the Way You Manage Information
      Jesse Wilkins, CRM
      September 14, 2011
    • 2. www.aiim.org
    • 3. Jesse Wilkins, CRM
      Director, Systems of Engagement, AIIM
      Background in electronic records management, email management, ECM, and social technologies
      Director, ARMA International Board of Directors (2007-2010)
      Frequent industry speaker and author
      AIIM ERM and E2.0 Expert Blogger
      Instructor for AIIM Certificate Programs
    • 4. Agenda
      Volume, volume, volume
      Content complexity
      Commodity computing
      Social is everything
      Mobile everywhere
      Consumer is king
      Everything old is new again
    • 5. Volume, Volume, Volume
    • 6. Volume, c. 2010
    • 7. It’s only getting worse
    • 8. Sources: Cisco estimates based on CAIDA publications, Andrew Odlyzko (Wired Magazine, 8/17/2010)
    • 9. Emergence of “Big Data”
      Petabytes the norm, exabytes on the way
      Structured and unstructured
      Often need to analyze in or near real-time
    • 10. Content complexity
    • 11. Rate of technology innovation continues to increase
    • 12. Content complexity
    • 13. Content complexity
      sharing
      collaborating
      liking
      recommending following
      workflow compliance
      control
      security
      records
    • 14. Content complexity
      sharing
      collaborating
      liking
      recommending following
      workflow compliance
      control
      security
      records
    • 15. Complex technical environment
      Enterprise systems
      Line of business systems
      Departmental systems
      Multiple content creation systems
      Multiple content management systems
      The cloud
      Mobile devices
      Personal mobile devices
      And on, and on, and on….
    • 16. Commodity Computing
    • 17. Basic content services
    • 18. Interoperability – content model
    • 19. Interoperability – security
    • 20. Relatively cheap hardware
    • 21. Social is Everything
    • 22. “…fully networked enterprises are not only more likely to be market leaders or to be gaining market share but also use management practices that lead to margins higher than those of companies using the Web in more limited ways…”
    • 23.
    • 24. Systems of Record
    • 25. Systems of Engagement
      Systems of Record
    • 26. Is a Facebook “like” a record?
    • 27. Mancini’s Hierarchy of Information Needs
      Optimized
      Engaged
      Effective
      Efficient
      Flexible
      Aware
    • 28. MobilE Everywhere
    • 29. Emergence of powerful mobile devices
    • 30. And always-on high-speed internet access
      Air cards
      Wi-Fi
      Smart phones with 3G/4G access
    • 31. Mobile apps
    • 32. And location-based services
    • 33. “Working where you want, when you want,
      and being able to conduct real business.”
      blognation Canada
    • 34. 7. Consumer is King
    • 35. Ease of use
    • 36. Consumer-driven innovation
      Free/freemium services
      App store downloads
    • 37. Technology touches everyone.
      Everyone carries technology expectations into the workplace.
      Why do I feel so powerful as a consumer and so lame as an employee?
      Photo source = http://www.flickr.com/photos/notionscapital/5225049493/
    • 38. Enterprise App Store
      Source: Andrea R Baker
    • 39. Everything old is new again
    • 40. Information management is evolving
    • 41. Policies
      Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.”
    • 42. The Need for Content Automation
    • 43. Considered remedies:
      87% Social Media Policy
      86% Employ training
      85% Capturing confidential data
      85% Data loss prevention
      84% Data management technology
      82% Archive sensitive info
      Source: Symantec http://bit.ly/niAPxy
    • 44. Controls
      Monitoring at the firewall
      Training is better than control
    • 45. Systems of Record
    • 46. Conclusion
      It’s an interesting time to be in the industry
      These trends are not on the horizon
      – they are here now
      Organizations need our guidance
      We have to be ready to lead the information management discussions
    • 47. For more information
      Jesse Wilkins, CRM, CDIA+
      Director, Systems of Engagement
      AIIM International
      +1 (303) 574-0749 direct
      jwilkins@aiim.org
      http://www.twitter.com/jessewilkins
      http://www.linkedin.com/in/jessewilkins
      http://www.facebook.com/jessewilkins
      http://www.slideshare.net/jessewilkins

    ×