Most organizations hoard and fail to destroy their piles of files in a legally defensible manner when business and law allow. How do you tackle the monster problem of over-retention of electronic information? The session, Rich shows how to develop and execute the four most important steps in defensible disposition: the Defensible Disposition Policy, Assessment Plan, Technology Plan, and Disposition Plan. He’ll outline business case development and tool selection.
Masterclass - transfo num de la médiation culturelle - c.delebarre, m.rouc...Charlotte Delebarre
Découvrez notre masterclass sur la Transformation numérique de la médiation culturelle.
Au programme :
I. Introduction
a.Qu'est-ce que la médiation culturelle ?
b. Contextualisation historique
c.Les 3 dimensions de la transformation digitale
d.Problématique et Les 7 chantiers de la transformation digitale
II.Nouveaux usages
a. acteurs
b. matrice des décodeurs
III. Écosystème
a. Chaîne de valeur de Porter
b. Décoder le marketing digital
IV. Expérience dématérialisée
V. Accessibilité / inclusion
VI. Fluidification et diffusion de l’information
VII. Le futur du secteur :
a. Les 4 gains de la transformation digitale
b. Longue traine
c. Les tendances : Phygital, Métavers , RSE
Masterclass - transfo num de la médiation culturelle - c.delebarre, m.rouc...Charlotte Delebarre
Découvrez notre masterclass sur la Transformation numérique de la médiation culturelle.
Au programme :
I. Introduction
a.Qu'est-ce que la médiation culturelle ?
b. Contextualisation historique
c.Les 3 dimensions de la transformation digitale
d.Problématique et Les 7 chantiers de la transformation digitale
II.Nouveaux usages
a. acteurs
b. matrice des décodeurs
III. Écosystème
a. Chaîne de valeur de Porter
b. Décoder le marketing digital
IV. Expérience dématérialisée
V. Accessibilité / inclusion
VI. Fluidification et diffusion de l’information
VII. Le futur du secteur :
a. Les 4 gains de la transformation digitale
b. Longue traine
c. Les tendances : Phygital, Métavers , RSE
[Webinar Slides] Leveraging Technology You Already Have to Create True Digita...AIIM International
Learn how to leverage the capabilities you likely already have – scanning, capture, and the digital mailroom – and extend them into the core processes that you use to run your business.
Want to take digital experience even further? Check out the 4 Steps to Improve Customer Experiences: http://info.aiim.org/four-steps-to-improve-customer-experiences
Content Marketing: Greet Your Guests and Boost Your Bookings451 Marketing
Key Takeaways:
- An overview of content marketing
- Why content marketing is important to enhance search results
- How content can strengthen engagement with your guests (and potential guests)
Presentation from Henry Stewart NY in May of 2013. Discussion about planning and techniques for the program management phase of a digital asset management (DAM) implementation. Presented by John Florance and Arsalan Siddiqui.
How to Realize Benefits from Data Management Maturity ModelsKingland
View individual use cases from a large B2B organization, mid-size financial institution, and a scientific data repository. See the plan and outcome from all case studies.
Oracle Application User Group sponsored Collaborate 2009 Presentation 'Building a Practical Strategy for Managing Data Quality' by Alex Fiteni CPA, CMA
The deck describes:
The importance of Project Management in context of Data Science
The Spotle SMART (Specify-Measure-Analyse-Roll-out-Test) model for managing Data Science projects
The CRISP-DM standard for data mining and analytics projects
Stakeholders
Tools and Methodologies used in Data Science projects
Common risks in Data Science Projects
Designing Effective Storage Strategies to Meet Business NeedsBrian Anderson
In this presentation I presented ideas on designing a modern tiered storage infrastructure. I covered the basic strategies and requirements of tiers 1/2/3, object-based, cloud, and edge storage, along with the importance of categorizing data sets so that you can ultimately build a solid blueprint and business case. Other topics included transitioning to an effective tiered storage model, controlling storage growth, and emerging ideas and technologies for data storage.
Designing Effective Storage Strategies to Meet Business NeedsEagle Technologies
In this presentation we present EAGLE's ideas on designing a modern tiered storage infrastructure. We will cover the basic strategies and requirements of tiers 1/2/3, object-based, cloud, and edge storage, along with the importance of categorizing data sets so that you can ultimately build a solid blueprint and business case. Other topics include transitioning to an effective tiered storage model, controlling storage growth, and emerging ideas and technologies for data storage.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
When Management Asks You: “Do You Accept Agile as Your Lord and Savior?"admford
So you’ve been told that your organization is going to implement Agile methodologies across ALL of IT, and not just in development. And you’ve been given the responsibility to implement it in Security Operations, and without a clear plan or measurable objectives other than “make the team more efficient”. While one can complain that someone in the C-Suite heard of the book “Scrum: The Art of Doing Twice the Work in Half the Time”, you still have a job to do. So the basics of Project Management, Agile, Scrum & Kanban are covered and how one can shoehorn these concepts into working in an operations context. Oh, and there will also be some finagling of where DevOps stands regarding Agile and Operations.
[Webinar Slides] Leveraging Technology You Already Have to Create True Digita...AIIM International
Learn how to leverage the capabilities you likely already have – scanning, capture, and the digital mailroom – and extend them into the core processes that you use to run your business.
Want to take digital experience even further? Check out the 4 Steps to Improve Customer Experiences: http://info.aiim.org/four-steps-to-improve-customer-experiences
Content Marketing: Greet Your Guests and Boost Your Bookings451 Marketing
Key Takeaways:
- An overview of content marketing
- Why content marketing is important to enhance search results
- How content can strengthen engagement with your guests (and potential guests)
Presentation from Henry Stewart NY in May of 2013. Discussion about planning and techniques for the program management phase of a digital asset management (DAM) implementation. Presented by John Florance and Arsalan Siddiqui.
How to Realize Benefits from Data Management Maturity ModelsKingland
View individual use cases from a large B2B organization, mid-size financial institution, and a scientific data repository. See the plan and outcome from all case studies.
Oracle Application User Group sponsored Collaborate 2009 Presentation 'Building a Practical Strategy for Managing Data Quality' by Alex Fiteni CPA, CMA
The deck describes:
The importance of Project Management in context of Data Science
The Spotle SMART (Specify-Measure-Analyse-Roll-out-Test) model for managing Data Science projects
The CRISP-DM standard for data mining and analytics projects
Stakeholders
Tools and Methodologies used in Data Science projects
Common risks in Data Science Projects
Designing Effective Storage Strategies to Meet Business NeedsBrian Anderson
In this presentation I presented ideas on designing a modern tiered storage infrastructure. I covered the basic strategies and requirements of tiers 1/2/3, object-based, cloud, and edge storage, along with the importance of categorizing data sets so that you can ultimately build a solid blueprint and business case. Other topics included transitioning to an effective tiered storage model, controlling storage growth, and emerging ideas and technologies for data storage.
Designing Effective Storage Strategies to Meet Business NeedsEagle Technologies
In this presentation we present EAGLE's ideas on designing a modern tiered storage infrastructure. We will cover the basic strategies and requirements of tiers 1/2/3, object-based, cloud, and edge storage, along with the importance of categorizing data sets so that you can ultimately build a solid blueprint and business case. Other topics include transitioning to an effective tiered storage model, controlling storage growth, and emerging ideas and technologies for data storage.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
When Management Asks You: “Do You Accept Agile as Your Lord and Savior?"admford
So you’ve been told that your organization is going to implement Agile methodologies across ALL of IT, and not just in development. And you’ve been given the responsibility to implement it in Security Operations, and without a clear plan or measurable objectives other than “make the team more efficient”. While one can complain that someone in the C-Suite heard of the book “Scrum: The Art of Doing Twice the Work in Half the Time”, you still have a job to do. So the basics of Project Management, Agile, Scrum & Kanban are covered and how one can shoehorn these concepts into working in an operations context. Oh, and there will also be some finagling of where DevOps stands regarding Agile and Operations.
Digital Preservation - Manage and Provide AccessMichaelPaulmeno
This presentation was given at the 2017 Society of Mississippi Archivists' Conference. It covers the final two modules of the Library of Congress' digital preservation curriculum.
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveStorage Switzerland
Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.
Similar to The Good, The Bad, and The Ugly of Defensible Disposition (20)
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
Get an in-depth look at the first step of Intelligent Information Management (IIM) where it's all about your content – creating it, capturing it, and collaborating with it. Click through this ebook preview, to explore changing business drivers that are impacting the crucial first step in the information lifecycle.
Download a Free copy of the eBook here: https://info.aiim.org/create-capture-collaborate
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
Meet Your CIP Expert Panel
We thank these IIM executives – all Certified Information
Professionals (CIPs) – for their commitment to share their expertise and time in order to improve the overall level of competence and knowledge within the industry.
Quotes within this report in each CIP Expert section were made
during a special panel discussion of the survey results on March 4, 2021. The intention was to use the survey findings as a foundation for a conversation focused not just on the trends suggested by the data, but on what to do about them. To ensure confidentiality and candid perspectives, this discussion was conducted under a variation of “Chatham House” rules.
The quotes within the report are intentionally not attributed to
the individual participants in the Panel and reflect individual
perspectives rather than those of the organizations they represent.
Get a FREE copy of the report here: https://info.aiim.org/state-of-the-intelligent-information-management-industry-2021
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
Learn how these Intelligent Automation best practices can help you save time, money, and effort by freeing up your manually-driven and paper-based processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/intelligent-automation-proven-practices-for-saving-time-money-and-effort
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
Learn how to develop a clear business case for why your organization needs a legacy system replacement and how YOU can be the champion driving success.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/legacy-system-replacement
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
How do you balance information access with necessary controls? Get a firsthand look at two different successful cloud content management projects.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/cloud-content-management-success-stories
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
In this webinar, we explore a new approach to managing your Organizational Intelligence that won’t disrupt user’s work habits.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/new-approaches-to-classification-and-retention-that-wont-disrupt-users-work-habits
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
In this webinar, we’ll show you how to truly connect the dots - from O365, to network folders, line of business applications, and beyond!
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/driving-digital-change-with-o365-and-iim
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
In this webinar, we’ll share the 5 Essential Capabilities every digital transformation initiative needs to succeed.
Want to follow along with the webinar replay? Download it here for FREE: working-smarter-and-faster-in-a-digital-transforming-world
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
In this webinar, we’ll show you how to get more out of your existing content with Artificial Intelligence in very achievable ways.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/using-ai-to-easily-automate-all-of-your-correspondence-channels
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
In this webinar, exclusively for BPOs and Outsourced Service Providers, we share with you the results of our recent survey from the leaders of capture projects. Find out how Parascript works with its partners to ensure that customers improve and update their capture platform and processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/capture-leaders-and-their-projects-2019
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
In this webinar, learn the value that e-signature workflow content automation can bring to your operations to support your digital business transformation strategy. You will also get a walk-through of an optimized workflow in SharePoint Online that will illustrate how enterprises can digitize their content processes and enhance their customer & partner journeys.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/how-to-extend-the-value-of-your-information-management-systems
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
n this webinar, we'll explain the IIM toolkit, and how it can be applied to your everyday work to reach your digital transformation goals as well as offer practical advice on how to get started.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/your-2019-information-management-resolution-2
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
Join us as we share best practices for the capturing of key information and data from paper and electronic documents and forms.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/effectively-capturing-paper-and-digital-documents-in-your-existing-applications
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
In this webinar, we’ll teach you how to take advantage of your Office 365 and SharePoint implementations as well as improve the ROI of your existing software investments.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/improving-your-collaborative-and-case-centric-processes
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
In this webinar, we pinpoint common problems with meeting content strategies of today, learn how to address the struggles with legacy solutions as well as how to tackle them head-on.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/modern-problems-require-modern-solutions
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
In this webinar, we’ll examine ways that RPA can help your organization tackle these challenges. We’ll take a detailed look at actual customer case studies involving data migration projects large and small, and how RPA can help.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/dreading-your-data-migration-project
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
In a cloud and virtualized environment, information variety and volume are growing geometrically. As such, organizations are struggling to take advantage of cloud, mobile and consumer technologies while connecting to their back-end systems of record. No one person has the time or energy to sort through thousands of files to a) identify records or b) pull metadata for the records. That's where analytics enters the equation. Learn how we used analytics tools and methods to resolve our information migration challenges.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
The Good, The Bad, and The Ugly of Defensible Disposition
1. #AIIM14
#AIIM14
#AIIM14
The
Good,
the
Bad,
and
the
Ugly
of
Defensible
Disposi7on
Richard
Medina
Co-‐founder
and
Principal
Consultant,
Doculabs
|
doculabs.com
rmedina@doculabs.com
|
richardmedinadoculabs.com
@richarddoculabs
2. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi2on
methodology
4. Analysis
and
classificaLon
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
3. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi2on
methodology
4. Analysis
and
classificaLon
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
4. #AIIM14
The
Problem
is
Over-‐Reten7on
OrganizaLons
have
been
over-‐retaining
electronic
informaLon
and
failing
to
dispose
of
it
in
a
legally
defensible
manner
when
business
and
law
will
allow
Retaining
everything
forever
Disposing
of
everything
immediately
Having
employees
make
classificaLon
decisions
Having
technology
make
classificaLon
decisions
Hybrid
with
technology
and
people
5. #AIIM14
Why
Over-‐Reten7on
is
the
Problem
§ Organiza2ons
keep
non-‐required
electronic
content
forever
because:
1. Classifying
content
(to
determine
what
to
keep
and
what
to
purge)
is
manual
and
expensive
2. Content
worth
preserving
is
mixed
with
content
that
should
be
purged
3. Legal
-‐-‐
and
others
-‐-‐
are
afraid
of
wrongfully
deleLng
materials
(spoliaLon)
4. AddiLonal
storage
is
inexpensive,
which
makes
it
easy
for
corporaLons
to
buy
more
storage
and
defer
addressing
the
problem
6. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi2on
methodology
4. Analysis
and
classificaLon
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
7. #AIIM14
Recommenda7ons
for
Day-‐forward
§ Addressing
day-‐forward
informa7on
lifecycle
management
(ILM)
is
much
easier
to
address
than
historical
content
§ Even
though
addressing
it
messes
with
employees’
day-‐to-‐day
business
acLviLes
§ Day-‐forward:
Ini2ate
ILM
prac2ces
on
a
“day-‐forward”
basis
first,
so
any
new
content
created
or
saved
is
assigned
a
disposi2on
period
§ DisposiLon
horizons
should
begin
to
influence
behavior
on
where
content
begins
to
be
stored
(as
users
discover
that
those
materials
saved
in
the
“wrong”
system
will
be
purged)
§ Guidance:
Provide
employees
with
explicit
guidance
for
the
acceptable
use
of
available
tools
for
dynamic
content
and
their
associated
reten2on
periods
§ For
example,
retain
non-‐records
for
3
years,
retain
official
records
per
the
retenLon
schedule
§ Historical:
For
historical
content,
analyze
the
feasibility
of
content
analy2cs
and
autoclassifica2on
§ Recognize
that
cleaning
up
TBs
of
content
can
take
years.
So
conduct
the
analysis
in
2014,
begin
the
cleanup
effort
in
earnest
by
2015,
and
eliminate
a
large
porLon
of
dated
content
by
2016
8. #AIIM14
Guidance
Example
for
Day-‐
forward
System/Repository
Recommended
Reten7on
Period
Personal
Network
Drives
(“P”
drives)
• Provide
each
user
with
personal
drive
space
of
a
limited
size
for
their
storage,
for
as
long
as
the
user
is
employed
Shared
Network
Drives
(“G”
drives)
• Make
them
read
only
(which
means
no
network
storage
for
collabora7on;
content
will
have
to
go
into
an
ECM
system)
• Excep7ons
include
applica7on
or
systems
that
need
to
use
network
storage
ECM
System
1. Default
for
non
records:
retained
for
3
years
2. Default
for
non
records
that
have
long-‐term
value:
retained
for
7
years
3. Official
records:
retained
per
the
reten7on
schedule
Social
Community
Sites
• No
documents
stored
in
communi7es
(only
links
to
documents
in
the
ECM
system)
• Consider
reten7on
periods
for
non-‐document
content
(e.g.
3
years)
9. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi;on
methodology
4. Analysis
and
classificaLon
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
10. #AIIM14
What’s
the
Purpose
of
Your
DD
Methodology?
§ You
must
sa7sfy
4
demands:
1. Regulatory
retenLon
requirements
2. Hold
retenLon
requirements
3. Business
retenLon
requirements
4. Cost
impact
of
anything
you
do
§ What
you
do
has
impact:
1. What
you
do
2. Effects
of
what
you
do
§ You
can
do
2
things:
1. Sort
2. Dispose
§ Your
mission
stated
two
ways:
§ Your
mission
is
to
saLsfy
your
retenLon
demands
(1-‐3)
while
minimizing
bad
cost
impact
to
yourself
(4)
§ Your
mission
is
to
maximize
good
cost
impact
(4)
while
saLsfying
your
retenLon
requirements
(1-‐3)
11. #AIIM14
It’s
Based
on
Reasonableness
§ To
determine
what
“sa2sfy
your
reten2on
demands”
really
means
for
you,
use
the
Principle
of
Reasonableness
and
act
In
Good
Faith
§ Courts
do
not
ask,
expect
or
necessarily
reward
organizaLons
for
perfecLon.
Courts
do
expect,
however,
that
whatever
informaLon
management
tacLcs
an
organizaLon
undertakes
are
appropriate
to
how
that
parLcular
enLty
is
situated
(size,
financial
resources,
regulatory
and
liLgaLon
profile,
etc.).
(Jim
McGann
and
Julie
Colgan,
“Implement
a
defensible
dele2on
strategy
to
manage
risk
and
control
costs”,
Inside
Counsel)
12. #AIIM14
Your
DD
Methodology
Has
4
Parts
1. Defensible
Disposi7on
Policy
§ It’s
your
design
specificaLon,
your
business
rules
for
DD,
your
decision
tree
§ Specifies
very
clearly
the
objecLves
that
your
methodology
will
fulfill.
It
states
clearly
what
you
mean
by
your
retenLon
requirements
and
what
you
mean
by
reasonable
costs
when
you
are
trying
to
fulfill
your
retenLon
requirements.
2. Technology
Approach
§ For
SorLng
and
Disposing
§ You
must
use
technology
–
it’s
not
an
opLon
13. #AIIM14
Your
DD
Methodology
Has
4
Parts
3. Assessment
(Sor7ng)
Plan
§ Do
the
legwork
and
look
at
what’s
there
§ What
informaLon
and
systems
you’re
assessing
§ Your
processing
rules
(decision
plan)
§ It
will
be
flexible
4. Disposi7on
Plan
§ Evaluate
your
assessment
results
using
your
DD
Policy
§ Dispose
(which
ranges
from
keeping
forever
to
deleLng
right
now
with
many
opLons
in
between)
§ Refine
your
DD
Policy
(1)
and
conLnue
as
needed
14. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi2on
methodology
4. Analysis
and
classifica7on
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
15. #AIIM14
There’s
an
Awesome
Business
Case
Classifica7on
Technique
Classifica7on
Rate
Pricing
Total
Cost
to
Classify
Manual
ClassificaLon
10
seconds
per
document
$35
/
hr.
$20
million
Auto
ClassificaLon
(with
95%
machine
and
5%
human
classified,
via
offshore
labor)
Less
than
1
second
per
document
$.005
per
document
for
machine
processing
and
$5
/
hr.
for
those
that
require
manual
classificaLon
$2
million
§ …
if
the
technology
works
§ 50
TB
=
~200
million
documents
(average
of
250KB
per
document)
§ The
following
table
illustrates
the
Lme
and
effort
required
to
classify
200
million
documents
16. #AIIM14
Analysis
and
Classifica7on
Technologies
§ Many
different
kinds
of
technology
vendors
are
addressing
analysis,
classificaLon,
and
disposiLon
§ File
AnalyLcs,
Content
AnalyLcs,
Content
ClassificaLon,
ECM,
E-‐discovery,
Search,
Capture,
DLP,
Storage
Management
§ Products,
hosted
soluLons,
service
providers
§ IBM/Stored
IQ,
HP/Autonomy,
EMC
Kazeon,
SAS,
Kofax,
Equivio,
RaLonal
RetenLon,
Recommind,
Index
Engines,
and
others
§ Most
have
a
sweet
spot
where
they
will
succeed
§ But
it’s
highly
dependent….
on
just
about
every
factor
you
can
think
of
§ E.g.,
your
business
purposes,
your
ECM
environment,
your
“informaLon
architecture”,
your
document
types
and
their
complexity
and
volume,
the
value
and
risk
of
the
documents,
your
success
criteria,
etc.,
etc.,
etc.
17. #AIIM14
Sidebar:
How
Many
of
them
Work
Before
Acer
<server
XXX,
drive
G:>
Forecast
summary_121008.doc
Record
=
no
Age
=
2.5
years
Document
type=
departmental
forecast
Keywords
=
forecast,
2008,
drav
Status
=
delete
Confidence
=
9.2
(out
of
10)
1. Analyze
the
content
and
review
the
retenLon
schedule
2. Establish
classificaLon
rules
and
train
the
systems
with
examples
3. Crawlers
and
recogniLon
engines
evaluate
the
content
and
generate
a
classificaLon
4. For
content
where
a
high
machine
confidence
factor
exists,
content
is
automaLcally
tagged
and
then
staged
for
migraLon
to
the
appropriate
system
or
disposiLon
5. For
content
with
low
confidence
factors,
documents
are
routed
to
clerical
staff
(onshore
or
offshore)
for
manual
classificaLon
6. The
results
of
the
manual
idenLficaLon
are
fed
back
into
the
automated
algorithms
to
“teach”
the
systems
bewer
classificaLon
Throughout
the
process,
results
and
samples
are
routed
to
records
management
and
legal
professionals
within
the
firm
for
validaLon
and
confirmaLon
1
2
3
4
5
6
Client
Valida7on
18. #AIIM14
Issues
1. The
problem
§ The
sky
is
falling
again
2. Break
it
into
two
problems
§ Day-‐forward
versus
historical
content
3. How
to
address
historical
content
§ A
defensible
disposi2on
methodology
4. Analysis
and
classificaLon
technology
§ Should
you
use
it?
Does
it
work?
5. Doing
the
Assessment
§ Approaches
and
results
19. #AIIM14
Assessment
Approaches
§ There
are
three
categories
of
awributes
that
can
be
used
to
determine
what
a
file
is:
1. Environmental
awributes
around
the
file
(e.g.,
file
locaLon,
ownership)
2. File
awributes
about
the
file
(e.g.,
file
type,
age,
author)
3. Content
awributes
within
the
file
(e.g.,
keywords,
character
strings,
word
proximity,
word
density)
§ Various
techniques
and
technologies,
along
with
business
rules,
can
be
used
to
determine
what
a
file
is,
and
whether
it
is
eligible
for
disposiLon
§ E.g.,
a
DOC
file
created
over
5
years
ago
and
not
accessed
for
a
year
may
be
purged
§ This
type
of
purging
could
be
done
aver
giving
users
adequate
noLce
(“move
it
or
lose
it”
or
“hold”
for
90
days,
then
delete)
20. #AIIM14
#1:
Environmental
Ahributes
Ahribute
Evalua7on
Technique
Tool(s)
Used
Examples
How
Used
Ownership
Access
Controls
Content
Analy7cs,
Data
Loss
Preven7on,
Storage
Management
Permissions
within
LDAP
list
people
and
infer
department
or
func7on
Large
collec7ons
of
files
can
be
assessed
en
masse
based
on
access
controls
1
Loca7on
File
Path
Content
Analy7cs,
Data
Loss
Preven7on,
Storage
Management
G:/accoun7ng/july2004/temp
Stranded
and
orphaned
loca7ons
are
ocen
easily
eliminated
2
Environmental
Ahributes
(around
a
file)
21. #AIIM14
#2:
File
Ahributes
Duplicate
Hash
Algorithm
Content
AnalyLcs
Exact
duplicates
Exact
duplicates
can
be
easily
eliminated
3
File
Type
Extension
or
MIME
type
Content
AnalyLcs
.TMP,
.MP3
To
idenLfy
file
types
that
should
not
exist
in
a
corporate
seyng
4
Block
Read
Content
AnalyLcs
Near
duplicates
Near
duplicates
must
be
assessed
in
the
context
of
other
awributes
Metadata
ProperLes
Content
AnalyLcs
Age
To
determine
old
materials,
materials
authored
by
individuals
that
have
lev
the
organizaLon
5
Content
AnalyLcs
Author
Typically,
these
awributed
must
be
conLnued
with
other
awributed
via
a
rule
to
take
acLon
Content
AnalyLcs
Security
Profile
(ConfidenLal)
User
filename
properLes
to
determine
type
File
Name
Character
Strings
Content
AnalyLcs
GL-‐USDIST31_093098.xls
Determine
whether
a
file
was
system
generated
vs.
human
generated
6
Content
AnalyLcs
FORMUB92_SMITH
Documents
that
are
based
on
a
specific
form
number
can
easily
be
idenLfied
Ahribute
Evalua7on
Technique
Tool(s)
Used
Examples
How
Used
File
Ahributes
(about
a
file)
22. #AIIM14
#3:
Content
Ahributes
Key
Word
Character
Strings
Content
AnalyLcs;
ClassificaLon
Module
“Enron”,
“Guarantee”
To
determine
if
a
document
is
on
Hold
via
a
word
list
per
the
hold
request
7
Character
or
Word
Paherns
“ClassificaLon”
<pawern
matching>
ClassificaLon
Module
Word
proximity
To
determine
the
category
in
which
a
document
may
fit
8
ClassificaLon
Module
Word
frequency
Content
AnalyLcs;
ClassificaLon
Module
“Privileged”
IdenLficaLon
of
PII
Content
AnalyLcs;
DLP
SS#,
Credit
card
#
Regular
Expression(RegEX)
lists;
determined
enLLes
for
hold,
security,
IP,
PHI,
PII,
DLP
Ahribute
Evalua7on
Technique
Tool(s)
Used
Examples
How
Used
Content
Ahributes
(within
a
file)
23. #AIIM14
Assessment
Results
Preserva7on
Findings
Unnecessary
File
Types
(Executables,
non-‐business
pictures,
movies,
etc.)
13
to
15%
Duplicates
15
to
20%
Near
Duplicates
9
to
30%
Risk
Findings
Files
with
PII
10
to
16%
Files
with
Sample
Keywords
3
to
5%
Opera7onal
Findings
Files
10
years
or
older
7
to
11%
Files
accessed
within
the
last
18
months
25
to
35%
Findings
not
mutually
exclusive
(
i.e.,
a
duplicate
file
could
also
be
aged)
24. #AIIM14
Assessment
Summary
Findings
Enterprise
Impact
Total
that
could
be
disposed
20%
of
2.5
PB
Enterprise
ImplicaLons
.5
PB
removed
@
$5,000,000
per
PB
Savings
$2,500,000
per
year
in
storage
expense
Technique
Status
%
of
Total
Total
AnalyLcs
Unnecessary
20%
500
TB
(.5
PB)
ClassificaLon
Record
8%
200
TB
(.2
PB)
Non-‐Record,
Business
Reference
28%
700
TB
(.7
PB)
Evaluated,
Staged
for
DisposiLon
(2016)
44%
1,100
TB
(1.1PB)
Total
100%
2,500
TB
(2.5
PB)
25. #AIIM14
Assessment
Implica7ons
§ Given
the
results,
$2.5
million
in
storage
expense
could
be
saved
annually
on
the
disposiLon
of
historic
content,
resulLng
in
$12.5
million
over
5
years
§ Going
forward
with
newly
created
content,
if
similar
techniques
are
applied,
the
saving
grows
to
$34.8
million
over
5
years
§ The
current
cost
projecLons
are
based
on
the
historical
content
growth
rate
of
30%
per
year
§ The
expected
cost
projecLons
are
based
on
a
content
growth
rate
of
26%
per
year
@$5,000,000
per
PB
2012
2013
2014
2015
2016*
Total
Current
Storage
(PB)
2.5
3.25
4.23
5.49
7.14
Current
Cost
(Mill)
$12.5
$16.3
$21.1
$27.5
$35.7
$113.0
Expected
Storage
(PB)
2
2.52
3.18
4.00
3.94
Expected
Cost
(Mill)
$10
$12.6
$15.9
$20.0
$19.7
$78.2
Total
Savings
(Mill)
$2.5
$3.65
$5.25
$7.46
$16.00
$34.8
*In
2016,
the
1.1
PB
or
44%
of
content
from
the
2012
historical
content
assessment
can
be
disposed
26. #AIIM14
Conclusions
1. The
business
case
for
disposiLon
is
strong
§ Costs,
risks,
and
benefits
2. InformaLon
governance
must
be
addressed
in
phases
§ StarLng
today,
the
program
will
take
years
to
mature
§ Set
expectaLons
according
3. You
should
probably
address
day-‐forward
ILM
before
tackling
historical
content
4. Recognize
that
manual
classificaLon
is
not
an
opLon
5. The
technologies
are
immature
and
varied,
but
you
can
be
successful
by
matching
the
techniques
and
technologies
to
the
kinds
of
files
you
want
to
target
6. Your
DD
methodology
has
4
main
parts:
DD
Policy,
Technology
Approach,
Assessment
Plan,
Disposi2on
Plan
27. #AIIM14
#AIIM14
#AIIM14
Thank
You
Richard
Medina
Co-‐founder
and
Principal
Consultant,
Doculabs
|
doculabs.com
rmedina@doculabs.com
|
richardmedinadoculabs.com
@richarddoculabs
28. www.aiim.org/infochaos
Do
YOU
understand
the
business
challenge
of
the
next
10
years?
This
ebook
from
AIIM
President
John
Mancini
explains.