My Open Text ContentWorld keynote - The impact of SharePoint, Social, and Mobile on the Future of Information Management -- and the emerging role of information professionals
This session described changes to the AIIM CIP program, reviewed the outline of the 2016 CIP exam, described how to participate in the beta program, and how to register for, prepare for, and maintain the CIP through CEUs.
This presentation is a resource for the #govchat session I did with @PSLeader on June 20, 2012. A transcript of the chat is located at http://www.psleader.org/govchat
How is Big Content Different From Big Data?John Mancini
Moving the Mountain -- Evanta CIO Presentation on Big Data and Big Content -- central premise -- Big Data analysis without a strategy for the Content that usually fulfills the analytics is a waste of time.
Is IT Really the Villain? - Future of Technology in the EnterpriseJohn Mancini
Is IT the Villain? - The Future of Technology in the Enterprise -- A summary of my keynote presentation at the CITE Conference and Expo in San Francisco. How do organizations deal with the advantages of social, mobile, and consumer technologies without losing control?
There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it's increasingly difficult to know where information systems start and end.
This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach.
This session described changes to the AIIM CIP program, reviewed the outline of the 2016 CIP exam, described how to participate in the beta program, and how to register for, prepare for, and maintain the CIP through CEUs.
This presentation is a resource for the #govchat session I did with @PSLeader on June 20, 2012. A transcript of the chat is located at http://www.psleader.org/govchat
How is Big Content Different From Big Data?John Mancini
Moving the Mountain -- Evanta CIO Presentation on Big Data and Big Content -- central premise -- Big Data analysis without a strategy for the Content that usually fulfills the analytics is a waste of time.
Is IT Really the Villain? - Future of Technology in the EnterpriseJohn Mancini
Is IT the Villain? - The Future of Technology in the Enterprise -- A summary of my keynote presentation at the CITE Conference and Expo in San Francisco. How do organizations deal with the advantages of social, mobile, and consumer technologies without losing control?
There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it's increasingly difficult to know where information systems start and end.
This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach.
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
My #AIIM14 keynote -- Mancini's Law --
Organizations are systems of information networks. They only operate effectively when there are clear and predictable information flows within and between these networks.
50% annual growth in the volume of digital information means that these networks – and especially the points of connection between them – will become increasingly unstable.
Without intervention, the resulting #infochaos will threaten the viability of the entire system.
e-book here -- http://www.aiim.org/infochaos
Zoom: Privacy and Security - A case studyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on security and privacy issues faced by Zoom, a prominent online cloud-based video conferencing application.
In this presentation from GTEC 2011, Canada's Government Technology Event, Cisco Canada's CTO Jeff Seifert "connects the dots" on technology trends such as the rapid acceleration of video adoption, consumer devices in the workplace, the impacts of social media, increasing security requirements, data centre and desktop virtualization and smart buildings - and what it all means today and in the future.
Follow Cisco Canada on Twitter at http://www.twitter.com/CiscoCanada
Read more from Jeff on the Cisco Canada Blog: http://ciscocanada.wordpress.com/author/jeffseifert/
The Challenges of BYOD in Your Corporationmyorbitx
The Bring Your Own Device (BYOD) trend started several years ago for business managers who had personal devices that they wanted supported by IT. However, today BYOD has become a widespread and critical issue for IT departments because of the number and diversity of devices they must support and the risks created by BYOD. This document covers the steps to ensure compliance and reduce the risk.
You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss
I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
behind the great firewall, people are becoming more and more knowledgeable of ways to go around government’s censorship by using VPNs and other workaround tools. Even though circumvention tools are little used by ordinary Chinese, for the vast majority of westerners based in China, aVPN download is a common habit, just as drinking “still water” or keeping your air conditioning at minimum temperature.
Setting yourself up with a VPN connection, when in China is the first thing to consider, whether you’re looking to stay away from the control apparatus or simply connect to Netflix streaming. The connection, however, goes at a global low speed pace, so you’ll need to have your expectations straight when entering the arena a VPN app. is able too unlock for you.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
Law firms that establish a secure browsing environment without compromising data security, work culture or productivity gain a competitive advantage. This paper shows how successful law firms are optimizing on both axes: data security and user satisfaction.
Preparing for the Next Wave - IOT, Sharing Economy, Jobs and SkillsTanya Sammut-Bonnici
The global economy is entering the third wave of information technology, characterised by interconnected platforms of people, objects and resources. The Internet of Things (IoT) as a technology enabler of the Sharing Economy and its global platforms are due to grow exponentially in the next decade, placing demands on skills and changing the employment landscape. The demand for low-value-adding work will decrease as resources are used more effectively. The demand for information technology skills will continue to rise in order to meet the requirements of developing IoT products, software, apps, networks, cloud infrastructure, data management and information systems.
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
Summary of massive changes underway in the enterprise IT marketplace being driven by social, mobile, and cloud, and the implications of these changes on what it means to be an information professional.
http://www.aiim.org/certification
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
My #AIIM14 keynote -- Mancini's Law --
Organizations are systems of information networks. They only operate effectively when there are clear and predictable information flows within and between these networks.
50% annual growth in the volume of digital information means that these networks – and especially the points of connection between them – will become increasingly unstable.
Without intervention, the resulting #infochaos will threaten the viability of the entire system.
e-book here -- http://www.aiim.org/infochaos
Zoom: Privacy and Security - A case studyAdri Jovin
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers a case study on security and privacy issues faced by Zoom, a prominent online cloud-based video conferencing application.
In this presentation from GTEC 2011, Canada's Government Technology Event, Cisco Canada's CTO Jeff Seifert "connects the dots" on technology trends such as the rapid acceleration of video adoption, consumer devices in the workplace, the impacts of social media, increasing security requirements, data centre and desktop virtualization and smart buildings - and what it all means today and in the future.
Follow Cisco Canada on Twitter at http://www.twitter.com/CiscoCanada
Read more from Jeff on the Cisco Canada Blog: http://ciscocanada.wordpress.com/author/jeffseifert/
The Challenges of BYOD in Your Corporationmyorbitx
The Bring Your Own Device (BYOD) trend started several years ago for business managers who had personal devices that they wanted supported by IT. However, today BYOD has become a widespread and critical issue for IT departments because of the number and diversity of devices they must support and the risks created by BYOD. This document covers the steps to ensure compliance and reduce the risk.
You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss
I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
behind the great firewall, people are becoming more and more knowledgeable of ways to go around government’s censorship by using VPNs and other workaround tools. Even though circumvention tools are little used by ordinary Chinese, for the vast majority of westerners based in China, aVPN download is a common habit, just as drinking “still water” or keeping your air conditioning at minimum temperature.
Setting yourself up with a VPN connection, when in China is the first thing to consider, whether you’re looking to stay away from the control apparatus or simply connect to Netflix streaming. The connection, however, goes at a global low speed pace, so you’ll need to have your expectations straight when entering the arena a VPN app. is able too unlock for you.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
Law firms that establish a secure browsing environment without compromising data security, work culture or productivity gain a competitive advantage. This paper shows how successful law firms are optimizing on both axes: data security and user satisfaction.
Preparing for the Next Wave - IOT, Sharing Economy, Jobs and SkillsTanya Sammut-Bonnici
The global economy is entering the third wave of information technology, characterised by interconnected platforms of people, objects and resources. The Internet of Things (IoT) as a technology enabler of the Sharing Economy and its global platforms are due to grow exponentially in the next decade, placing demands on skills and changing the employment landscape. The demand for low-value-adding work will decrease as resources are used more effectively. The demand for information technology skills will continue to rise in order to meet the requirements of developing IoT products, software, apps, networks, cloud infrastructure, data management and information systems.
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
Summary of massive changes underway in the enterprise IT marketplace being driven by social, mobile, and cloud, and the implications of these changes on what it means to be an information professional.
http://www.aiim.org/certification
Originally delivered at Oracle Social Business Seminar - for more information on becoming a Certified Information Professional, go to http://www.aiim.org/certification.
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
This workshop delivered at KMWorld 2011 outlined the essential steps in the AIIM social business roadmap, presented a high-level assessment to conduct in order to develop an organization-specific roadmap, and outlined key strategies for the governance portion of the roadmap.
Info360 Keynote by AIIM President John ManciniJohn Mancini
What is happening to Enterprise IT? What are the implications for your organization? What should you do about it? For more detail, see http://www.aiim.org/roadmap.
Want to get involved in our big data/big content efforts? Direct Tweet me at jmancini77 -- I also did a blog post on this topic -- http://www.digitallandfill.org/2012/03/big-data-and-big-content-just-hype-or-a-real-opportunity.html
Selling Document Management to the Mid MarketJohn Mancini
AIIM President John Mancini keynote at the Docuware Partner Conference -- Research cited in presentation available (free) at http://www.aiim.org/research.
5 things you didn't know about automating governance and complianceJohn Mancini
Prospectus and presentation for upcoming multi-client research project by AIIM on the intersection between artificial intelligence & machine learning and information governance.
Digital Disruption and the Challenge of Keeping Members EngagedJohn Mancini
Some thoughts about how disruptive technologies impact the value proposition for how associations engage their members. From my keynote at the Aptify User Conference last year.
5 Strategies to Avoid the Digital RiptideJohn Mancini
Keynote presentation at the ABBYY Partner Conference in Tokyo -- How can you turn digital DISRUPTION into digital TRANSFORMATION? I did a broader accompanying blog post on some of these themes here -- http://info.aiim.org/digital-landfill/3-lessons-from-japanese-trains-information-management-and-the-internet-of-things
From Microfilm to Big Data - How Can One Brain Handle This Much Change Withou...John Mancini
How is Digital Disruption changing the role of Information in our organizations? How do we shift the focus from the "T"(technology) in IT to the "I" (information)?
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
Everything You Need to Know About...
...The History of Enterprise IT (1 slide)
...How Enterprise IT Buyers Are Changing (1 slide)
...How to Turn Information Chaos into Business Benefit (1 slide)
Wake up, C-Suite -- #InfoChaos is ApproachingJohn Mancini
Information Governance usually puts the C-Suite to sleep. But unless they start treating it as a strategic priority, organizations run the risk of being overwhelmed by #InfoChaos. A summary of the latest research by AIIM, ARMA, and Cohasset Associates.
Track keynote presentation at #otew2013, Open Text Enterprise World. Why our approach to information governance needs to change -- and focus on the BUSINESS.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
4. Systems of Engagement
Social and
Era Mainframe Mini PC Internet
Cloud
Systems of Record
Years 1960-1975 1975-1992 1992-2001 2001-2009 2010-2015
Typical
A batch A dept A A web An
thing
trans process document page interaction
managed
Best
Digital
known IBM Microsoft Google Facebook
Equipment
company
Content Social
Image Document Content
mgmt Microfilm Business
Mgmt Mgmt Mgmt
focus Systems
7. SharePoint everywhere.
For 25%, SharePoint content is doubling every 2 years.
5% already have over 10 TB of data.
Biggest issue for users - 46% - lack of strategic plan for
SharePoint and lack of clarity on what to use it for.
Over 60% have not yet brought SharePoint into alignment
with existing compliance policies.
Only 18% are currently using a BPM 3rd party add on – but
this is expected to grow to 55%.
7
Source: AIIM Industry Watch, 2011
12. ―It’s when a technology becomes normal,
then ubiquitous, and finally so pervasive as
to be invisible, that the really profound
changes happen…Revolution doesn’t
happen when society adopts new
technologies—it happens when society
adopts new behaviors.‖
--Clay Shirky
http://www.flickr.com/photos/6argoo3a/6253592631
16. Thank You
@jmancini77
blog = DigitalLandfill.org
If you are an information professional,
AIIM is where you belong.
www.aiim.org
16
Editor's Notes
The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
Per AIIM Industry WatchFor 25%, SharePoint content is doubling every 2 years5% have over 10 TB of data alreadyBiggest issue for users - 46% - lack of strategic plan for SharePoint and lack of clarity what to use it for.Over 60% have not yet brought SharePoint into alignment with existing compliance policies.
Conversations, not documents. Both inside and outside the firewall.Outside the firewall...1,330 years worth of time spent every day on Facebook ; 800M Facebook users, 50% log in on any day, 250M photos uploaded per dayChart - 360 degrees of digital influence. Inside the firewall...38% have an enterprise strategy; 18% coordinated. 21% nothing, 6% actively discourage, 24% ad hoc27% consider social inside the firewall as an "infrastructure" investment not requiring a business case.
What exactly is mobile anymore? Blurring of lines with growth of devices and variety of uses.Think of mobile as a canvass that is always with you upon which you can create content, you can consume content, and you can interact with content (I.e., processes)Massive growth in mobile subscribers from 719M in 2000 (60% in developed world) to 5.6M today (70% in the developing world)Huge smart phone upside - only 835M out of 5.6MAccelerating rate of adoption - e.g. iPods to iPhones to iPads - and android faster than iPhone. % of total traffic from mobile = 60% Pandora, 55% Twitter, 33% Facebookq4:10 - smartphones + tablets > notebooks + desktopsQ2:10 - Windows operating systems < 50% of Internet enabled devicesMobile is the only access point for 1/3 of Internet usersWhat exactly is mobile anymore? Blurring of lines with growth of devices and variety of uses.Think of mobile as a canvass that is always with you upon which you can create content, you can consume content, and you can interact with content (I.e., processes)
What exactly is mobile anymore? Blurring of lines with growth of devices and variety of uses.Think of mobile as a canvass that is always with you upon which you can create content, you can consume content, and you can interact with content (I.e., processes)Massive growth in mobile subscribers from 719M in 2000 (60% in developed world) to 5.6M today (70% in the developing world)Huge smart phone upside - only 835M out of 5.6MAccelerating rate of adoption - e.g. iPods to iPhones to iPads - and android faster than iPhone. % of total traffic from mobile = 60% Pandora, 55% Twitter, 33% Facebookq4:10 - smartphones + tablets > notebooks + desktopsQ2:10 - Windows operating systems < 50% of Internet enabled devicesMobile is the only access point for 1/3 of Internet usersWhat exactly is mobile anymore? Blurring of lines with growth of devices and variety of uses.Think of mobile as a canvass that is always with you upon which you can create content, you can consume content, and you can interact with content (I.e., processes)