The deliverable from a consulting engagement for a hospital. The hospital needed to define the requirements for a single EIM platform. This two-day clinic allowed them to identify key issues and requirements to reduce the time to move from idea to RFP. While ensuring the that process stayed focused on hospital goals rather than just technical ease and fastest implementation.
Moving records management from a paper based strategy to a electronic strategy requires re-thinking what needs to be protected and where the threats to security exist.
The key is to stop focusing on the artifact (the document) and focus on the information that is important. Documents are just the storage media to move the information from person to person.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
This is a re-boot of a presentation originally given on the potential role of cloud infrastructure in healthcare delivery from eHealth Canada 2012.
Key concepts are the drivers of change in healthcare, how hospitals can protect themselves when using of cloud, the potential use of enterprise content management as part of healthcare delivery and the current models that we are seeing in Canada and the US.
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
Moving records management from a paper based strategy to a electronic strategy requires re-thinking what needs to be protected and where the threats to security exist.
The key is to stop focusing on the artifact (the document) and focus on the information that is important. Documents are just the storage media to move the information from person to person.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
This is a re-boot of a presentation originally given on the potential role of cloud infrastructure in healthcare delivery from eHealth Canada 2012.
Key concepts are the drivers of change in healthcare, how hospitals can protect themselves when using of cloud, the potential use of enterprise content management as part of healthcare delivery and the current models that we are seeing in Canada and the US.
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
Online Hospital Appointment Management using Cloud Computingijtsrd
Salesforce Cloud computing is quickly replacing the traditional model of having software applications installed on on premise hardware, from desktop computers to rooms full of servers, depending on the size of the business. With cloud computing, businesses access applications via the internet. It's called Software as A Service or SaaS . Salesforce is the leader in cloud computing, offering applications for all aspects of your business, including CRM, sales, ERP, customer service, marketing automation, business analytics, mobile application building, and much more. And it all works on the same, connected platform, drawing from the same customer data. The outpatient of most clinics in developing countries are faced with plethora of issues. These include overtime for doctors and nurses during clinic sessions, long waiting time for patients, and peak workloads for counter personnel. The quality of health care delivery has been threatening by overtime and peak work load. This paper focuses on developing a system to improve upon the efficiency and quality of delivering a web based appointment system to reduce waiting time. In this project, a patient appointment and scheduling system is designed using Salesforce Lightning for the frontend, Apex is used to get values from frontend and store in back end cloud storage. Nithiyasri Sathiyamoorthy | Amaresan S "Online Hospital Appointment Management using Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31681.pdf Paper Url :https://www.ijtsrd.com/management/other/31681/online-hospital-appointment-management-using-cloud-computing/nithiyasri-sathiyamoorthy
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
This analyst report describes reasons why adoption of continuous availability is rapidly increasing, citing research on benefits they believe they can realize in their IT environment.
Many companies have started to experience the consequences of non-existent, insufficient or poorly implemented data security plans. The absence of ‘proper IT’ to serve the diversity of information management, analysis and human-centric workflow requirements that exist in the office has created a paucity of unsecured business-critical information held in spreadsheets and micro-databases beyond the governance of IT teams. For most organizations, up to 60% of business critical information is found in these unsecured office environments.
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
White Paper discussing IDC Survey of over 650 enterprise IT decision makers that was designed to understand the evolution of the cloud across world’s largest IT organizations.
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryNextGen Healthcare
This eBook provides a list of reasons behind the certainty of the cloud and cloud based technology in dentistry, and provides the "top ten" reasons for dental professionals to move their electronic dental record (EDR) and practice management (PM) data management systems to the cloud.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
Virima has helped many healthcare clients with post-merger woes especially those hospitals, clinics and imaging facilities don’t come together seamlessly, especially in the IT realm.
Online Hospital Appointment Management using Cloud Computingijtsrd
Salesforce Cloud computing is quickly replacing the traditional model of having software applications installed on on premise hardware, from desktop computers to rooms full of servers, depending on the size of the business. With cloud computing, businesses access applications via the internet. It's called Software as A Service or SaaS . Salesforce is the leader in cloud computing, offering applications for all aspects of your business, including CRM, sales, ERP, customer service, marketing automation, business analytics, mobile application building, and much more. And it all works on the same, connected platform, drawing from the same customer data. The outpatient of most clinics in developing countries are faced with plethora of issues. These include overtime for doctors and nurses during clinic sessions, long waiting time for patients, and peak workloads for counter personnel. The quality of health care delivery has been threatening by overtime and peak work load. This paper focuses on developing a system to improve upon the efficiency and quality of delivering a web based appointment system to reduce waiting time. In this project, a patient appointment and scheduling system is designed using Salesforce Lightning for the frontend, Apex is used to get values from frontend and store in back end cloud storage. Nithiyasri Sathiyamoorthy | Amaresan S "Online Hospital Appointment Management using Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31681.pdf Paper Url :https://www.ijtsrd.com/management/other/31681/online-hospital-appointment-management-using-cloud-computing/nithiyasri-sathiyamoorthy
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
This analyst report describes reasons why adoption of continuous availability is rapidly increasing, citing research on benefits they believe they can realize in their IT environment.
Many companies have started to experience the consequences of non-existent, insufficient or poorly implemented data security plans. The absence of ‘proper IT’ to serve the diversity of information management, analysis and human-centric workflow requirements that exist in the office has created a paucity of unsecured business-critical information held in spreadsheets and micro-databases beyond the governance of IT teams. For most organizations, up to 60% of business critical information is found in these unsecured office environments.
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
White Paper discussing IDC Survey of over 650 enterprise IT decision makers that was designed to understand the evolution of the cloud across world’s largest IT organizations.
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryNextGen Healthcare
This eBook provides a list of reasons behind the certainty of the cloud and cloud based technology in dentistry, and provides the "top ten" reasons for dental professionals to move their electronic dental record (EDR) and practice management (PM) data management systems to the cloud.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
Virima has helped many healthcare clients with post-merger woes especially those hospitals, clinics and imaging facilities don’t come together seamlessly, especially in the IT realm.
Embedding records management practices into how people work is essential to ensuring compliance and reducing risk in the digital age. This presentation goes through examples of how current processes and the mixed digital paper processes commonly found at organizations are reducing control rather than increasing it.
The NVQ Diploma in Kitchen Services Level 2 qualification is aimed at those working or who are seeking to start a career in kitchen services. It can be taken whilst in the workplace to allow hands on experience as you train. It is aimed at chefs and cooks who may be cooking and reheating food that is bought in and that requires little or no preparation. This could be in more mainstream restaurants or in some parts of public sector catering.
Social really is here when it comes to the enterprise. Many see the role of social in consumer-focused businesses but have not absorbed what it means for the enterprise. Social is having a direct impact in 5 areas:
1. DIY prospecting: Customers conduct research on products and services well ahead of the official start to the sales cycle
2. Peer influence: Customers “pulse” their peers at every step of the journey
3. Trial before purchase: User testing requires grassroot support. It’s no longer a single decision instance rather smaller purchase bundles
4. Buyer & user are the same: The phenomenon changes decision and influence points in enterprise purchasing
5. Click to compare: Pricing transparency is foundational; consumer expectations are shaping enterprise behavior
Bain is a popular consulting firm for both recent graduates and professionals because of its prestigious reputation. It has successfully provided various services to a range of industries around the world--from transportation to healthcare companies.
In order for consulting aspirants to catch the attention of Bain recruiters, they need to submit a well-crafted resume that provides value to the firm. Read this presentation to learn how to do so. You may also refer to the free consulting guide that can be downloaded at http://www.consultingfact.com/guides/land_a_consulting_job/
How To Use Custom Google Fonts in PowerPointLea Pica
Is your PowerPoint lacking personality? This tutorial will teach you how to embed free Google Fonts in your PowerPoint so you and your presentation can stand out.
ECNO 2016-Using ECM to gain administrative efficiency for school boardsChristopher Wynder
Presentation from ECNO 2016. The presentation centers on embedding records management into process management. We take a IT project centric view of how to move from chaos to manage-able information access points. A key concept is how ECM and EIM technologies provide opportunities for school boards to reduce their costs and risk.
Information Management aaS AIIM First Canadian presentationChristopher Wynder
High level talk given at AIIM Canada's breakfast event March 23, 2017.
The talk goes through the challenges of information management in the era of BYOD and cloud services. The last part of the talk is how to start with a small but impactful project to show the value of IMaaS.
Joan McFaul, Senior Vice President/CIO, Southcoast Health and Jim Feen, Executive Director, Associate Chief Information Officer, Southcoast Health - Speakers at the marcus evans National Healthcare CIO Summit 2016 held in Las Vegas, NV
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
Running Header: 1
APPLICATION DEVELOPMENT METHODS 2
Unit 1 Group Project
Application Development Methods
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
April 10, 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 8
Section 5 - Complete Features and Trade-off Analysis 10
Section 6 - Milestones and Deliverables Based on Date and Dependencies 11
Section 7 - System Architecture Aligned with System Requirements 12
Section 8 - Technical Design Document 13
Section 9 - Design Review Checklist 14
Section 10 - Testing and Deployment 15
References 16
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the .
Running Header: 1
SYSTEM ARCHITECTURE 2
Unit 3 Group Project
System Architecture
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
24 April 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 10
Section 5 - Complete Features and Trade-off Analysis 12
Section 6 - Milestones and Deliverables Based on Date and Dependencies 15
Section 7 - System Architecture Aligned with System Requirements 21
Section 8 - Technical Design Document 24
Section 9 - Design Review Checklist 25
Section 10 - Testing and Deployment 26
References 27
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic caree.
Webinar discussing the top trends driving the Digital Enterprise with Content and Process. ECM has never been more important to driving productivity in the enterprise. Forrester's Cheryl McKinnon discusses the top trends that leaders are using to build the Digital Enterprise.
Running Header: 1
SYSTEM ARCHITECTURE 24
Group Project
Group 1
Charles Williams
Participating Members
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
Non-Participating Members
5/22/2019
IT488 – IT Capstone II (IT488-1902B-01)
Henrietta Okoro
Table of Contents
Section 1 – Project Overview (from IT487) 3
Section 2 – Requirements (from IT487) 5
Section 3 – Design (from IT487) 7
Section 4 - Methodology 10
Determining Methodology 10
Section 5 – Work Breakdown Structure 12
Section 6 – Communication Plan 13
Plan involvement – 13
Stakeholder requirements 14
Key Messages 14
Scheduling 15
Section 7 – Quality Assurance Plan 16
Section 8 – Documentation Plan 17
Section 9 – Quality Assurance and Results of Test Case 18
Project Closure 19
References 20
Section 1 – Project Overview (from IT487)
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic career or the faculty member’s tenure. The.
Performance Support for Software Rollouts & Upgrades - The Business ProblemEpsilon Software
This slideshare is usually presented during our webinar and product demonstration sessions, and reflects our understanding of the business problem when it comes to information overload, end user adoption, business process guidance and performance support.
Whitepaper developed with Pharma Exec magazine on how EIM- Enterprise Information Management- can provide efficiency and kick start innovation by ensuring information flows correctly inside- and outside- the company
Healthcare products suffer from a lack of ability to control documents and non-clinical images. OpenText ApplicationXtender can solve that problem for vendors through our OEM program. This whitepaper goes through the benefits of embedding ApplicationXtender into healthcare products.
OpenText ApplicationXtender provides cost effective document management. For software vendors looking to expand or build a healthcare focused product, "AX" can be embedded to provide first class content services in without the high cost of research and development.
Automating Patient Management with ApplicationXtender WorkflowChristopher Wynder
The hardest part about managing a clinic is keeping everybody up-to-date with the right information. Whether this is simply making sure billing is alerted of a new bill or as complex as managing follow-ups after a referral. There is simply too many documents, emails and schedules for a person to manage. This is the value of workflow to a clinic or hospital- setting the rules regarding who gets to see certain types of documents and ensuring that know about the updated information.
Healthcare information management is complex. Not only does it require a system designed specifically for medically relevant information, you also need a system that manages billing and the normal every-business kind of HR, vendor, etc records that confound organizations of all kinds.
In this whitepaper we go through how Content Services (nee ECM) can be used as the connective tissue between your clinical systems and administrative use cases.
This deck goes through the Information conundrum and how ApplicationXtender is positioned to provide the technical platform for organizations to start moving from paper to a digital future
ThinkDox talk from ECNO 2017 on using Laserfiche to manage student records and student information. We use the examples of Field trip forms and student record search to highlight the potential administrative efficiencies that can be gained.
Histone demethylase and it srole in cell biology reviewChristopher Wynder
This document provides a scientific review of the histone demethylase enzymes; particularly the H3K4 demethlases (KDM5 family) focusing on their role in cell biology. This review was written in 2014
We are often why use a VAR- what am I paying you for? This presentation goes through the basics of how we implement Laserfiche and provide continual support above and beyond basic technical support, we make sure you understand what is possible and support you as you maximize your investment.
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Christopher Wynder
Laserfiche 10 brings a lot of additional features for information management, workflow building and mobile content access. This slide deck provides the overview of how Laserfiche 10 can benefit clients looking to automate their processes.
Protocol for preparing small volume samples from ES cells, clinical samples and non-adherent cell types.
This sample is designed to prepare samples for histone modifying enyme assays including demethylase, methyltransferase, deacetylase.
Regulation of KDM5 by multiple cofactors regulates cancer and stem cellsChristopher Wynder
Presentation of data regarding proteins that regulate the activity of KDM5b.
The studies use multiple disciplines including in vitro enzymology, ES cell studies of differentiation, Mass spectrometry to detect protein protein interactions.
These studies resulted in a comprehensive view of KDM5b function. It required development of at least three novel assays that are focused on moving epigenetic research from yeast and HeLa cell types to primary, clinically relevant cell types.
The techniques have been successfully used in Embryonic stem cells (human and mouse), Neural stem cells (mouse and patient derived as well as iPSCs.
KDM5 epigenetic modifiers as a focus for drug discoveryChristopher Wynder
A summary presentation of my scientific work.
My laboratory focused on an enzyme KDM5b (aka PLU-1, JARID1b) that was widely expressed during development and played a key role in progression of breast cancer through HER-2.
My lab focused on understanding the key biochemical activity of the enzyme through dissecting the proteomic and genomic interactors.
Our results were confirmed through the use of ES cells, adult stem cells and mouse models.
Much of this work remains unpublished, please contact me for more information and/or access to any reagents that I still have as part of this work.
crwynder@gmail.com
Primer on Epigenetics given at the IRSF family conference 2011Christopher Wynder
My presentation for the families of Rett syndrome patients.
This serves as a basic primer on what epigenetics is without deep details on the science.
Appropriate for all levels of education.
For more information contact the author: crwynder@gmail.com
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaYara Milbes
Discover the transformative power of the WhatsApp API in our latest SlideShare presentation, "Top 7 Unique WhatsApp API Benefits." In today's fast-paced digital era, effective communication is crucial for both personal and professional success. Whether you're a small business looking to enhance customer interactions or an individual seeking seamless communication with loved ones, the WhatsApp API offers robust capabilities that can significantly elevate your experience.
In this presentation, we delve into the top 7 distinctive benefits of the WhatsApp API, provided by the leading WhatsApp API service provider in Saudi Arabia. Learn how to streamline customer support, automate notifications, leverage rich media messaging, run scalable marketing campaigns, integrate secure payments, synchronize with CRM systems, and ensure enhanced security and privacy.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Utilocate offers a comprehensive solution for locate ticket management by automating and streamlining the entire process. By integrating with Geospatial Information Systems (GIS), it provides accurate mapping and visualization of utility locations, enhancing decision-making and reducing the risk of errors. The system's advanced data analytics tools help identify trends, predict potential issues, and optimize resource allocation, making the locate ticket management process smarter and more efficient. Additionally, automated ticket management ensures consistency and reduces human error, while real-time notifications keep all relevant personnel informed and ready to respond promptly.
The system's ability to streamline workflows and automate ticket routing significantly reduces the time taken to process each ticket, making the process faster and more efficient. Mobile access allows field technicians to update ticket information on the go, ensuring that the latest information is always available and accelerating the locate process. Overall, Utilocate not only enhances the efficiency and accuracy of locate ticket management but also improves safety by minimizing the risk of utility damage through precise and timely locates.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
1. Build a governed Information platform using an ECM
Without the governance and organization in place you cannot build a system that users want
Please note that client identity has
been redacted. ThinkDox has removed
sections and specific slides that
represent key intellectual properties.
2. Next steps for The Hospital for Hospital
These five steps were identified as the critical needs
Establish Information Governance plan prior to the ECM upgrade
Establish Information governance as a item one of the hospital wide compliance
committee’s
Build a organizational taxonomy that meets Hospital needs
Identify existing templates and taxonomy can be extended to the whole
organization. E.g. NICU’s site
Establish information architecture that can increase user
adoption
3. Expected benefits in moving to a formal ECM from SharePoint
Service/Agility Opportunities
General
Public Department Intranet
Provide easier mobile or remote access
Improve end-user productivity
Integrate more easily with other services
Potential benefits hoped for with the migration to a formal ECM
platform. As Hospital moves forward the IT priorities for this
project should be accounted for when defining the value.
4. Internal document/collaborative sites
Who
Who uses it?
What
What are they
using it for?
Where
Where is it
hosted now?
Why
The business
rationale
How
How is it
accessed?
When
When are you
rolling it out?
Intranet Site • Used for
communication
• Employee
workspace.
•Links to various
applications, sites,
allow people the
ability to choose
what they need.
• Internal • employee portal
to the information
they need.
• Links to HR
• Wikidea
• A/D
• Web access
• 2013 – in
development with
targeted rollout in
July for phase 1.
• Will have
responsive design
Researchers
(SP 2010)
• Research
materials
• For publications
• collaboration b/w
researchers
• DMZ Internal • Collaboration
• Support for
researchers
• Web Access
• User name and
password
necessary.
• (SQL for
authentication)
• on 2010,
•Key focus due to
complex access
control and risk
issues
Departmental –
collaborative site
(SP 2010)
• Collaboration
sites for various
departments –
organized by dept.
• Document library
• Internal • Collaboration
• document library
• A/D
authentication
• Web access
•Half migrated to
SharePoint 2013.
•Requires a
variety of
workflows to be
built.
5. What applications are part of the part of the EIM Ecosystem?
Lync 2010
Exchange 2010
Planed upgrade to
2013
Scheduling has
several department
level tools
Potential ECM role:
Outlook integration,
Schedule integration
Intelligent content and
message storage
What have you got?
Email/Messaging
Servers/Storage
Enterprise Applications
Content Technologies
Kidcare
Spigot
PeopleSoft
Health Commander
BI tools (Microsoft
based)
Potential ECM role:
BI access
HR access
Potentially access to
Kidcare
Lync 2010
Exchange 2010
Planed upgrade to
2013
Scheduling has
several department
level tools
Potential ECM role:
Outlook integration,
Schedule integration
Intelligent content and
message storage
Windows Server
2008 R2.
Virtualized servers
Potential ECM role:
Limited do not expect
to provide any outside
content stores into
ECM.
6. Key sources of information and technologies for top risk group
Mobile
Kidcare
Scheduling
Workflows
Home of
PHI.
Hand-over
process
Key need for
effective care
Aggregator
for lab tests
Has a handover
note template
Has mobile
app
Key desire
of personas
Enables
“bedside care”
Every has multiple
schedules
Notification
for tests, etc
Send/Share
information with peers
7. ECM Intranet: Additional information for Intranet
User Groups:
The Intranet is available for all Hospital employees. Various groups access the Intranet, including:
• Non-medical – May have a page and/or collaboration site
• Clinical staff, doctors, admin, scientists, etc.
Access
Controlled by A/D when logged into the fire wall you can access the intranet.
• The Intranet has two faces: public and private.
• Want to give access to private documents as well as public groups – but want it to appear seamless for end users, so that
they aren’t aware of the 2 parts.
• Hospital specific Apps – some would need to be behind the firewall, but not necessarily – there is nothing confidential
about the app piece.
Content
• Intranet contains business information – low risk information.
• HR is its own site within the intranet (PeopleSoft – web applications installed on SP) InFlight
• BI system – MSFT custom solution, SP 2010 SQL 2008 – (will be 2012.) Moving it to 2013 (?). Depends on ECM tool
selection. Due to the overlapping data and content usage and needs a single platform is preferred.
• Innovation manager – Wikidea (Spigit)
• Health commander (PMIS SP 2010)
• Integration into the existing ticketing system. Configurable Manager – System Center 2012
8. This only gets you to the first mile of a 10 mile road
Getting users to buy-in to the
system is a long one. We’re
only completing the first mile.
But we’re also plotting a
course towards success for
the rest of the journey.
9. Avoid re-building the junk drawers
Be proactive with your ECM implementation or users
will default to the old habits of throwing everything in
the same place.
• ECM cannot be used appropriately without a Risk
profile and Information Governance plan.
• Users do not know what they want from ECM-
they just know what they need to do.
• When we allow users to decide on the organization
of ECM they often become frustrated with the lack
of built-in tools-which then leads to dissatisfaction
and low use of ECM.
Do not ask “What can an ECM do?” Ask “What do we want our ECM to do?”
An ECM is an expansive tool box that can support
both application development and document
management-out of the box.
• Solve this problem by have a business focused
plan for the initial roll out.
• Focus on solving a user driven problem. This
will likely require building workflows or addition
of third party tools.
• Set up a straw man of based on IT’s view of
what user’s need so that we can get the users
talking about what they actually want compared
to what we’ve showed them
• “This is what I think you need, Why am I
wrong?”
10. Getting started: Information Governance basics
What skills are required to govern information
Where do we start
How do we determine value
Getting Started: Information
Governance basics
Information Organization
Increase ECM Adoption through good
architecture
Requirements gathering and Solution
prototyping
Putting it all together
11. ECM requires a varied skill set for success
• Successful organizations have a mix skills within IT to administer ECM
Information
Governance
IT
Competency
Technology
readiness
IT Competency
Information sources risk
assessment
Standard operating
procedures for
requirements gathering
Mature process for
application development
Basic understanding of
consumerization trends
Information Competency
Do you have a:
Information governance
committee
Program manual for
information governance
Retention and archive plan
Executives acknowledge
need for better user adoption
A controlled vocabulary to
base user needs on
Technological Readiness
Implemented an ECM solution
Applied the taxonomy to the ECM
Assessed the gaps in user needs and
ECM features
Checked vendor roadmap for updates
to current issues
12. The main focus of this activity is to establish what information exists, who has access, its location,
currency, and how the information is used.
Identify the top risky information sources at the organization and
departmental level
• Identify information sources and assets that end-users require as well as those rogue sources that they are using to
perform their jobs effectively.
Ensure you have control checks in place as you go through
this exercise. Have all information sources been
considered? Include network drives, fileshares, collaborative
and cloud applications, flash drives/memory sticks, and any
rogue sources such as desktop access databases or
customized excel spreadsheets.
Information users at the department level will play a
major part in this exercise as they are the knowledge
sources regarding information assets.
The users can provide clarification around
rogue sources that are being used, what types
of information is being generated, for what
purpose.
Users will have an understanding of how the
information is used to perform daily tasks and
responsibilities, and any inter-departmental
information sharing that may occur.
Involve compliance to identify information that is
confidential or requires any additional security
measures. Compliance will be able to discount
information that is not subject to ediscovery or
compliance requirements.
Consider the following for each information source:
Who has access to each information asset, how does
the asset originate, does the asset provide current
and accurate information?
Are there any information sharing activities with other
departments?
Determine asset currency – is it used with some
frequency, should it be destroyed or does it need to be
archived.
13. Compile a list of the Information sources within your organization
Define the level of
granularity that you need
to meet your governance
strategy.
Do you need a plan for:
1: Documents
2: Folders
3: Drives
4: Applications
Define the type of
information that you need
to record.
Do you need for each
source:
1:Relevant regulations
2:Internal policies
3:Who uses this
information
Be transparent about the
current condition of the
sources.
Document the concerns
for risk, value, and
lifecycle properties of the
information.
The inventory tool should be used to document the
results of the IG committee’s decisions.
Do not expect to fill out all aspects of the inventory on
the first meeting. This is a on-going process.
14. Determine Risk and Value criteria for classification of information
sources
Risk Value
When risk outweighs value purge documents as soon as the regulations
allow. Value comes from clean, clear information that has a clear use case.
Don’t forget to analyze external communications as part of your Information Governance strategy. What is the purpose
of the website and social media? Who controls the information, do they understand acceptable use policies? Is there a
strategy to determine the value-can you verify claims by marketing? Is there a long term plan to use social as part of
business decisions or derive revenue from its use?
• Risk comes in many forms: Compliance, litigation,
loss of opportunity, productivity.
• Mitigating any one of these risks is often at the
expense of the increasing other kinds of risks.
• When developing a Information Governance
strategy you must define which risks are the most
damaging to the enterprise and which are
acceptable risks.
• What is acceptable risk? The amount of risk at
which the harm, should the worst case happen, is less
costly than regulating or protecting the information
source.
• The biggest risk for most enterprises is keeping too
much. Unaccessed content is not information it is
garbage-or potentially a legal disaster.
• Value is the opposite of risk: increased productivity,
new opportunities, simplified processes, findability.
• Information has no inherent value. Its value to the
enterprise comes from how and who uses the
information.
• The value of information to the enterprise must be
put in the context of tangible benefits. Revenue,
opportunity, competitive advantage.
• As information sharing and use expands-and
regulations change, the value of retaining Information
must be balanced with the risks that are associated
with that use case and sharing method.
• What is high value information? That information
that can be used to generate revenue or cut costs.
E.g. customer sentiment, internal productivity
analysis.
VS
15. Record the inventory and classify risk and value to all information
sources according to established criteria
Once all sources have been identified, follow the step-by-step inventory and
classification process. An excel based tool is sufficient.
An information asset inventory is one of the most
important pieces of information an organization owns.
A comprehensive listing of all departmental or
business unit information sources is the long term
goal.
Expect this to be an on-going process that starts with
the obvious IT controlled sources.
As the organization’s Information Governance
policies are defined this can then become part of
department meetings to expand the sources.
Inventory Information Sources Classify Information Sources
Information owners may argue that they should
apply classifications, but in reality, this is an IT
related task.
IT and the compliance office must work
together to define the classification levels and
tags that work for all organizations.
Accurately classifying information sources will
ensure that appropriate access rights are assigned
to the information.
Classification should be part of the taxonomy so
that it can be inherited from the tags that are
applied at creation.
16. Document your information classification system.
For enterprises with low regulatory overhead it
may be sufficient govern information at the level
of the drive and application. Set the retention
and deletion policies for the whole source.
For those with high regulatory overhead:
Determine the lowest level at which you need to
control information: piece of content versus
storage location.
For most organizations the lowest level will be
the same as the inventory source.
For those with less structure in their storage
systems:
Use the inventory classification to define their
long term governance strategy.
Use the classification tool to define the
documents within the each inventory source.
Remember the difference between
Information and content.
Information is what you are governing,
content is where that information is
stored.
Build information categories based on your
acceptable use policies.
Separate each source based on the risk you
determined with the inventory tool.
Then use the tool to document the location, retention
and classification of each source or piece of content.
17. Information Organization
The drivers of information
organization
Information growth
User needs and characteristics
Defining the appropriate
descriptors
Getting Started: Information
Governance basics
Information Organization
Increase ECM Adoption through good
architecture
Requirements gathering and Solution
prototyping
Putting it all together
18. Information Organization projects often fail
to get off the ground because they start
too big. Consider a project that starts with:
Engage all senior executives in a governance and
steering process.”
You will never get the CEO, CFO, CxO, [the Pope,
the President, etc.] in a room together at the same
time. They are too busy and are focused on bigger
issues.
Governance is crucial but it’s a late-stage task. You
can never initiate Information Organization with
governance.
The first common problem of Information Organization: the Popes
& Presidents Problem (P31)
You have to start within IT before pushing out to the rest of the business
Bottom Line: Start small. Do everything you can within IT
before engaging the business units.
19. The second issue is the Post Platoon Problem (P32)
People are very good at informally exchanging information… until the group
gets two big or splits across locations
Humans are generally very good at exchanging information and
organizing themselves. These attributes define the human species and
conferred considerable advantages to our hunter-gatherer forebears.
Our organizational abilities breakdown when one of two things happen:
The Group is larger than 30 individuals
Traditional village groups contain about 30 people, as do many
business units. This bigger group will break down into smaller parties to
perform specific tasks (e.g., hunting parties, squads, fire teams, etc.). A
span of 30 individuals seems to define human ability to self-organize.
The Group is spread across multiple locations
Human organization works best when everyone is co-located.
Support remote teams requires additional effort for coordination.
Bottom Line: Groups that don’t
suffer from the Post Platoon
Problem will not willingly adopt
Information Organization projects.
20. Develop a strategy that avoids both the Popes and Presidents, and
the Post Platoon Problems
You need a straw man strategy that starts in IT is then pushed to the rest of
enterprise via the governance structure
Put together an Information Organization strategy from within IT
first, before disseminating it to the rest of the enterprise. It is far
easier to engage with business units and get buy in when you have
already started something.
Answer some basic questions about the enterprise and its information
needs and then ask the business why you’re wrong:
What are the information-related problems facing the
enterprise?
How do these related to business and IT priorities?
What information sources do we actually have?
Is there risk or opportunity associated with those information
sources?
Who uses these information sources and what do they really
need?
Bottom Line: The straw man doesn’t have to be definitive. But it does have to be defensible!
21. Funnel information sources through ECM to build an Organizational
level System of Information
Users create content
using a device. The
device could be a work
station or mobile
device.
?
Systems create
content through
the comments and
transactions (e.g.
payable reports,
PHI).
1 3
Users query on
keywords and
enterprise
descriptors. When
ECM has access to all
systems the search
can be role based.
5
A single set of
enterprise descriptors
automates association
of similar files from
multiple sources.
4
The search
returns multiple
documents that
have the
keywords or the
same descriptors
(e.g. same
author,
department,
project).
6
User choice
becomes a data
field to rank search
(accession date).
7
Properly tagging
documents
improves findability.
Tags/Metadata also
become the basis
for providing
appropriate access
and classification
2
22. Take a structured approach to deal with Information Organization
• There are seven steps to attaining Information Organization in the enterprise
Establish Information Organization Priorities
Build a Business Case
Build User Profiles
Identify and Prioritize Information Sources
Develop a Taxonomy
Implement the Taxonomy
Govern the Taxonomy
This is detailed in the
additional workshop
sent to Hospital. This
workshop talked about
specifically building a
strawman taxonomy.
23. Information Organization has three drivers: users, business, and the
information itself
Balance the needs of different stakeholders with the nature of the information
that you’ve got.
Users have specific demands for how they
access information. They have both standard
business processes and their own individual
information behaviors. Both of these factors
impact on the overall success of an
information organization project.
The business also has priorities for
how information can be used to
address goals and priorities.Business
Users
Information
The information contained
within the enterprise has
its own characteristics
and demands. IT leaders
have to consider the
growth rate of the
information and how its
maintained. They must
also consider how the
information is currently
structured. Folders often
contain order that might
not be obvious but is
important to particular
business functions.
24. Unstructured information has several unique features
We have to provide the structure for the information
1. It doesn’t attach to a specific business
process
2. No standards.
3. No centralized home
4. No centralized owner
5. No obvious description
Unstructured information rarely attaches to a specific
system or process. It accumulates outside of the
systems of record that typically maintain records and
standard communication.
Documents rarely adhere to strict templates and users
deploy informal and irregular writing and wording.
The information may – or may not – be restricted to a
single repository.
The information may – or may not – have a designated
owner who is still employed by the enterprise.
It may be impossible to determine what the information
is about without a detailed investigation.
25. 0% 10% 20% 30% 40% 50%
Managing SP within
centralized info policy
Managing process change
Technical more difficult than
anticipated
User resistance in
committing documents to SP
Taking longer than expected
to roll out
Governance: management of
site proliferation
Lack of expertise to
maximise its usefulness
Governance: metadata,
classification, taxonomy
Lack of strategic plans on
what to use it for
Search and Information Governance plague
SharePoint deployments
• An multiple studies have revealed that
◦ 33% of SharePoint projects have problems
with governance
◦ 27% with findability
◦ 25% with content management.
• A 2012 AIIM study found that
◦ 39% of implementations struggled with
content migration
◦ 34% with information governance
◦ 41% claim that "Governance: mgt of metadata
and taxonomies" are among their "biggest on-
going technical issues"
• A 2011 AIIM report indicates the biggest ECM
upgrade concern was "Standardizing on a
taxonomy or metadata template."
Source: AIIM Industry Watch. Using SharePoint for
ECM. 2011. n = 400
SharePoint isn’t a panacea for findability. The biggest challenges
are with metadata and governance
Strategic plans and information governance
are the biggest issues facing SharePoint
as an ECM
26. 1.3 What are your information sources (~15)?
Information sources?
Is it a…
priority?
Is it a…
risk?
x
x
x
x
x
x
x
Get a list of information sources.
There might be many but we
only really need about 15 for
demonstration purposes. If
possible, go beyond the top level
of a file share, but avoid going
below three levels.
1. Brainstorm a list of different information
sources. They could be file shares,
existing document management
repositories, or cloud-based services.
2. Refer back to existing system topology
maps as memory aid and to guide the
conversation.
3. Ask participants if the information
source represent a business priority or
a risk and mark them accordingly.
Delete this box.
Completion TipsX
27. Facilitator Insights
This step can be surprisingly difficult. People get
overwhelmed quite easily. If necessary, start with what
people know best – the information sources within IT.
What it looks like (early stage):
It’s a good idea to go into this exercise with a control
document Can you get a list of existing file shares? Or
maybe you can go through the enterprise department by
department. Regardless, it’s often helpful to have some
sort of list that you can check off and say “what
about…?”
File shares are tricky. Participants will be tempted to just
throw out the names of various drives (e.g., “the N:
drive”). In most cases, that particular drive will have a
variety of different uses or information sources. Write
down the name of the drive and ask if it’s a priority or
risk. If it is, start drilling down into the drive structure to
identify information sources. As a rule of thumb, look
down three layers. People don’t typically want to click
through more than three layers of detail.
Tell participants that they will have homework. This
exercise is really just a part of a broader Information
Governance initiative.
28. Classification is hard. It is an exercise in logic, philosophy, and – occasionally – faith, since it
deals with universalities. Thomas Jefferson, for example, ordered the books in Monticello
according to Francis Bacon’s Faculties of the Mind: Memory (History), Reason (Philosophy),
and Imagination (Fine Arts). Melvil Dewey borrowed this structure – and indirectly borrowed
from Hegel – to create the popular Dewey Decimal System.
The best approach for IT comes from S.R. Ranganathan. He was inspired by both Meccano
and Hindu mysticism to create a scheme centered on five key facets:
How do we actually classify stuff?
But what actually belongs in the taxonomy?
Facet Description Examples
Personality The core subject of the work. Ignore it! It is too difficult to operationalize in the typical enterprise.
Matter Objects, typically inanimate. Desktops; Servers; Storage; Buildings.
Energy
Actions and Interactions. It can
also describe specific processes.
Customer service; Quality control; Manufacturing; Research;
Accounts payable.
Space
Locations, departments, or
similar descriptors.
Human resources; APAC; Guatemala; Building A2.
Time Hour, period, or duration Morning; Q3; Financial close; Winter; 2011.
29. Managed metadata, taxonomies, ontologies, thesauri, etc. all have
subtle differences but share some core elements:
• Authority file. Names that can be used. Descriptors and names
are listed in authority files.
• Broader term. Terms to which other terms are subordinate.
• Category. Grouping of terms which are associated, either
semantically or statistically.
• Related term. Terms which are similar to one another and often
exist in the same category.
• Modifier. A term that narrows the focus of another term. For
example, the use of “Character” in the compound term “Stanton,
Archibald – Character”.
• Narrower term. A term that is subordinate to another in a
category.
• Preferred term. The term that is used for indexing among a
group of related terms.
• Scope note. Direction on how to apply a term explaining usage
and coverage.
The controlled vocabulary is the basis of taxonomy and findability
It can get complicated, but focus on the core elements.
Controlled
Vocabulary
Thesaurus
Ontology
Controlled
Vocabulary
30. Start to build a taxonomy by defining key user groups as personas
Role:
What do they do?
What are their key challenges?
E. What are their activities?
Se. For what do they search?
M. What document types do they use?
S. Where do they work?
T. When do they work?
Code
Identify key
challenges with
information use or
access.
Now that we have
some of this
information use it to
jump start the
taxonomy process
31. Hospital Persona(s) - Research Students
• What do they do?
• Support principal investigators
• Gain research investigators
• volunteers
• What are their activities?
• Reviewing Health records
• Analyze data
• Present results (mainly internal)
• REB (research ethics board) research proposal
• What are their challenges
• No system control improving
• Lack of knowledge on proper systems
• Don’t’ know policies, procedures, or tech
• Overreliance on PI’s data set
• Unmanaged devices
• Activities
• Building a Proposal (REB)
• Primary Data analysis
• Satisfaction Studies
32. Hospital Persona(s) - Clinical Researchers / Doctors / Educators
• What do they do:
• Research
• Admin functions
• Education
• Committee work
• Tertiary care
• Challenges:
• Don’t like controls
• Don’t like to wait
• Move around a lot (many offices and locations)
• Scheduling across locations
• Activities
• Seeing Patients
• Supervising Trainees
• Committee Work
• Budgeting for Grants
• REB submissions
• Handover charts
34. Potential taxonomy descriptors -Research Student (RS)
• Document types (M category)
• Clinical data (in Excel)
• EPC report
• Paper chart
• Proposal templates
• Standard guidelines
• PPT presentations
• Webpages
• Web-based surveys (Red Cap)
• HR forms
• Reporting document (evaluation form)
• Directory
• Email
• Map of hospital
• Activities (E category)
• Reviewing Health records
• Primary analyze data
• Present results - internal
• Present results - external
• Build Proposals
• Scheduling
• Space (S category)
• Department
• Pillars
• Program
• Project
• Group
• Res program
• Physical location
• On-site
• Off-site
• Building names
• Remote locations
• Time (T category)
• Academic year
• Calendar year
• Summer
• Semester
• REB Proposal phases
35. Facilitator Insights
Don’t just throw the cards into a box. People will lose
track of what they have actually already produced. And
it always looks good to line stuff up on the boardroom
table.
What it looks like:
Don’t forget to append codes for both the persona and
the relevant facet. You will need the persona code to
build out formal personas and you need the facet code
to actually sort these things.
Try to get through between five and eight roles. After
eight roles you typically won’t be finding anything new.
Remember that part of the governance process is
actually refining the taxonomy.
Refer back to what you’ve already done to bootstrap the
process. Go back to activities where you have identified
roles, document types, or key activities and use those to
guide the conversation.
36. Potential taxonomy descriptors Doctor/Researcher Part 1
• Document types (M category)
• Hand over
• Patient care plans
• Policy and Procedure documents
• In-bound referral documents (ARM system)
• MD Centre – dictation of notes (transcript)
• Video and Pictures
• PPT presentations – external/internal
• HR documents
• Credentialing
• Email
• Calendars
• Billing documents and forms
• Project documents (committee documents)
• Academic outputs
• Finance reports (budgeting)
• KidCare
• Fellowship and resident resumes (recruiting docs)
• Academic Track
• Activities (E category)
• Scheduling Patient Care
• Seeing Patients
• Supervising Trainees
• Committee Work
• Budgeting for Grants
• REB submissions
• Handover charts
• Presentation of Patients
• Conferences
• Huddles
• Classroom teaching
• Patient Care
• Clinical documentation
• Billing Reports
37. Potential taxonomy descriptors Doctor/Researcher Part 2
• Space (S category)
• Clinics
• Operating room (OR)
• Department
• Pillars
• University locations (UofT)
• Off-site
• Hospitals
• Remote
• Time (T category)
• Clinic hours
• On-call
• Academic year
• Fiscal year
• Conference year
• Grant schedules
38. What types of descriptors account for risk classification
Privacy Security Compliance Records
- PHI Guidelines - PHIPA - Short retention
- Patient record
39. Our five minute sorting exercise yielded potential categories and
some detailed descriptors.
Dept budget
Billing
Budget
related
External
presentation
Remote
REB
proposal
Surveys
Research
activities
Location
MD
credentials
Academic
track
Daily
activities
Calendar
Hand-over
Clinical
activities
Potential
taxonomy
descriptors
(MEST)
These could
be the drop-
down terms
Wide
category
Remember this initial goal is about gaining
control over documents. When combined with
the Folksonomy tools in ECM 2013 this can be
a powerful set of descriptors
These are probably too specific.
Additional non-medical personas
will generalize these further to
make them usable.
40. Facilitator Insights
It might be easier to send people out for tea or lunch
and put together a rough cut at the organizational
structure. Then, when the participants return to the
room, give participants one particular bundle of cards –
a complete facet – and ask them to refine the sorting
and prioritization.
What it looks like:
If the group is engaged, take the opportunity to ask for
additional cards that might be missing or any other
feedback the participants might have.
This activity is tough. People are generally pretty
engaged in initially creating the cards but sorting them is
a bit of a hassle. Some will elect to use the initial sort as
the basis for the codified taxonomy and to address
shortcomings as part of the governance process.
41. Start your taxonomy based on the vocabulary that already exists
Pillar
Depart.
Budget
related
Location
Research
activities
Daily
activities
Clinical
activities
Folks-
onomy
Intranet Workshop
Other
sources
NICU?
Kidcare
Remember our goal at the
beginning is to have enough
taxonomy to confidently allow
users to add content to ECM for
the purposes that the
organization has defined. The
taxonomy WILL need to updated
through a controlled process.
The key with folksonomy is a clear
process for evaluating the usage.
The goal should be to have these
integrated into the controlled
vocabulary to replace unused
terms rather than create a shadow
metadata system
42. 2.2.3 Document facets
- Document Type
- Activity
- Location
- Phase
- Privacy
- Retention
Actually documenting the
facets and taxonomy is
going to be homework for
the participants.
43. Increase ECM Adoption through good architecture
Getting Started: Information
Governance basics
Information Organization
Increase ECM Adoption through
good architecture
Requirements gathering and Solution
prototyping
Putting it all together
44. Section Removed
These topics were discussed
• Define the ECM problem
• Breakdown user into their activities
• Map the information that users need
• Identify the source of end-user frustration
• Implement the taxonomy
• Govern the taxonomy
45. Requirements gathering and Solution prototyping
Getting Started: Information
Governance basics
Information Organization
Increase ECM Adoption through good
architecture
Requirements gathering and
Solution prototyping
Putting it all together
46. Section Removed
These topics were discussed
• Matching problems to solutions
• Defining the requirements for that solution
• Use the website tools that users want
• Define ECM wide deficits
• Build a wireframe prototype
47. Putting it all together
Getting Started: Information
Governance basics
Information Organization
Increase ECM Adoption through good
architecture
Requirements gathering and Solution
prototyping
Putting it all together