Increase data accuracy, save money and improve your competitiveness by instituting good data practices. This session discusses the impact of dirty data and broken data processes and provides best practice tips on capturing, enhancing and maintaining data quality.
- Preventing and cleaning invalid email address and phone numbers
- Preventing and cleaning up duplicates
- Preventing [mktUnknown] leads
- Data normalization
- Preventing and troubleshooting CRM sync errors
- Preventing 'orphaned' Marketo records
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of neurotransmitters and endorphins which elevate and stabilize mood.
Este documento describe una banda de música catalana llamada Miquel Joel formada en 2011 en Lérida. La banda está compuesta por Miquel Joel, Miquel y Emili Roca. Han lanzado dos álbumes, On Fire! y Giramöndo, que incluyen canciones como Insoportable, Made In Taiwan y Wanna. La banda ha realizado giras en 2013, 2014 y 2015 para promover sus álbumes.
The document describes the Museum Excellence Program developed by Museums Alberta. The program enables museums to measure their performance against standards, identify strengths and weaknesses, and work towards excellence. It involves a self-assessment, peer review, and potential recognition. Museums examine operations, governance, collections, community engagement and more. The goal is to help museums improve and demonstrate their commitment to serving the public.
Increase data accuracy, save money and improve your competitiveness by instituting good data practices. This session discusses the impact of dirty data and broken data processes and provides best practice tips on capturing, enhancing and maintaining data quality.
- Preventing and cleaning invalid email address and phone numbers
- Preventing and cleaning up duplicates
- Preventing [mktUnknown] leads
- Data normalization
- Preventing and troubleshooting CRM sync errors
- Preventing 'orphaned' Marketo records
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of neurotransmitters and endorphins which elevate and stabilize mood.
Este documento describe una banda de música catalana llamada Miquel Joel formada en 2011 en Lérida. La banda está compuesta por Miquel Joel, Miquel y Emili Roca. Han lanzado dos álbumes, On Fire! y Giramöndo, que incluyen canciones como Insoportable, Made In Taiwan y Wanna. La banda ha realizado giras en 2013, 2014 y 2015 para promover sus álbumes.
The document describes the Museum Excellence Program developed by Museums Alberta. The program enables museums to measure their performance against standards, identify strengths and weaknesses, and work towards excellence. It involves a self-assessment, peer review, and potential recognition. Museums examine operations, governance, collections, community engagement and more. The goal is to help museums improve and demonstrate their commitment to serving the public.
Digital asset management systems at universities are being used to generate new revenue streams during tough economic times. Cornell University has created an online image library where internal and external customers can purchase high-resolution photos taken by university photographers. This has become a profit center for the university. Northwestern University captures medical lectures and makes them available to alumni and employers for an annual membership fee. Arizona State University captures engineering courses and sells the content to private sector clients for professional development training. All three universities are finding innovative ways to increase revenue using their existing digital assets and resources.
Tara Jones is seeking a position that utilizes her skills and experience. She has held several internships and part-time positions in administrative support, event coordination, marketing, and public relations. Her experience includes data entry, clerical work, social media management, report generation, and customer service. She has a Bachelor's degree in Public Relations from the University of Memphis and is proficient in Microsoft Office, Adobe Creative Suite, and various social media platforms.
This document discusses best practices for digital asset management (DAM) systems based on a presentation given by Corey Chimko of Cornell University. It recommends designating a dedicated DAM administrator, carefully planning metadata schemas and governance policies, and engaging users through training and communication to promote system adoption. Key elements include developing taxonomies to organize assets, applying metadata during upload, maintaining permissions and user roles, and periodically auditing the system to ensure optimal search and reuse of digital content over time.
This document summarizes a presentation about best practices for digital asset management (DAM) in higher education. It discusses DAM systems at the University of Massachusetts Amherst and Cornell University, including metadata practices, search functionality, user permissions, and administrator responsibilities. Administrators are advised to engage users, assign a dedicated DAM administrator, and establish policies for asset lifecycles and system maintenance. Questions from attendees are also taken at the end.
The document summarizes an upcoming exhibition at the Metropolitan Museum of Art titled "The Golden Deer of Eurasia: Scythian and Sarmatian Treasures from the Russian Steppes". Hundreds of ornately decorated gold objects dating back to the 1st millennium BC were excavated in Russia in the 1980s-1990s and will be featured alongside other treasures from Russia and Central Asia to showcase the art and culture of nomadic peoples of Eurasia. The centerpiece will be a dozen two-foot tall wooden stags covered in gold and silver from the original excavation site.
Leveraging an existing single sign-on (SSO) system, Cornell University implemented SSO for its digital asset management (DAM) system. The key benefits of adopting SSO for the DAM were to simplify user management, provide immediate access for users without separate logins or passwords, and minimize support time spent on user permissions and registrations. Cornell's existing SSO and user database infrastructure allowed for seamless integration and rapid adoption of the new DAM system across the university.
The document outlines the typical workflow for managing digital assets from content creation through long-term storage. It discusses each stage of the workflow including content creation and backup, editing, metadata application, uploading to a digital asset management (DAM) system, metadata verification and delivery, repurposing assets, weeding assets, and long-term storage both on and offline. The presenter also provides considerations and approaches for each stage of the workflow.
This document provides instructions for creating a low-cost Harry Potter costume by using items likely already in your closet, such as a black graduation robe, white shirt, and black pants. Additional recommended items include a Gryffindor tie, striped scarf made with red and gold yarn, round glasses, Gryffindor crest, toy wand, and drawn-on lightning scar. The instructions guide the reader through each step to transform ordinary clothing into a Harry Potter-themed costume.
Самые сильные бойцы Российской Digital-среды. Как они сами управляют своей репутацией для своей компании,что думают о них клиенты и сотрудники, почему о них говорят? Обо всём этом в анализе репутационного менеджмента ведущих digital-агентств!
This document discusses ethics in social media journalism. It introduces frameworks for analyzing ethics like the Potter Box and human dignity frameworks. It also covers traditional media ethics and how they are challenged by social media, including issues like blurred lines between personal and professional content and maintaining transparency around endorsements. Theories of ethics from philosophers like Aristotle, Kant, Mill, and Rawls are presented. Finally, it addresses how social media creates new opportunities for activist journalism.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
My presentation to the Oklahoma City SharePoint User Group, September 7, 2016
The basics of SharePoint Governance - what you need to consider when implementing governance, how to create a plan, and how to make governance work in the long term.
[AIIM17] Data Categorization You Can Live With - Monica Crocker AIIM International
Everyone has an opinion about how to categorize data: information security, records managers, compliance, privacy, business owners. In this session you will learn why information classification is important, how to build a classification scheme that supports all use cases, and how to maintain it over the life of the system. A particular focus will be on the potential benefits of using “big buckets” to make this effort more manageable.
Learn about the current state of Information Management in AIIM’s latest report: http://info.aiim.org/2017-state-of-information-management
September 14, 2016 - Austin SharePoint User Group
What does governance mean in SharePoint? How do you get to good governance? Do you really need governance? What happens if you don’t have governance, or do it poorly?
Jim brings his experience building SharePoint governance in multiple organizations. The session covers governance basics to help get you going in the right direction.
(Unlike the "Group Therapy" session, this is a straight-up presentation, though the Q&A at the end can be used by the audience to ask their specific questions)
This slide deck is from the presentation On September 14, 2016 at the Austin O365 & SharePoint User Group
This document discusses requirement elicitation techniques used in systems analysis and design. It describes requirement elicitation as identifying stakeholder needs through interviews, meetings, ethnography and other techniques. It outlines best practices for elicitation including preparing for interviews and meetings, using scenarios, questionnaires, and observation to understand user needs and ensure requirements are unambiguous, complete, verifiable and consistent. The goal of elicitation is to gather requirements that accurately reflect stakeholder needs.
The document discusses improving processes for updating student records at the end of the school year. It identifies three sub-processes: 1) records change approval, 2) records change workflow, and 3) records update capture. Each sub-process is occurring outside the existing systems and causing issues. The document recommends analyzing each sub-process, addressing why they happen outside the systems, and moving the entire process to a form-based approach within a single system to optimize the process.
Digital Preservation - Manage and Provide AccessMichaelPaulmeno
This document discusses managing and providing access to digital content over the long term. It covers several key points:
- Digital preservation involves managing content through its entire lifecycle, from initial creation through long-term storage and access.
- Effective management requires addressing organizational needs, technological opportunities and changes, and available resources. It involves designating responsible people, policies, and technology.
- When providing access, it is important to use proven, sustainable technologies and deliver content completely and accurately according to access policies.
- Legal and rights issues must be considered to ensure appropriate access to content over time based on factors like donor agreements or confidential information.
- Understanding current and future users is essential for developing access strategies
#SharePoint Governance 101 #SPEngage October 2015Jim Adcock
This document provides an agenda for a SharePoint governance presentation. It begins with introductions of the presenter and audience. It then defines governance and discusses the consequences of having or not having governance. It outlines different governance modes, philosophies and models. Key topics to cover in a governance plan are identified, including the governance committee, change management processes, and incentives/consequences. The presentation concludes with a Q&A section and final thoughts.
SharePoint Governance 101 - Austin SharePoint User Group August 2014Jim Adcock
This document provides an overview of SharePoint governance. It discusses defining governance, developing a governance plan and committee, and making important decisions around security, content management, and customizations. Setting governance helps ensure effective system utilization while avoiding undesirable outcomes like poor performance or inaccessible content. Governance requires determining responsibility and best practices to align SharePoint with business objectives.
Digital asset management systems at universities are being used to generate new revenue streams during tough economic times. Cornell University has created an online image library where internal and external customers can purchase high-resolution photos taken by university photographers. This has become a profit center for the university. Northwestern University captures medical lectures and makes them available to alumni and employers for an annual membership fee. Arizona State University captures engineering courses and sells the content to private sector clients for professional development training. All three universities are finding innovative ways to increase revenue using their existing digital assets and resources.
Tara Jones is seeking a position that utilizes her skills and experience. She has held several internships and part-time positions in administrative support, event coordination, marketing, and public relations. Her experience includes data entry, clerical work, social media management, report generation, and customer service. She has a Bachelor's degree in Public Relations from the University of Memphis and is proficient in Microsoft Office, Adobe Creative Suite, and various social media platforms.
This document discusses best practices for digital asset management (DAM) systems based on a presentation given by Corey Chimko of Cornell University. It recommends designating a dedicated DAM administrator, carefully planning metadata schemas and governance policies, and engaging users through training and communication to promote system adoption. Key elements include developing taxonomies to organize assets, applying metadata during upload, maintaining permissions and user roles, and periodically auditing the system to ensure optimal search and reuse of digital content over time.
This document summarizes a presentation about best practices for digital asset management (DAM) in higher education. It discusses DAM systems at the University of Massachusetts Amherst and Cornell University, including metadata practices, search functionality, user permissions, and administrator responsibilities. Administrators are advised to engage users, assign a dedicated DAM administrator, and establish policies for asset lifecycles and system maintenance. Questions from attendees are also taken at the end.
The document summarizes an upcoming exhibition at the Metropolitan Museum of Art titled "The Golden Deer of Eurasia: Scythian and Sarmatian Treasures from the Russian Steppes". Hundreds of ornately decorated gold objects dating back to the 1st millennium BC were excavated in Russia in the 1980s-1990s and will be featured alongside other treasures from Russia and Central Asia to showcase the art and culture of nomadic peoples of Eurasia. The centerpiece will be a dozen two-foot tall wooden stags covered in gold and silver from the original excavation site.
Leveraging an existing single sign-on (SSO) system, Cornell University implemented SSO for its digital asset management (DAM) system. The key benefits of adopting SSO for the DAM were to simplify user management, provide immediate access for users without separate logins or passwords, and minimize support time spent on user permissions and registrations. Cornell's existing SSO and user database infrastructure allowed for seamless integration and rapid adoption of the new DAM system across the university.
The document outlines the typical workflow for managing digital assets from content creation through long-term storage. It discusses each stage of the workflow including content creation and backup, editing, metadata application, uploading to a digital asset management (DAM) system, metadata verification and delivery, repurposing assets, weeding assets, and long-term storage both on and offline. The presenter also provides considerations and approaches for each stage of the workflow.
This document provides instructions for creating a low-cost Harry Potter costume by using items likely already in your closet, such as a black graduation robe, white shirt, and black pants. Additional recommended items include a Gryffindor tie, striped scarf made with red and gold yarn, round glasses, Gryffindor crest, toy wand, and drawn-on lightning scar. The instructions guide the reader through each step to transform ordinary clothing into a Harry Potter-themed costume.
Самые сильные бойцы Российской Digital-среды. Как они сами управляют своей репутацией для своей компании,что думают о них клиенты и сотрудники, почему о них говорят? Обо всём этом в анализе репутационного менеджмента ведущих digital-агентств!
This document discusses ethics in social media journalism. It introduces frameworks for analyzing ethics like the Potter Box and human dignity frameworks. It also covers traditional media ethics and how they are challenged by social media, including issues like blurred lines between personal and professional content and maintaining transparency around endorsements. Theories of ethics from philosophers like Aristotle, Kant, Mill, and Rawls are presented. Finally, it addresses how social media creates new opportunities for activist journalism.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
My presentation to the Oklahoma City SharePoint User Group, September 7, 2016
The basics of SharePoint Governance - what you need to consider when implementing governance, how to create a plan, and how to make governance work in the long term.
[AIIM17] Data Categorization You Can Live With - Monica Crocker AIIM International
Everyone has an opinion about how to categorize data: information security, records managers, compliance, privacy, business owners. In this session you will learn why information classification is important, how to build a classification scheme that supports all use cases, and how to maintain it over the life of the system. A particular focus will be on the potential benefits of using “big buckets” to make this effort more manageable.
Learn about the current state of Information Management in AIIM’s latest report: http://info.aiim.org/2017-state-of-information-management
September 14, 2016 - Austin SharePoint User Group
What does governance mean in SharePoint? How do you get to good governance? Do you really need governance? What happens if you don’t have governance, or do it poorly?
Jim brings his experience building SharePoint governance in multiple organizations. The session covers governance basics to help get you going in the right direction.
(Unlike the "Group Therapy" session, this is a straight-up presentation, though the Q&A at the end can be used by the audience to ask their specific questions)
This slide deck is from the presentation On September 14, 2016 at the Austin O365 & SharePoint User Group
This document discusses requirement elicitation techniques used in systems analysis and design. It describes requirement elicitation as identifying stakeholder needs through interviews, meetings, ethnography and other techniques. It outlines best practices for elicitation including preparing for interviews and meetings, using scenarios, questionnaires, and observation to understand user needs and ensure requirements are unambiguous, complete, verifiable and consistent. The goal of elicitation is to gather requirements that accurately reflect stakeholder needs.
The document discusses improving processes for updating student records at the end of the school year. It identifies three sub-processes: 1) records change approval, 2) records change workflow, and 3) records update capture. Each sub-process is occurring outside the existing systems and causing issues. The document recommends analyzing each sub-process, addressing why they happen outside the systems, and moving the entire process to a form-based approach within a single system to optimize the process.
Digital Preservation - Manage and Provide AccessMichaelPaulmeno
This document discusses managing and providing access to digital content over the long term. It covers several key points:
- Digital preservation involves managing content through its entire lifecycle, from initial creation through long-term storage and access.
- Effective management requires addressing organizational needs, technological opportunities and changes, and available resources. It involves designating responsible people, policies, and technology.
- When providing access, it is important to use proven, sustainable technologies and deliver content completely and accurately according to access policies.
- Legal and rights issues must be considered to ensure appropriate access to content over time based on factors like donor agreements or confidential information.
- Understanding current and future users is essential for developing access strategies
#SharePoint Governance 101 #SPEngage October 2015Jim Adcock
This document provides an agenda for a SharePoint governance presentation. It begins with introductions of the presenter and audience. It then defines governance and discusses the consequences of having or not having governance. It outlines different governance modes, philosophies and models. Key topics to cover in a governance plan are identified, including the governance committee, change management processes, and incentives/consequences. The presentation concludes with a Q&A section and final thoughts.
SharePoint Governance 101 - Austin SharePoint User Group August 2014Jim Adcock
This document provides an overview of SharePoint governance. It discusses defining governance, developing a governance plan and committee, and making important decisions around security, content management, and customizations. Setting governance helps ensure effective system utilization while avoiding undesirable outcomes like poor performance or inaccessible content. Governance requires determining responsibility and best practices to align SharePoint with business objectives.
CS3270 - DATABASE SYSTEM - Lecture (1)Dilawar Khan
This document outlines the key topics to be covered in a database course, including: understanding database concepts and the relational model, learning SQL for data manipulation and definition, database design techniques like entity-relationship modeling and normalization, and hands-on experience with Microsoft SQL Server. The course objectives are to help students understand databases and DBMS systems, apply relational concepts and SQL, and be able to design database applications. The document also provides an introduction to databases by comparing traditional file-based systems with the database approach.
The document discusses several methodologies for systems development including structured systems analysis and design methodology (SSADM), systems development life cycle (SDLC), the waterfall model, data-centered approach, object-oriented approach, prototyping, and soft systems methodology (SSM). Each methodology has a different focus such as logical processes, sequential phases, data modeling, reusable objects, or unstructured problem solving. The document also introduces concepts like the unified modeling language, CATWOE analysis, and rich pictures used in various methodologies.
This document provides an introduction to database management systems. It defines key concepts like structured and unstructured data, and explains how data can be stored in file systems or databases. The document outlines some issues with file systems like redundancy, inconsistency and lack of security. It then defines what a database and database management system (DBMS) are, describing how a DBMS can create, retrieve, update and delete data from a database. Database languages like DDL for defining schemas and DML for queries and updates are also introduced.
Why Bad Data May Be Your Best OpportunityZach Gardner
This document discusses bad data and strategies for improving data quality. It defines bad data as data that is difficult to understand, change, analyze, or govern. Bad data can waste money and limit business. The document recommends starting small data integration projects using a tool called Contivo to capture information and lay the groundwork for improving data architecture over time. Following a roadmap of continued use of Contivo for additional projects will provide insights into an organization's full data landscape and help transition from bad to good data practices. Automating processes, simplifying user experiences, and governing data can help organizations address challenges like rapid data changes and offshore development.
yo yoy yoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyoyo
This document provides an overview of the requirements analysis process. It explains that requirements come from both business and technical perspectives and describe what the system must do and how it will be implemented. Various techniques for gathering requirements are discussed, including interviews, documentation analysis, questionnaires, observation, and prototyping. The importance of user involvement and properly documenting requirements is also covered.
This document provides an overview of the requirements analysis process. It explains that requirements come from both business and technical perspectives and describe what the system must do and how it will be implemented. Various techniques for gathering requirements are discussed, including interviews, documentation analysis, questionnaires, observation, and prototyping. The importance of user involvement and properly documenting requirements is also covered.
Similar to 2013_FINAL_Widen_HighEd_web_presentation (20)
1. Making digital asset management (DAM)
a success for higher education
How to plan, structure and utilize
digital asset management solutions
October 8, 2013
www.widen.com
2. Corey Chimko
Global DAM administrator,
Cornell University Photography Department
Who’s talking
www.widen.com
3. Who is Widen?
Digital Asset
Management
Premedia
A comprehensive
understanding
of the asset
lifecycle
4. What’s top of mind for Higher Education
when it comes to DAM?
Controlling
Access
HIGHER
EDUCATION
AND DAM
Project
Scope &
Planning
Controlled
Access
Search
and
Metadata
6. Overview
Project
Scope +
Planning
• Who should be included in a DAM project
within the institution?
• How do you know what assets you have and
what should go in the DAM system?
• What kind of time and resources should you
allocate to a DAM project?
7. Project
Scope +
Planning
What Cornell did
• Talk with users about wants and needs
o Understand how your stakeholders think and
want to use the DAM system
o Do what’s best for everyone because you can’t
please all individuals
• Look at workflow
o Higher-Ed collections tend to be huge and
decentralized
o Think about pace and deadlines
• People tend to look ahead to the next project
and forget about close-out like getting assets
from completed projects into the DAM system
8. Project
Scope +
Planning
• Strategize the DAM system setup
o Worked closely with his department to make sure
things were set up right
o Selected a stakeholder group for decision-making
and buy in
o A DAM champion to own and admin the system
o Started small and got it down before they expanded
and invited others into the system
• Execute against a system setup checklist
o It’s ongoing, not just a project, so maintain the
system for optimal adoption and usage
o Timing was 3 months from inquiry to system launch
What Cornell did
9. System setup checklist
The checklist helps to project timelines and determine which
processes are priorities.
11. Project
Scope +
Planning
• Look for the assets that people use and
need the most, then prioritize files
o Gathered files in one place, De-duped, standardized
sizes, discarded useless assets, and established
master assets
• Migrate assets from hard drives and servers
in a measured and controlled way
o Batch upload gathers groups of assets at one time
o Simple folder/category structure with dates and
numbers to organize assets
What Cornell did
16. Overview
Controlling
Access
• Should you provide access by department
or allow University-wide access?
• What is the relationship to the public:
should there be any public access and what
assets should be made visible?
• How do we make sure that only certain
people can access our digital assets?
17. What Cornell did
• Look at the needs of Departments vs.
University-wide
o Discussed ownership over the assets and
sub-brands of assets in each college
• Work with an internal stakeholder group in
advance to agree on permissioning assets
organizationally
o Considered what assets were proprietary, licensed,
or needed to be regulated
o Created sharing and repurposing content policies
to make permissioning easier
o Managed permissions for small units vs. large units
and controlled what users have access to
Controlling
Access
21. Search
and
Metadata
Overview
• How does controlled vocabulary help
with searchability of your assets?
• What are some best practices for tagging
assets?
• What are the key considerations when
creating your metadata schema?
• Are there limitations on the number of
metadata fields you can have in your DAM
system?
22. Search
and
Metadata
• Categorize assets in the DAM system for
best searchability
• Use vocabulary standardization and
drop down lists
o Understand how your stakeholders think and what
types of metadata fields they’d like to see
o To eliminate adding metadata manually, use
standardized pick lists for metadata entry
• Avoid complexity when organizing and
tagging assets
o Only apply metadata that’s common to all of the
assets (e.g., date)
o Tag assets subsequently to fill in data that’s
different for different assets in the batch
What Cornell did
23. Search
and
Metadata
o Deal with redundancies (like Joe Clark Hall,
Joe Clark, Joe Clark Memorial Lecture Series, etc)
by using metadata filters
o Avoid use of unexplained acronyms
• Set up relevant metadata fields as filter
searches
o Enter metadata for those unfamiliar with
your college
• Map embedded metadata from assets
to fields in the DAM system
o You can add new metadata or edit it any time
o The more tagging you do at upload, the better
What Cornell did
29. Tips from Corey
1. Take the time to do it right the first time
If you don’t get things set up right initially,
it’s hard to go back and do it over.
• It will be easier to keep your system organized,
current, and usable in the long run
• Tag all of your assets at upload, then edit them
later as needed
30. Tips from Corey
2. Assign an admin early in the process
Do this before you implement your DAM
system, not after.
• A person who can champion all things DAM –
user roles and permissions, system setup and
training, ongoing maintenance and upgrades
• Characteristics of a good DAM admin:
• Good time management skills
• Extreme attention to detail
• Wealth of institutional knowledge
• Familiar with technology
• Not an intern or student
31. Tips from Corey
3. Know the importance of user governance
Not everyone needs to be a user and very few
users need access to everything.
• Roles and permissions determine who has access
to which assets
• Your admin should decide how much control users
of the DAM system should have (e.g. view,
download and upload, share, edit, etc)
• You don’t want just anyone editing metadata,
as it’s the language of your DAM system and needs
to stay in tact
33. Thank you for attending today!
Contact Widen:
marketing@widen.com
See our blog posts:
blog.widen.com
Join us on LinkedIn:
Linkedin.com/company/
widen-enterprises
Contact Corey:
cjc85@cornell.edu
Cornell taxonomy/
best practices page:
http://univcomm.cornell.edu/
photography/taxonomy/index.html
URL for MC3:
http://cornell.widencollective.com