The document summarizes 7 key revelations about an organization's user community from surveys conducted by AIIM:
1. Many executives do not see electronic content management (ECM) as a top priority.
2. Users will soon have more power over technology choices than their managers.
3. Organizations recognize that implementing Web 2.0 technologies like social networking is important for business goals.
4. Users prefer simple solutions over complex "rich" systems for managing content.
5. Implementing Microsoft SharePoint is becoming ubiquitous for content management.
6. Paper use continues to increase in many organizations despite electronic alternatives.
7. Compliance is a major business driver for document management technologies
Executives would like to see IT take the lead in improving organisational agility, but to do so requires the ability to manage change in the face of complexity.
IT Service Management (ITSM) Model for Business & IT AlignementRick Lemieux
Today’s multi-faceted business world demands that Information Technology provide its services in the context of a fully integrated corporate strategic model. This transformation becomes possible when IT evolves from its technological heritage into a Business Technical Organization, or an “internal service provider.” This paper describes how the itSM Solutions reference model integrates five widely used service management domains to create a powerful model to guide IT in its journey into the business leadership circle.
Presentation to introduce information governance. This should be used in conjunction with the paper I published on my website. A full information governance methodology, with research included from the foremost authorities on data governance.
13 Top GRC Tools for an Integrated Governance, Risk and Compliance StrategyQuekelsBaro
Integrate business governance, risk, and compliance control using these top 13 GRC tools. Lower business costs, collaborate and meet compliance mandates.
Crime Scene Investigation: Content – Who killed Enterprise Content Management? As consumer technology takes more attention, enterprise content management seems to have disappeared, particularly ECM. Presentation by John Newton was made at the Technology Services Group led by Dave Giordano at the University of Chicago Gleacher Center on 8 June 2011.
Smart Process Applications (SPAs), Intelligent Business Processes, Adaptive BPM: these are all terms
applied to a new generation of applications that use computer intelligence to extract context-relevant
information from the content associated with a business process, and use it to select, modify or re-direct the
next steps in the workflow. One of its primary applications is in case management. Here the term “case” is
used in its widest sense to refer to any process or project that has a defined beginning and end, where the
process steps and outcome may change during the course of the process, and where associated content
needs to be grouped and managed as a case-file or project-file. Applications can range from payment
management, through contract bids, claims handling and loan origination, to traditional healthcare, crime or
legal cases.
Historically, case management systems and indeed most BPM systems have been somewhat rigid in their
workflows, lacking the ability to re-route as the case progresses – much like early satnavs, in fact. However,
a completely free-to-change process definition could introduce shortfalls in compliance and may well be
sub-optimum in terms of productivity. By adapting the process definition as the case progresses and doing
so based on the content and context of documents incoming to the case, the process can be handled
flexibly but compliance is still hard-wired.
In this report, we take an in-depth look at the applicability of smart process applications, the experience of
early users, the drivers for improved case management, and the feature sets required of a modern case
management system.
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsDigital Enterprise Journal
Research study - the key findings of Digital Enterprise Journal's research study based on insights from more than 800 organizations.
Author: Bojan Simic, President and Chief Analyst, Digital Enterprise Journal
Consumer technology is invading the enterprise and IT must embrace it in order to encourage employee productivity and satisfaction. Info-Tech recommends that organizations allow personal mobile devices on their corporate networks. This research addresses the following:
•Understand differences in security and management between the three major platforms – BlackBerry, Apple iOS, and Google Android.
•Evaluate the organization's position on the mobile device security scale and determine if third-party infrastructure is necessary.
•Development and enforcement of a personal mobile acceptable use policy to encourage end-user compliance and foster success.
Embrace consumer technology in the enterprise, and focus on end-user compliance to leverage productivity and maximize the potential for success.
CIOs tell The Economist Magazine's Intelligence Unit how they're becoming more strategic to their businesses via
http://pinterest.com/pin/251920172879153093/
All organizations need a Disaster Recovery (DR) plan, but many are unsure what is appropriate or how to scope the organization’s needs. Operating with an insufficient DR plan leaves organizations vulnerable to negative business impacts in the event of a disaster. Organizations can save time and money by properly scoping their DR plan.
The process of examining your DR plan can be broken down into a series of steps:
* Determine the current DR capability which IT can provide
* Know what DR capabilities the business wants
* Align the business’ and IT’s DR priorities
Use this Storyboard to begin the process of building your organization’s ultimate DR plan.
A strong communication capability between the business and IT ensures the alignment of business requirements with delivered IT functionality and value. Use this storyboard to understand common barriers to effective requirements management, tactical solutions to overcome these barriers, and how to achieve a high level of project success.
This storyboard will help you:
•Understand the common barriers to effective requirements management
•Learn how organizations have solved these challenges
•Implement your own tactical solutions to enable effective communication of business requirements for IT projects in your organization
•Achieve a high level of project success
Whether an organization develops its own applications or implements packaged solutions, the success of the project depends on the clear communication of business requirements in terms IT can understand and deliver.
AIIM and Vamosa - Practical Cosniderations when Implementing ECMnicarcher
AIIM give a great overview of a recent survey on the motivators for implementing ECM in todays economy, and Vamosa talk about how to get the best out of your content through enterprise content governance
Executives would like to see IT take the lead in improving organisational agility, but to do so requires the ability to manage change in the face of complexity.
IT Service Management (ITSM) Model for Business & IT AlignementRick Lemieux
Today’s multi-faceted business world demands that Information Technology provide its services in the context of a fully integrated corporate strategic model. This transformation becomes possible when IT evolves from its technological heritage into a Business Technical Organization, or an “internal service provider.” This paper describes how the itSM Solutions reference model integrates five widely used service management domains to create a powerful model to guide IT in its journey into the business leadership circle.
Presentation to introduce information governance. This should be used in conjunction with the paper I published on my website. A full information governance methodology, with research included from the foremost authorities on data governance.
13 Top GRC Tools for an Integrated Governance, Risk and Compliance StrategyQuekelsBaro
Integrate business governance, risk, and compliance control using these top 13 GRC tools. Lower business costs, collaborate and meet compliance mandates.
Crime Scene Investigation: Content – Who killed Enterprise Content Management? As consumer technology takes more attention, enterprise content management seems to have disappeared, particularly ECM. Presentation by John Newton was made at the Technology Services Group led by Dave Giordano at the University of Chicago Gleacher Center on 8 June 2011.
Smart Process Applications (SPAs), Intelligent Business Processes, Adaptive BPM: these are all terms
applied to a new generation of applications that use computer intelligence to extract context-relevant
information from the content associated with a business process, and use it to select, modify or re-direct the
next steps in the workflow. One of its primary applications is in case management. Here the term “case” is
used in its widest sense to refer to any process or project that has a defined beginning and end, where the
process steps and outcome may change during the course of the process, and where associated content
needs to be grouped and managed as a case-file or project-file. Applications can range from payment
management, through contract bids, claims handling and loan origination, to traditional healthcare, crime or
legal cases.
Historically, case management systems and indeed most BPM systems have been somewhat rigid in their
workflows, lacking the ability to re-route as the case progresses – much like early satnavs, in fact. However,
a completely free-to-change process definition could introduce shortfalls in compliance and may well be
sub-optimum in terms of productivity. By adapting the process definition as the case progresses and doing
so based on the content and context of documents incoming to the case, the process can be handled
flexibly but compliance is still hard-wired.
In this report, we take an in-depth look at the applicability of smart process applications, the experience of
early users, the drivers for improved case management, and the feature sets required of a modern case
management system.
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsDigital Enterprise Journal
Research study - the key findings of Digital Enterprise Journal's research study based on insights from more than 800 organizations.
Author: Bojan Simic, President and Chief Analyst, Digital Enterprise Journal
Consumer technology is invading the enterprise and IT must embrace it in order to encourage employee productivity and satisfaction. Info-Tech recommends that organizations allow personal mobile devices on their corporate networks. This research addresses the following:
•Understand differences in security and management between the three major platforms – BlackBerry, Apple iOS, and Google Android.
•Evaluate the organization's position on the mobile device security scale and determine if third-party infrastructure is necessary.
•Development and enforcement of a personal mobile acceptable use policy to encourage end-user compliance and foster success.
Embrace consumer technology in the enterprise, and focus on end-user compliance to leverage productivity and maximize the potential for success.
CIOs tell The Economist Magazine's Intelligence Unit how they're becoming more strategic to their businesses via
http://pinterest.com/pin/251920172879153093/
All organizations need a Disaster Recovery (DR) plan, but many are unsure what is appropriate or how to scope the organization’s needs. Operating with an insufficient DR plan leaves organizations vulnerable to negative business impacts in the event of a disaster. Organizations can save time and money by properly scoping their DR plan.
The process of examining your DR plan can be broken down into a series of steps:
* Determine the current DR capability which IT can provide
* Know what DR capabilities the business wants
* Align the business’ and IT’s DR priorities
Use this Storyboard to begin the process of building your organization’s ultimate DR plan.
A strong communication capability between the business and IT ensures the alignment of business requirements with delivered IT functionality and value. Use this storyboard to understand common barriers to effective requirements management, tactical solutions to overcome these barriers, and how to achieve a high level of project success.
This storyboard will help you:
•Understand the common barriers to effective requirements management
•Learn how organizations have solved these challenges
•Implement your own tactical solutions to enable effective communication of business requirements for IT projects in your organization
•Achieve a high level of project success
Whether an organization develops its own applications or implements packaged solutions, the success of the project depends on the clear communication of business requirements in terms IT can understand and deliver.
AIIM and Vamosa - Practical Cosniderations when Implementing ECMnicarcher
AIIM give a great overview of a recent survey on the motivators for implementing ECM in todays economy, and Vamosa talk about how to get the best out of your content through enterprise content governance
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
In this webinar, we’ll teach you how to take advantage of your Office 365 and SharePoint implementations as well as improve the ROI of your existing software investments.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/improving-your-collaborative-and-case-centric-processes
How Social and the Cloud Impact Your Governance StrategyChristian Buckley
As organizations look to expand their SharePoint on premises footprint using social, mobile, or cloud based platforms and services, some governance considerations. Presented originally at SharePoint Saturday Virginia Beach 2013 (#SPSVB)
Data Trends for 2019: Extracting Value from DataPrecisely
To get the most business value from data, you need to keep up with the latest tech trends – or do you?
View this webinar on-demand as we share the results from our 2019 Data Trends Survey! We'll reveal what organizations around the world are really up to at the intersection of technology, big data and business.
Key topics include:
• Business initiatives getting the most IT support in 2019
• Highest-priority IT initiatives
• Tech adoption rates, benefits and challenges
Modernizing IT Operations for Digital EconomyBojan Simic
Research study based on insights from more than 900 organizations. Includes analysis of 14 key areas for making IT Operations effective in Digital Economy.
Research study based on insights from more than 900 organizations. Includes analysis of 14 key areas for making IT Operations effective in Digital Economy
Premier Alliance is committed to providing thought leadership through its 360 degree Intelligence Delivery approach to consulting. This document will help businesses as they consider whether to establish an Information Technology Strategy, and if they choose to proceed, what will they need to consider.
How to build an it transformation roadmapInnesGerrard
An estimated 80 percent of #businesses will need to transform their current IT efforts to keep up with new business expectations and technological developments. These include investments such as cloud computing, IoT and BigData projects.
For over four decades, IT strategy has been about the alignment of technology with the needs of the “customer,” be it an organization, business, end user, or device. The most important part of system acquisition is deciding what to build or buy, as it is better to deliver no solution at all than it is to deliver the wrong solution. But there are two distinct dimensions to getting requirements and ensuring that they, and the IT solution that results, not only aligns with the business as it is, but is built in such a way that it can sustain that alignment in a cost-effective and time-efficient manner. Specifically, (1) narrow requirements, which focus on the short-term needs for specific parts, functions, or processes of the business; and, (2) broad requirements, which focus on a comprehensive, enterprise-wide approach with holistic and longer-range objectives like simplicity, suppleness, and total cost of ownership. We typically call these “Systems Analysis and Design” and “Enterprise Architecture” respectively. Ideally, organizations should be able to do both well, and effectively balance the inevitable tradeoffs between them. Sadly, in the vast majority of organizations, that is not yet the case.
Professor Kappelman will present the results of a ground-breaking study from the Society for Information Management (SIM) Enterprise Architecture Working Group that developed and validated measures for these two distinct types of requirements capabilities. Findings include:
• Empirical validation that there is, in fact, a difference between requirement capabilities in a narrow or individual system context (i.e., Systems Analysis and Design within the bounds of a specific development project), and requirements capabilities in a broad or enterprise context (i.e., Enterprise Architecture regarding how those individual systems fit together in an enterprise-wide strategic design).
• Strong evidence that requirements capabilities overall are immature, with narrow activities more mature than the corresponding broad enterprise capabilities.
• Solid evidence, based on fifteen years of studies, that software development capabilities are generally maturing, but are still fairly immature.
This research provides requirements engineers, software designers, software developers, and other IT practitioners with tools to assess their own requirements engineering and software development capabilities. and compare them with those of their peers. Suggestions for improvements are made.
DRIVERS AND IMPEDIMENTS TO DIGITAL TRANSFORMATION - THE RESEARCHTom Rieger
In August 2020 EnterpriseDB and Platform 3 jointly asked 1000s of IT professionals their perspectives and priorities. This paper is a detailed view of those results.
Virtual Space Race: How IT with The Right Stuff Creates a Competitive AdvantageSoftchoice Corporation
The rise of mobile and cloud has empowered more front office workers to take control over their own IT destiny. This study answers the question “is IT equipped to handle the implications of this shift?”
With recent dramatic changes in our global workforce, economy, and environment, the need for digital business transformation is now proven to be critical.
These slides—based on the webinar from leading IT research firm EMA and Redwood Software—explain why you should prioritize digital transformation in your organization and support those efforts with workload automation.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
5. How important is the effective management of electronic information to the long-term success of your organization? N=386 Non-AIIM extremely important important somewhat important not important at all 89%
6. For each type of content, evaluate the degree of control that exists in your organization in managing it. All respondents (476)
7.
8. What are the top THREE reasons why your organization has NOT implemented document management and scanning/capture technologies to date? N=139 Reason More pressing tech needs 43% ROI not clear 38% Lack of internal IT resources 37% Costs too much 34% Lack of industry customization 25% Lack of training 22% How do I buy? 11% Hard to eval comp and prods 10% Too hard to implement 9% Too confusing 7%
9. #2 Users will soon have more power than their managers Picture from Minority Report
11. Multiple repositories Plans in the next 2 years to provide employees with a single point of access to content repositories across your organization All respondents (349) 35% of organizations still planning to use single ECM system
13. In your view, how critical is Enterprise 2.0 to your organization's overall business goals and success? 10+ employees (656) 54% of organisations consider Enterprise 2.0 to be important
14. Drivers for Enterprise 2.0 Which THREE of the following would you say are the key drivers for Enterprise 2.0 in your organisation? Knowledge share Collaboration Responsiveness 10+ employees (656)
20. Implementation Which 3 of these typical aspects of ECM products would be most important in your choice of new products or satisfaction with existing products? All respondents (275) Ease of integration is 2 nd most important after ease-of-use
21. #5 Its not if, but when to implement SharePoint
22. Have you implemented Microsoft SharePoint 2007 (WSS/MOSS) in your organization? 50% of organizations polled using or implementing SharePoint All respondents (406)
23. Do you currently use or have immediate plans to use SharePoint 2007/MOSS in the following applications? SharePoint users (233)
24. SharePoint governance Use of SharePoint with regard to existing ECM, DM and RM suite SharePoint users (233) Who is driving and controlling SharePoint sites and applications
27. Paper vs Electronic Is the volume of your PAPER records? 10+ employees non-Trade (648) Paper is still increasing in 56% of organizations, but in 21% it is at last showing signs of decreasing
28. Business Process Which of the following policies and practices do you generally apply to paper records? Paper, paper, paper - even when we have the electronic original, 10+ employees non-Trade (648) multi-choice
Seth Godin: “It’s human nature to imagine that the future will be just like the present, but with cooler uniforms and flying cars.”
Who wouldn’t say that, but it’s so obvious that it’s important.
But they’re not doing i! Take a look at this. Emails downwards is less than 40% have any degree of management.
Emails, emails, emails….. 63% have been required to find an email. “IT managers have said they would rather have a cavity filed than do a legal discovery across their systems” If our senior executive really understood the implications of these gaps in their legal defences (or indeed, legal offences) this, wouldn’t they then care more about ECM.
So maybe Executives do care. But, they always have more important things on their plate, or, the reality of that is, nobody has demonstrated a clear enough ROI.
The New Workplace - Information overload - Need something better than shared drives... - More remote workers / virtual office - "The knowledge workers now own the production process", Peter Drucker “ I want the same tools to collaborate with my colleagues as I use with my friends and family”...
So, the user experience is !I want one interface that gets me into all this knowledge in one hit.
Web 2.0 / Enterprise 2.0 - Next step in evolution - what comes after email? - Social software for the enterprise - Social software is already changing many best practices, e.g. Political campaigns, marketing,... - More SaaS and Cloud computing - New Google Wave & SharePoint 2010 Obama and VivekKundra are pushing the Fed Gov to adopt Web 2.0
Quite a high number who get it.
If we only knew what we know.,
Another aspect of Web 2.0 is trust in the Cloud concept. “Technology outsourcing is now viewed as a much more viable alternative than it once was.” - 38% agree “ The economy has made SaaS solutions (i.e., software that someone else hosts and you “rent”) more attractive to my organization.” - 33% agree “ The economy has made open source solutions more attractive to my organization” - 42% agree
but you’re all thinking the big objection is Security, but now the Government has said, we’ll run the Cloud and you don’t need to be concerned about it. We found that meant the majority would consider it – even for storing records.
4. Simplicity - Smarter, not richer - Ease of use & implementation Apple iPhone: Smart, Integrated, Natural interface WE HAVE TO MAKE SOLUTIONS SIMPLE TO USE! USABILITY: We have been like Sport Utilities… The New Desktop Intuitive Integrated Collaborative Multimedia Social Connected
Richness gives way to “Ease of…”
5. SharePoint 2010 / MOSS - If you are MS shop; Its not if, its when you are implementing SharePoint Pros and cons The Information Operating System
DM So if we say it really started with 2007, we’re now in 2009, and 50% of organizations have something going on with SharePoint, and a further 12% planning to.
If you thought SharePoint was all about collaboratioon and portals, think again. Document Management is #2. In fact you can’t do much collboration without starting to create a document. This is taking many organizations by surprise. They started out with a collboration or Intranet project and before they jkopw it, they have a documant and indeed a Records Management project on their hands – and if you’re rolling out across 10,000 employees, this could be problematic.
57% lack an Exevcutive endorsed plan about where it will be used, so if you lack a plan, you lack governance, and we could be heading for the file-share disaster all over again.
6. Paper - Most organizations are still drowning in paper - An aircraft carrier with 5K staff has the most modern military technology available, but is still drowning in paper (source: RM director of US Navy) Scanning is a necessity to connect the past with the present Paper is the number one material that is thrown away. For every 100 pounds of trash we throw away, 35 pounds is paper. Paper fills up 30-40% of American landfill space. Source1 Source Paper RecoveryRecovery of all printing-writing papers is 41.1% (office paper is recoveredat a rate of 46.9%), but only 4.8% recovered paper goes back into making newrecycled printing and writing paper. (AF&PA Paper Recovery Progress Report, May 2001) 12,891,000 tons of printing and writing paper (42.1%) was recovered in 2001 (pre- and postconsumer). Where does it go? 10.9% into new printing and writing paper 34.9% - net exports 23.4% - tissue 20.6% - recycled paperboard 4.5% - newsprint 5.8% - all other (Recovered Paper Statistical Highlights, 2002 Edition, AF&PA)
Have we not said over the years that the office would be paperless when we have paperless bathrooms? Well I say to you, the time has come!
DM: 22% annual increase in paper in US.
DM: There are just so many things here. Yes
7. Compliance – Happy days are soon here again (if you are selling solutions that help to ensure information management compliance)
Impact of recession; Cost more important, but things will change…
Wikipedia defines Corporate Social Responsibility (CSR) as a concept whereby organizations consider the interests of society by taking responsibility for the impact of their activities on customers, employees, shareholders, communities and the environment in all aspects of their operations. This obligation is seen to extend beyond the statutory obligation to comply with legislation and sees organizations voluntarily taking further steps to improve the quality of life for employees and their families as well as for the local community and society at large. Gartner predicts corporate social responsibility will soon be a higher board- and executive-level priority than regulatory compliance. John Mancini and I are both convinced that our industry has a role to play on this issue, if for no other reason than the impact of paper reduction. In the US, 4.7 million tons, or 937 billion sheets, of copy paper were produced in 2001 -- nearly 30% more than in 1995 . The associated costs of paper have been estimated to be as much as 31 times the purchasing cost. Also in the U.S., an estimated 90% of copy paper is “virgin” meaning that it does not contain any portion of recycled fiber. We all need to do what we can to reduce this! Your first 2 tasks; Reduce the amount of paper in processes Get rid of paper born electronically
Question to vendors: I don’t know how familiar you are with our Market Intelligence reports. The Industry Watch series is multi-vendor sponsored and free to download. How many have downloaded a report? – you do know it’s free, don’t you! How many have read a report? We also do a number of private single-sponsor reports and white papers. These are great collateral for your sales team – particularly when our ROI findings chime with your product benefits. Have you played with our online assessment tool for Records Management? www.rmcompetency.org Why sponsor or commission AIIM to develop research for you?: Position your company - Demonstrate value - Document ROI - Get leads