Learn how to improve performance, efficiency and information governance of SharePoint through the use of an archiving solution such as EMC SourceOne for Microsoft SharePoint. http://www.bishopit.com
The document discusses lessons in information governance from a presentation given by John Newton, founder and CTO of Alfresco. Some key lessons are that closed systems are not always the most effective, strong governance is needed to make open collaboration work, zero tolerance policies do not work with users, effective governance should be invisible to users, and governance does not stop at organizational boundaries. Alfresco provides an open source content management platform and has over 180,000 community members, 200 partners, and manages over 10 billion documents for 1,300 customers in 180 countries.
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
The document discusses best practices for information governance, including how it can help organizations reduce costs and increase customer satisfaction. It provides an overview of SAP and Capgemini's information governance best practices and addresses common questions clients have around data issues. Information governance is important because data is a key organizational asset, and governance helps ensure consistent, accurate data is available for reporting and decision making. Lack of governance can lead to issues like multiple versions of the truth and inefficient processes. The benefits of effective information governance include reduced costs through improved data management, better decisions from leveraging high-quality data, and increased customer satisfaction.
Mike2.0 Information Governance Overviewsean.mcclowry
This document introduces the MIKE2.0 methodology for information governance. MIKE2.0 is an open source methodology that provides a comprehensive framework for enterprise information management. It addresses the growing complexity of managing exponential data growth across increasingly federated organizations. The methodology promotes standards and transparency to improve data quality and business insights while increasing efficiency.
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Nick Inglis
The document provides an overview of how to start an information governance program. It discusses defining information governance and exploring the current state of information management. It recommends starting with a meaningful problem, doing a quick win project to build support, and leveraging a model to build out the program in sections. The document also compares the AHIMA and Information Coalition information governance models and emphasizes understanding an organization's past information management practices to help build its future practices.
After knowledge management initiative has been implemented, it can become outdated and underutilized. It is important for organizations to move forward while being aware of emerging trends, methods, and techniques in knowledge management.
This presentation describes current trends and technology in knowledge management. It reviews best practices in knowledge management once it has been implemented as well as analytics and reporting methodology and tools. Special focus is on Information governance, risk management, and compliance.
Information Governance for Smarter Government Strategy and SolutionsIBMGovernmentCA
The document discusses the importance of information governance for government organizations. It provides examples of how poor data quality can lead to inaccurate reporting and improper allocation of funds. The document advocates establishing an information governance program to define policies and processes for data management. An effective program requires executive sponsorship, clear roles and responsibilities, regular governance meetings, and metrics to measure progress in improving data quality.
1. The document discusses various categories and technologies for knowledge management (KM) as identified by Liao in a 2003 literature review, including KM frameworks, knowledge-based systems, data mining, information and communication technologies, expert systems, database technologies, and modeling.
2. It also discusses main functions of KM aided by information technology, including knowledge creation, accumulation, and sharing.
3. Key challenges discussed for adoption of KM technologies include the need for organizational culture and mindset changes, as well as ensuring meaningful knowledge sharing and distribution within appropriate contexts.
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
The Moray Council, una delle 32 autorità locali scozzesi ad elezione diretta, che distribuisce servizi civici (cultura, istruzione, salute, etc...) ed amministrativi ad una popolazione di 88.000 cittadini, ha scelto di affidarsi a TITUS Metadata Security for SharePoint per ottimizzare la gestione di documenti e permessi all'interno della propria infrastruttura Office proteggendo le informazioni sensibili.
L’azienda canadese TITUS (www.titus.com) è specializzata in Data Loss Prevention (DLP).
In particolare la suite di prodotti software TITUS applica un sistema di CLASSIFICAZIONE con metadati a documenti ed email, evitando che distrazioni ed errori umani causino la perdita involontaria di informazioni riservate o strategiche, salvaguardando gli asset aziendali.
TITUS è rivenduto in Italia da Clever Consulting, che offre la propria consulenza specializzata ed un processo di installazione e supporto totalmente personalizzato secondo le esigenze del cliente.
http://bitly.com/CleverTITUS
The document discusses lessons in information governance from a presentation given by John Newton, founder and CTO of Alfresco. Some key lessons are that closed systems are not always the most effective, strong governance is needed to make open collaboration work, zero tolerance policies do not work with users, effective governance should be invisible to users, and governance does not stop at organizational boundaries. Alfresco provides an open source content management platform and has over 180,000 community members, 200 partners, and manages over 10 billion documents for 1,300 customers in 180 countries.
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
The document discusses best practices for information governance, including how it can help organizations reduce costs and increase customer satisfaction. It provides an overview of SAP and Capgemini's information governance best practices and addresses common questions clients have around data issues. Information governance is important because data is a key organizational asset, and governance helps ensure consistent, accurate data is available for reporting and decision making. Lack of governance can lead to issues like multiple versions of the truth and inefficient processes. The benefits of effective information governance include reduced costs through improved data management, better decisions from leveraging high-quality data, and increased customer satisfaction.
Mike2.0 Information Governance Overviewsean.mcclowry
This document introduces the MIKE2.0 methodology for information governance. MIKE2.0 is an open source methodology that provides a comprehensive framework for enterprise information management. It addresses the growing complexity of managing exponential data growth across increasingly federated organizations. The methodology promotes standards and transparency to improve data quality and business insights while increasing efficiency.
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Nick Inglis
The document provides an overview of how to start an information governance program. It discusses defining information governance and exploring the current state of information management. It recommends starting with a meaningful problem, doing a quick win project to build support, and leveraging a model to build out the program in sections. The document also compares the AHIMA and Information Coalition information governance models and emphasizes understanding an organization's past information management practices to help build its future practices.
After knowledge management initiative has been implemented, it can become outdated and underutilized. It is important for organizations to move forward while being aware of emerging trends, methods, and techniques in knowledge management.
This presentation describes current trends and technology in knowledge management. It reviews best practices in knowledge management once it has been implemented as well as analytics and reporting methodology and tools. Special focus is on Information governance, risk management, and compliance.
Information Governance for Smarter Government Strategy and SolutionsIBMGovernmentCA
The document discusses the importance of information governance for government organizations. It provides examples of how poor data quality can lead to inaccurate reporting and improper allocation of funds. The document advocates establishing an information governance program to define policies and processes for data management. An effective program requires executive sponsorship, clear roles and responsibilities, regular governance meetings, and metrics to measure progress in improving data quality.
1. The document discusses various categories and technologies for knowledge management (KM) as identified by Liao in a 2003 literature review, including KM frameworks, knowledge-based systems, data mining, information and communication technologies, expert systems, database technologies, and modeling.
2. It also discusses main functions of KM aided by information technology, including knowledge creation, accumulation, and sharing.
3. Key challenges discussed for adoption of KM technologies include the need for organizational culture and mindset changes, as well as ensuring meaningful knowledge sharing and distribution within appropriate contexts.
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
The Moray Council, una delle 32 autorità locali scozzesi ad elezione diretta, che distribuisce servizi civici (cultura, istruzione, salute, etc...) ed amministrativi ad una popolazione di 88.000 cittadini, ha scelto di affidarsi a TITUS Metadata Security for SharePoint per ottimizzare la gestione di documenti e permessi all'interno della propria infrastruttura Office proteggendo le informazioni sensibili.
L’azienda canadese TITUS (www.titus.com) è specializzata in Data Loss Prevention (DLP).
In particolare la suite di prodotti software TITUS applica un sistema di CLASSIFICAZIONE con metadati a documenti ed email, evitando che distrazioni ed errori umani causino la perdita involontaria di informazioni riservate o strategiche, salvaguardando gli asset aziendali.
TITUS è rivenduto in Italia da Clever Consulting, che offre la propria consulenza specializzata ed un processo di installazione e supporto totalmente personalizzato secondo le esigenze del cliente.
http://bitly.com/CleverTITUS
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
The document discusses principles of holistic information governance. It outlines 10 principles: 1) information is an asset, 2) information has purpose, 3) information has sources and targets, 4) information has deadlines, 5) information has consumers, 6) information carries obligations, 7) information carries risks, 8) information has many forms, 9) information isn't immortal, and 10) information demands accountability. The presentation provides explanations and examples for each principle and emphasizes that information governance is important for businesses and allows organizations to get work done effectively.
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
IBM automation systems, such as e-discovery and auto-classification, help financial firms achieve transparency and meet compliance requirements while maximizing the value of your existing content management architecture.
The document discusses information governance, including its definition, why it is important, who is responsible, and how to implement it. Specifically, it notes that information governance aims to manage information at an enterprise level to support regulatory, risk, and operational requirements. It discusses building a valued information asset, reducing costs and increasing revenue, and optimizing resource use as benefits. Ownership resides with the business, with a governance unit providing authority and control. The "how" section outlines scoping information governance, moving from a current fragmented state to a future state of alignment. It provides examples of projects, maturity models, and next steps to implement information governance.
Planning Information Governance and Litigation ReadinessRich Medina
The document discusses planning for information governance over the next 3 years. It covers:
1. Introduction and background issues related to information governance.
2. A program framework, roadmap, and recommendations for developing an information governance program, including categories like governance, information organization, processes, architecture and technology, and communications.
3. An example problem of defensible disposition and how to approach it.
4. Next steps in planning for information governance for the years ahead.
Establishing an information governance programLouise Spiteri
The document provides an overview of information governance, including definitions, principles, models, and functions. It defines information governance as the specification of decision rights and accountability for information valuation, creation, storage, use, archiving, and deletion. The key principles of information governance outlined are accountability, transparency, integrity, protection, compliance, availability, retention, and disposition. The Information Governance Reference Model is presented as a framework bringing together business, IT, legal, risk, and other functions. The Generally Accepted Recordkeeping Principles are also summarized as a standard for maintaining business records and information.
Knowledge management systems in electronic business ahmed adelAhmed Adel
This document discusses knowledge management systems in electronic business and management. It begins with an introduction that defines knowledge management and explains why organizations need knowledge management. It then outlines the key components of a knowledge management process and some of the biggest challenges to managing knowledge in organizations. The document also discusses how knowledge management relates to e-business development and provides a real-world example of knowledge management. It concludes that developing e-business systems based on knowledge management processes can help organizations more effectively achieve their goals through the use of information technology.
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
An information governance (IG) program specifies decision rights and accountability for managing an organization's information assets. It helps organizations effectively use information to achieve goals while mitigating risks. Key benefits of IG include regulatory compliance, security, efficiency gains, and better decision making. Getting an IG program started requires identifying stakeholders, building support from champions, developing practical technological and process components, and managing change. Long term success requires high-level buy-in, effective internal communication, ensuring the program is workable in practice, managing conflicts, and sustained commitment over time.
Paula Smith is a principal consultant for information management at Optimation. The document discusses how organizations can better leverage their existing information assets by implementing effective information management practices. It notes that unstructured information like documents, emails and social media accounts for 60-80% of organizational information but is often untapped. The document advocates for a holistic information management framework that includes governance, taxonomy, enterprise search, and content intelligence tools to unlock more value from information assets.
Enterprise Information Management: Strategy, Best Practices & Technologies on...FindWhitePapers
Authored by Frank Dravis, Baseline Consulting, this paper discusses: (1) EIM strategy development and (2) enabling information management technology. Understanding these two areas is crucial to starting, planning and executing an EIM initiative.
This chapter discusses how knowledge management systems (KMS) support knowledge management through various technologies. It describes how KMS enable knowledge capture and exchange, as well as the acquisition, documentation, transfer, creation and application of knowledge. The chapter then explains the key components of a KMS, including business process management, content management, web content management, and knowledge applications management. It emphasizes that a KMS is made up of interconnected subsystems that can operate independently but also contribute to the larger, more comprehensive system. The chapter concludes by noting that KMS development requires justification of need, identification of requirements, selection of options, implementation, and evaluation of adoption and acceptance.
This document discusses information management. It defines information management as the management of organizational processes and systems that acquire, create, organize, distribute, and use information. It describes information management as involving six key activities: identifying information needs, acquiring/creating information, analyzing/interpreting information, organizing/storing information, accessing/disseminating information, and using information. The document also outlines some tools for information management, such as standards, systems analysis, and lists five critical tools for an effective information management solution including an information governance framework, configurable taxonomy, unified visibility for records/assets, full-text search and advanced search functions, and disposition alerts/dashboard.
Knowledge Management, Business Intelligence & Business Analytics - Managemen...FaHaD .H. NooR
This document discusses knowledge management, business intelligence, and business analytics. It defines each term and explains their relationships. Knowledge management involves processes to generate, capture, codify, and transfer knowledge across an organization. Business intelligence uses data to understand and analyze business performance using technologies like reporting and dashboards. Business analytics refers specifically to using quantitative models and fact-based management to drive decisions, and is considered a subset of business intelligence. The document also discusses the differences between tacit and explicit knowledge, and how knowledge management can provide value to organizations in areas like sharing best practices, managing globalization, rapid change, downsizing, and gaining competitive advantage.
The Effective eDocument Retention Program - Policies, Processes and SolutionsLedjit
The document discusses the need for effective electronic document (eDocument) retention programs in organizations. It notes that changes to legal discovery rules have prompted companies to rethink their information management strategies. Key drivers for eDocument retention programs include regulatory compliance, industry standards, and mitigating business risks. The challenges include a lack of clear ownership, the perception that storage is cheap so everything can be kept, and that retention is not a high priority initiative. Effective programs require structuring information as assets, creating a records management framework with policies on retention, legal holds, and destruction. Questions are welcomed.
Top 10 guidelines for deploying modern data architecture for the data driven ...LindaWatson19
Enterprises are facing a new revolution, powered by the rapid adoption of data analytics with modern technologies like machine learning and artificial intelligence (A).
Unstructured and unmanaged "dark data" occupies costly storage space and carries security risks for many organizations. Recommind's Axcelerate Data Management solution uses machine learning to automatically categorize this dark data based on its content and meaning. This helps organizations understand what data should be kept, migrated to different storage, or can be deleted, reducing information risks and storage costs. The solution leverages existing taxonomies and creates new ones, and its proven predictive governance processes provide a defensible method for data disposition.
The document discusses how SharePoint can be used as a catalyst for information governance by providing visibility into content, managing risk and compliance, and simplifying eDiscovery efforts. It notes that over 60% of organizations are using or planning to use SharePoint, often for storing large amounts of unstructured content. Implementing information governance solutions can help organizations address the pain points of compliance, litigation readiness, and managing information growth within SharePoint.
Art, drama, and music teachers:
- Explain artistic techniques and evaluate student work
- Prepare course materials and lessons to instruct students
- Facilitate classroom discussions and prepare students for performances or assessments
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
The document discusses principles of holistic information governance. It outlines 10 principles: 1) information is an asset, 2) information has purpose, 3) information has sources and targets, 4) information has deadlines, 5) information has consumers, 6) information carries obligations, 7) information carries risks, 8) information has many forms, 9) information isn't immortal, and 10) information demands accountability. The presentation provides explanations and examples for each principle and emphasizes that information governance is important for businesses and allows organizations to get work done effectively.
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
IBM automation systems, such as e-discovery and auto-classification, help financial firms achieve transparency and meet compliance requirements while maximizing the value of your existing content management architecture.
The document discusses information governance, including its definition, why it is important, who is responsible, and how to implement it. Specifically, it notes that information governance aims to manage information at an enterprise level to support regulatory, risk, and operational requirements. It discusses building a valued information asset, reducing costs and increasing revenue, and optimizing resource use as benefits. Ownership resides with the business, with a governance unit providing authority and control. The "how" section outlines scoping information governance, moving from a current fragmented state to a future state of alignment. It provides examples of projects, maturity models, and next steps to implement information governance.
Planning Information Governance and Litigation ReadinessRich Medina
The document discusses planning for information governance over the next 3 years. It covers:
1. Introduction and background issues related to information governance.
2. A program framework, roadmap, and recommendations for developing an information governance program, including categories like governance, information organization, processes, architecture and technology, and communications.
3. An example problem of defensible disposition and how to approach it.
4. Next steps in planning for information governance for the years ahead.
Establishing an information governance programLouise Spiteri
The document provides an overview of information governance, including definitions, principles, models, and functions. It defines information governance as the specification of decision rights and accountability for information valuation, creation, storage, use, archiving, and deletion. The key principles of information governance outlined are accountability, transparency, integrity, protection, compliance, availability, retention, and disposition. The Information Governance Reference Model is presented as a framework bringing together business, IT, legal, risk, and other functions. The Generally Accepted Recordkeeping Principles are also summarized as a standard for maintaining business records and information.
Knowledge management systems in electronic business ahmed adelAhmed Adel
This document discusses knowledge management systems in electronic business and management. It begins with an introduction that defines knowledge management and explains why organizations need knowledge management. It then outlines the key components of a knowledge management process and some of the biggest challenges to managing knowledge in organizations. The document also discusses how knowledge management relates to e-business development and provides a real-world example of knowledge management. It concludes that developing e-business systems based on knowledge management processes can help organizations more effectively achieve their goals through the use of information technology.
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
An information governance (IG) program specifies decision rights and accountability for managing an organization's information assets. It helps organizations effectively use information to achieve goals while mitigating risks. Key benefits of IG include regulatory compliance, security, efficiency gains, and better decision making. Getting an IG program started requires identifying stakeholders, building support from champions, developing practical technological and process components, and managing change. Long term success requires high-level buy-in, effective internal communication, ensuring the program is workable in practice, managing conflicts, and sustained commitment over time.
Paula Smith is a principal consultant for information management at Optimation. The document discusses how organizations can better leverage their existing information assets by implementing effective information management practices. It notes that unstructured information like documents, emails and social media accounts for 60-80% of organizational information but is often untapped. The document advocates for a holistic information management framework that includes governance, taxonomy, enterprise search, and content intelligence tools to unlock more value from information assets.
Enterprise Information Management: Strategy, Best Practices & Technologies on...FindWhitePapers
Authored by Frank Dravis, Baseline Consulting, this paper discusses: (1) EIM strategy development and (2) enabling information management technology. Understanding these two areas is crucial to starting, planning and executing an EIM initiative.
This chapter discusses how knowledge management systems (KMS) support knowledge management through various technologies. It describes how KMS enable knowledge capture and exchange, as well as the acquisition, documentation, transfer, creation and application of knowledge. The chapter then explains the key components of a KMS, including business process management, content management, web content management, and knowledge applications management. It emphasizes that a KMS is made up of interconnected subsystems that can operate independently but also contribute to the larger, more comprehensive system. The chapter concludes by noting that KMS development requires justification of need, identification of requirements, selection of options, implementation, and evaluation of adoption and acceptance.
This document discusses information management. It defines information management as the management of organizational processes and systems that acquire, create, organize, distribute, and use information. It describes information management as involving six key activities: identifying information needs, acquiring/creating information, analyzing/interpreting information, organizing/storing information, accessing/disseminating information, and using information. The document also outlines some tools for information management, such as standards, systems analysis, and lists five critical tools for an effective information management solution including an information governance framework, configurable taxonomy, unified visibility for records/assets, full-text search and advanced search functions, and disposition alerts/dashboard.
Knowledge Management, Business Intelligence & Business Analytics - Managemen...FaHaD .H. NooR
This document discusses knowledge management, business intelligence, and business analytics. It defines each term and explains their relationships. Knowledge management involves processes to generate, capture, codify, and transfer knowledge across an organization. Business intelligence uses data to understand and analyze business performance using technologies like reporting and dashboards. Business analytics refers specifically to using quantitative models and fact-based management to drive decisions, and is considered a subset of business intelligence. The document also discusses the differences between tacit and explicit knowledge, and how knowledge management can provide value to organizations in areas like sharing best practices, managing globalization, rapid change, downsizing, and gaining competitive advantage.
The Effective eDocument Retention Program - Policies, Processes and SolutionsLedjit
The document discusses the need for effective electronic document (eDocument) retention programs in organizations. It notes that changes to legal discovery rules have prompted companies to rethink their information management strategies. Key drivers for eDocument retention programs include regulatory compliance, industry standards, and mitigating business risks. The challenges include a lack of clear ownership, the perception that storage is cheap so everything can be kept, and that retention is not a high priority initiative. Effective programs require structuring information as assets, creating a records management framework with policies on retention, legal holds, and destruction. Questions are welcomed.
Top 10 guidelines for deploying modern data architecture for the data driven ...LindaWatson19
Enterprises are facing a new revolution, powered by the rapid adoption of data analytics with modern technologies like machine learning and artificial intelligence (A).
Unstructured and unmanaged "dark data" occupies costly storage space and carries security risks for many organizations. Recommind's Axcelerate Data Management solution uses machine learning to automatically categorize this dark data based on its content and meaning. This helps organizations understand what data should be kept, migrated to different storage, or can be deleted, reducing information risks and storage costs. The solution leverages existing taxonomies and creates new ones, and its proven predictive governance processes provide a defensible method for data disposition.
The document discusses how SharePoint can be used as a catalyst for information governance by providing visibility into content, managing risk and compliance, and simplifying eDiscovery efforts. It notes that over 60% of organizations are using or planning to use SharePoint, often for storing large amounts of unstructured content. Implementing information governance solutions can help organizations address the pain points of compliance, litigation readiness, and managing information growth within SharePoint.
Art, drama, and music teachers:
- Explain artistic techniques and evaluate student work
- Prepare course materials and lessons to instruct students
- Facilitate classroom discussions and prepare students for performances or assessments
This document provides a summary of research on listening comprehension over the past 30 years. It discusses how listening comprehension was initially seen as a passive skill but is now understood to be an active, complex process. The document outlines key findings from research, including how familiarity with content, speech modifications, and strategy training can facilitate listening comprehension. However, it notes that more work still needs to be done to better understand listening comprehension and improve its teaching.
This document outlines the key responsibilities of an art, drama, or music teacher. They include explaining artistic techniques, evaluating student work, leading classroom discussions, preparing course materials and lesson plans, delivering lectures, and preparing students for performances and assessments. Teachers also plan, evaluate, and revise their curriculum.
The document discusses moving content management systems to the cloud using Ektron Cloud Manager. It provides an overview of cloud computing concepts like cloud service models and benefits. It analyzes the total cost of ownership between on-premise versus cloud deployment and finds cloud to be significantly cheaper. Ektron Cloud Manager allows simple and flexible provisioning of sites and assets on multiple cloud platforms like Azure and AWS. The presentation outlines the journey to the cloud from initial hosting to fully migrating a site. It demonstrates how a site can be provisioned on Azure in under an hour using Ektron Cloud Manager.
Art, drama, and music teachers:
- Explain artistic techniques and evaluate student work
- Lead classroom discussions and prepare course materials
- Prepare students for performances, exams, and assessments
Photographers:
- Take photographs of individuals, families, and events in studios or on location
- Adjust camera settings based on lighting, motion, and other factors
- Determine compositions and lighting to achieve desired visual effects
- Edit photographs on computers for storage and transmission
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Universal design aims to construct materials to meet the needs of diverse individuals and groups. The process involves identifying needs, considering intended users, defining parameters, applying parameters, tailoring for incomplete fits, and assessing effectiveness. Procedural application includes setting goals, considering materials, determining methods, and assessing the design. The goal of universal design is for all students to achieve the same educational outcomes despite individual differences.
This document summarizes Steven Brown's book "Listening Myths: Applying Second Language Research to Classroom Teaching". It begins by discussing how listening was traditionally taught similarly to reading, despite key differences in the skills. It then reviews research showing that listening and reading are distinct skills, with listening requiring real-time comprehension of spoken language features like reductions and hesitations. While first language abilities in reading can transfer to second language reading, similar abilities in listening only transfer once a minimum language proficiency is reached. The document compares studies that found readers better at recalling details while listeners performed better on main ideas.
Este documento presenta el manual de descripción de puestos y funciones del Fondo de Conservación Vial de El Salvador. Describe 20 puestos diferentes, incluyendo la Dirección Ejecutiva, Auditoría Interna, Asesoría Legal, Gerencia Técnica, Contabilidad Institucional, Tesorería, y puestos de apoyo. Para cada puesto, provee información sobre su dependencia jerárquica, funciones clave, y perfil requerido. El objetivo es definir claramente las responsabilidades de cada rol dentro de la organización.
PEFCU was facing challenges with managing its 250 employee email mailboxes, including inefficient searches for HR investigations and legal requests. This caused network performance issues and lack of an archiving system for future compliance. PEFCU implemented EMC SourceOne Email Management and EMC storage solutions. This centralized email archiving across EMC hardware reduced local storage usage and improved network performance while automating retention policies. It also enabled fast, efficient searches of past employee emails to support HR investigations in minutes rather than weeks. The new system prepared PEFCU for future compliance requirements.
Hypoglycemia, or low blood sugar, occurs when a person's blood glucose levels drop below normal. It can be caused by issues like taking too much insulin, lack of food, excessive alcohol, or tumors in the pancreas. Mild symptoms include trembling, sweating, and irritability, while more severe symptoms can include confusion, irrational behavior, seizures, or loss of consciousness. Treatment depends on the severity, ranging from consuming sugar to IV glucose administration. Regular monitoring of blood sugar levels, eating regularly, and being prepared with fast-acting sugars can help prevent hypoglycemia.
This document provides an overview of various formatting and editing tools in Microsoft Word 2007. It contains over 50 sections that describe how to use tools such as inserting headers and footers, setting page numbers, modifying styles, inserting pictures and tables, tracking changes, adding comments, sorting data, and comparing documents. The sections provide step-by-step instructions on accessing each tool using Word's tabs and groups. The document serves as a reference guide for learning and mastering Word's formatting and editing features.
The document discusses how sharing economies create value in unexpected ways. It notes that open source software and user-generated content create tremendous value, even though much of that value is not captured by traditional economic models. It provides examples of how open source underlies major industries like web hosting and powers sites that generate billions in economic activity. However, this value creation is like energy from a clothesline - it's not fully counted. The document advocates for recognizing these "clothesline paradox" economies and ensuring value creators are appropriately compensated.
This document outlines the objectives and assessments/interventions for the primary survey in emergency medical care. The objectives are to identify life-threatening conditions and interventions during the initial assessment. The primary survey focuses on the ABCDE approach - Airway, Breathing, Circulation, Disability, and Exposure. For each component, assessments are listed along with corresponding interventions to address any life-threatening issues identified.
Konsep manusia dan kebutuhan dasarnya dibahas dalam dokumen tersebut. Konsep manusia dibagi menjadi manusia sebagai makhluk holistik dan sistem, yang mencakup aspek biologis, psikologis, sosial dan spiritual. Kebutuhan dasar manusia menurut Abraham Maslow terdiri atas kebutuhan fisiologis, keamanan, cinta, harga diri, dan aktualisasi diri. Faktor yang mempengaruhi kebutuhan dasar antara lain
Hypoglycemia, or low blood sugar, occurs when a person's blood glucose levels drop below normal. It can be caused by issues like taking too much insulin, lack of food, excessive alcohol, or tumors in the pancreas. Mild symptoms include trembling, sweating, and irritability, while more severe symptoms can include confusion, irrational behavior, seizures, or loss of consciousness. Treatment depends on the severity, ranging from consuming sugar to IV glucose administration. Regular monitoring of blood sugar levels, eating habits, and exercise routines can help prevent hypoglycemic episodes.
A key component of your SharePoint governance activities should be defining and, as much as possible, automating your metrics and reporting. This presentation walks through what is available out of the box in SharePoint, and areas you may consider for extending your reporting efforts.
This document summarizes a presentation about crafting an effective information strategy and moving to the cloud. It discusses aligning the strategy to business drivers, supporting initiatives based on value, publishing information clearly and often, iterating strategies in small projects, relating information to infrastructure, and evaluating and adapting strategies. The presentation outlines challenges of ineffective strategies and benefits of effective ones. It provides recommendations for improving search and examples of connecting and standardizing information across repositories.
So you've heard about "Governance" from all angles in the SharePoint community-the fact that you need "People" to define "Policies", but what Processes are actually required to bring this to fruition? This session will discuss how to bring these three P's together by enforcing established Policies through Processes built using out-of-the-box SharePoint by the People (SharePoint IT Administrators and Site Owners). The session will cover what is feasible using native SharePoint 2010 functionality, and what to watch for to ensure you are planning for common challenges customers face.
This document summarizes Jeff Fried's presentation on developing an effective information strategy with Office 365 in mind. The presentation outlines a framework called ASPIRE that involves aligning the information strategy to business drivers, supporting initiatives based on value, publishing the strategy clearly and often, iterating the strategy in small projects, relating it to existing infrastructure, and evaluating/adapting it over time. It emphasizes connecting information across systems to provide a unified view and standardizing metadata to improve findability. The document also notes challenges of ineffective information strategies and benefits of aligning information management with business goals.
This document summarizes Jeff Fried's presentation on developing an effective information strategy with Office 365 in mind. The presentation outlines a framework called ASPIRE that involves aligning the information strategy to business drivers, supporting initiatives based on value, publishing the strategy clearly and often, iterating the strategy in small projects, relating it to existing infrastructure, and evaluating/adapting it over time. It emphasizes connecting information across systems to provide a unified view and standardizing metadata to improve findability. The document also notes challenges of ineffective information strategies and benefits of aligning information with business needs.
Why Metadata Matters in SharePoint Search and Information Governance WebinarConcept Searching, Inc
This document summarizes a presentation about why metadata matters for SharePoint search and information governance. It introduces the two speakers, Cem Aykan from Microsoft and Don Miller from Concept Searching. The agenda covers Microsoft's roadmap for SharePoint search and Concept Searching's solutions for information governance. The presentation then discusses enterprise search, building an information governance concept index, and how to achieve SharePoint information governance through automated metadata generation.
This document provides an overview of a session on SharePoint governance and managing content sprawl. It includes an agenda for the session, introductions of speakers and their organizations, and discussions of key topics like what governance is, the benefits of governance, roles and responsibilities, policies and procedures, and best practices. It also includes a section on information, records, and knowledge management in the US Air Force that discusses challenges, compliance requirements, and potential solutions using semantic metadata tagging and automated classification.
Most organizations fail to adequately plan for their SharePoint deployments -- they do not understand their business requirements, nor do they assess the risks (or full benefits) of what is being deployed. This session outlines some risk management best practices as it applies to SharePoint governance planning.
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...Christian Buckley
Redmond Magazine webinar presented on July 9, 2014 on the topic of SharePoint security and governance, with the help of Shaun Nichols (@sharepointgiant), Lead Solutions Engineer at Metalogix.
Presentation of Software product by Anatoliy Arkhipov
Business Development Representative, Russia & CIS
Global trends and big data are changing the ECM landscape
What’s Content Manager
Why do organizations need to use Content Manager
Target organizations
SME- Developing an information governance strategy 2016 Hybrid Cloud
This white paper discusses the variety of challenges focused on information governance and also offers a variety of recommendations about what organizations can do to improve their information governance practices. The paper also provides a brief overview of its sponsor – StorageMadeEasy – and the company’s relevant solutions.
The lack of good information governance has brought us to an inflection point:
decision makers must gain control of their information to enable innovation, profit
and growth; or continue down the current path of information anarchy and
potentially lose out to competitors who are better able to govern their information.
The What, Who, When, Where, Why and How of Information Capabilities Framework (ICF). The SPICE Factors would be used to determine current state, transition and future state. Slides discuss maturity model of ICF.
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
The document discusses some disadvantages of Minitrex's current data management system and proposes solutions based on customer relationship management (CRM) theories. It finds that Minitrex's data is siloed across different departments, leading to issues like duplicate customer records and a lack of a holistic view of customers. It suggests integrating CRM across departments to get a unified view of customers. It also recommends utilizing CRM software to consolidate data to improve data quality, gain insights, and better manage customer relationships. Leadership support and an integrated, holistic approach are identified as important for effective use of CRM.
The document discusses data archiving concepts and techniques. It introduces archiving as an intelligent process for placing inactive or infrequently accessed data on the right storage tier while allowing preservation, search and retrieval during a retention period. It discusses drivers of information growth like compliance requirements and new applications. An effective archiving strategy addresses both business and IT needs like managing risk, improving efficiency and reducing costs. The document outlines components of an archiving solution like application connectors, rules and management layers, and storage services. It also discusses IBM's reference architecture for archiving.
Flex mode framework architectural overview v 2.1 19-08-2013Sukumar Daniel
This document discusses navigating economic turmoil through adopting smarter ways of doing things using IT service management. It recommends adopting automation-assisted approaches to manage the software development lifecycle and integrate it with service management systems. Continual executive sponsorship is needed for programs managing iterative projects as transformation initiatives impacting people, processes, tools, and partnerships. Collaborative relationships and data analysis capabilities are required to build an automation layer managing business services and processes. Effective governance is also needed from business, IT service management, and third-party provider executives.
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
When Microsoft launched SharePoint, it was made for simply sharing documents within departments. Today, many organizations are trying to use it as their primary content management solution—their “system of record”—even though it was never designed for this.
In a recent ECM market study we see that:
93% of respondents use SharePoint in some manner within their organization
More than 75% still have a “strong commitment” to it
Yet...
Only 11% of these organizations see their deployment as a success
Why is this?
The leading concern is around the lack of true information governance capabilities within SharePoint. This makes it challenging to address compliance and security concerns. Additionally, significant issues remain around utilizing SharePoint for workflow/business processes or case management tasks. Finally, confusion around how to leverage SharePoint Online and Office 365—whether as a standalone or hybrid model—has further contributed to the “content chaos” around SharePoint.
In order to be successful, you need an organizational content management strategy that provides IT with security and compliance, while giving end users an intuitive experience for increased adoption. Ideally, your ECM should include:
SharePoint integration and synchronization
Federated search
Automated records management
Universal Content Security—from SharePoint to Alfresco and external collaboration
Document processing including case management and capture
Integration with Office/Email 365
and more….
How we can help
This presentation will further discuss known issues around SharePoint. We will also identify ways your company can implement solutions that ensure security and user adoption—through integration with your existing SharePoint deployment. You will also have the opportunity to network with industry peers and talk with leaders in ECM solutions.
The document discusses the importance of taking a strategic approach to information infrastructure in order to align it with business objectives. It notes that a strategic infrastructure can deliver scalability, flexibility and secure access to information. It provides an overview of key considerations like accommodating workforce trends, leveraging cloud technologies, and the role of the CIO. The document then outlines some business outcomes of a strategic infrastructure approach, such as accommodating a mobile workforce, building flexibility, focusing IT resources, and handling security issues. It also discusses best practices derived from Ricoh's engagements with customers.
Business Intelligence: Realizing the Benefits of a Data-Driven JourneyRob Williams
1) The document discusses how adopting a data-driven approach and embracing business intelligence (BI) tools and analytics can help improve decision-making, safety performance, and quality. It outlines a three-stage maturity model for developing BI capabilities for environmental, health, safety, and quality (EHSQ) functions.
2) Stage 1 involves basic, compliance-focused data collection and reporting. Stage 2 incorporates more systematic data analysis to understand why issues occur. Stage 3 advances to predictive analytics using machine learning and embedded insights. The document provides examples of how data-driven insights can predict failures and optimize processes.
Content management involves managing all types of digital information throughout its lifecycle, including text, images, video, and more. It encompasses content creation, organization, storage, search, retrieval, preservation, and other functions. Effective content management helps organizations reuse content, integrate information sources, improve communications, and gain productivity benefits. However, most business information exists as unstructured data, which poses management challenges. Trends include growing volumes of web content, use of content management in more channels, and demand for better handling of unstructured information.
Similar to Improving Performance, Efficiency and Information Governance Control of SharePoint (20)
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Improving Performance, Efficiency and Information Governance Control of SharePoint
1. Improving Performance, Efficiency and
Information Governance Control of SharePoint
Presenter, Walt Burton, Director of Technology Solutions
Bishop Technologies, Inc.
September 26, 2012
2. Managing a Flood of Information
Organizations have the
responsibility of storing,
managing and protecting
80% of the digital universe
SharePoint is not immune
to the exponential growth
in content volume
Employ a strong
governance practice and
users will be able to more
easily access active data
and IT will have less
demand to support an
overstressed environment
3. A Myriad of Regulations and Standards
How to make sense of it all
Regulations apply to multiple
industry segments
Simplify the approach
Regulations are dynamic
There is a regulation that applies
to every entity in the US
Federal Rules of
Civil Procedure
4. What is “Information Governance”?
Information governance is
about the people, practices,
and technologies needed to Archiving Information
proactively manage Governance
information
Effective information
management is the result of Compliance
Search &
eDiscovery
looking at the convergence of
three application areas:
Archiving, Compliance, and
Search and eDiscovery
Source: “The Rise of Information Governance: From Reactive e-Discovery to Proactive Information Management,” The 451 Group, August 2009
5. An effective Information Governance Strategy
To assess if you have one in place, ask
yourself a few questions:
Do you know where information is stored?
Do you know how long it should be retained?
Are you able to consistently apply and enforce retention and disposition
policies against this information?
Are you able to find and produce very specific information quickly and cost-
effectively for audit, litigation or investigation?
Can you bet your job or reputation on it? What about somebody else’s?
6. Effective Governance Strategy for SharePoint
Regain performance for SharePoint by reducing:
Duplicates of data across multiple sites and libraries
The volume of data stored in SharePoint databases
Leverage Microsoft EBS/RBS to externalize content
Reduce inactive content, while still allowing for access to the data in
case of a future “What if” situation
Keep Active content manageable
Allow for research for business intelligence, general search, and if
needed effective litigation response
7. Why are we having this Discussion?
2010 2020
1.28 Zettabytes 35.2 Zettabytes
DATA DELUGE BUDGET DILEMMA
Transformation
INFRASTRUCTURE SHIFT GOVERNANCE and DISCOVERY
8. Risk from Lack of Information Governance Policy
Source: “Information Governance Market Study,” Enterprise Strategy Group, April 2010, N=126
9. Business Reality
Organizations are committed Respondents needed
or will consider SharePoint to either customize or buy
for their business third-party products to allow
SharePoint to meet their needs
Source: “Microsoft Office and SharePoint Traction: An Updated Look Source: “AIIM Industry Watch: SharePoint–Strategies and
at Customer Adoption and Future Plans,” IDC, October 2009 Experiences,” July 2010
10. What Is SharePoint Being Used For?
Storing lots of
content…
AIIM Industry Watch: “SharePoint—Strategies and Experiences,” July 2010
11. What Aren’t You Using SharePoint For?
How would you describe your SharePoint use in these areas?
…But needs to be
Old content that
managed according to
shouldn’t be in
regulatory and corporate
SharePoint anyway…
policies…
51%
…that you might just
need to provide for an 57%
audit, investigation, or
litigation
72%
AIIM Industry Watch: “SharePoint—Strategies and Experiences,” July 2010
12. What Policies are We Using to Govern SharePoint?
AIIM Industry Watch: “SharePoint—Strategies and Experiences,” July 2010
13. Microsoft SharePoint Challenges
Operational Challenges
Ensuring quick search and retrieval
Maintaining short backup times
Reducing storage costs
Compliance Challenges
How do I govern site retirement?
How do I efficiently retain content?
How can I enable litigation readiness?
14. Archive Inactive Content to Ensure Proper Governance
With EMC SourceOne for Microsoft SharePoint, organizations can archive
inactive content into a consolidated archive for unstructured content, and
leverage lower-cost tiered storage. Once archived into SourceOne, retention
and disposition policies can be applied against the content.
Maintain retention and control
Provide litigation readiness
Ensure content accessibility
15. Externalize Active Content to Improve Performance
Leverage Microsoft’s recommended methods for
externalization (remote BLOB storage [RBS] and external
BLOB storage [EBS]) in order to:
Displace the content load up to
95 percent
Enhance performance and scalability
Improve backup times
Monitor and optimize storage resources
Maintain end-user experience
17. What information do I have stored?
Do you have visibility into the content stored in my
environment?
Are you managing information effectively based on its
value and risk?
Do you have sensitive information residing in an
environment that isn’t managed or controlled?
18. Where is the information stored?
Are you tiering your storage and aligned it based on the
value and risk of content?
Are you maximizing your infrastructure investments and
fully utilizing my storage platforms?
What information should be in a secure repository or
archive?
19. Who gets access to the information?
How are you ensuring that the right person has access
to the right content?
How are you ensuring that workers have ready access
to the information they need?
20. How is the information retrieved?
How are you preserving it? Do you know how long you
need to keep it?
How is information identified and collected when an
investigation or litigation request is received?
Can workers search and find information from the
application they use most often so they don’t lose any
productivity?
21. Information Governance Matters to IT
Operational eDiscovery Compliance
Efficiencies
MS Exchange 2010/MS Rapid response to legal Corporate policies and
SharePoint 2010 action or HR inquiries lifecycle management
migrations
Search and Regulated industries;
PST reductions and responsiveness without FINRA rules (Financial),
mailbox quota elimination spoliation HIPAA rules (HealthCare),
FRCP rules (Legal),
System performance Comply with FRCP, International rules
enhancements Sarbanes Oxley, and
other rules
22. Operational Efficiencies
Email server management
Offloading email and attachments from email servers to archival storage eliminates most of
the content from these servers resulting in; faster backups, faster content restoration after a
crash or other problem, and improved email server performance (as measured by message
delivery time and reliability)
Employee productivity
A user-accessible archiving capability can permit end users to access their own archived
content (missing, deleted or old emails & attachments) without help from IT. This reduces IT’s
workload, and makes employees more productive by providing them with faster access to the
content needed to do their work. Without an archiving system, employees must spend time
filing, deleting or otherwise managing their content to stay under the mailbox size quota that
roughly 3 in 5 organizations impose on their users. However, an archiving system, by
automatically migrating content from mailboxes to the archive, allows IT to impose quotas on
their users, but gives users what seems to be a mailbox of unlimited size.
23. More Operational Efficiencies
Storage management
Osterman Research found that roughly 5 of the top 10 problems in managing email servers
are related to excessive storage, a problem that archiving addresses directly by migrating
data to archiving storage. This reduces the overall cost of managing storage, and reduces
IT’s storage-related costs by enabling the deployment of high-performance, near line storage
to be delayed or eliminated altogether. Moreover, the use of purpose built archive storage for
de-duplication and block de-duplication can offer additional benefits, although they cannot be
used with the archiving capabilities in Exchange 2010.
Business continuity and disaster recovery
An archiving system can serve as an integral part of an organization’s business continuity
and disaster recovery system. In the event that the primary email system is inaccessible due
to a natural disaster, power outage or routine system maintenance, an archiving system can
serve as a secondary repository of email and other content, giving users access to their
content during an outage of the primary system.
Re-use of data
Business decision makers may want to re-use content for a variety of business purposes,
such as analytics for analyzing trends or customer sentiment, or to provide business
intelligence for users when dealing with customers. An archiving system that enables easy
access to this data is useful for these purposes.
24. What is an Archive?
…a specialized repository…used
to…preserve, protect, control,
maintain authenticity and integrity,
accommodate physical and logical
migration, and guarantee access to
information and data objects over
their required retention period.
Storage Networking Industry Association, Building a
Terminology Bridge for Digital Information Retention and
Preservation, 2009
25. Archiving Solutions
Complement the Backup/Recovery Strategy
Backup/Recovery Primary Archiving
Data
Protection Governance
& &
Recoverability Discovery
You do need both: backup for disaster recovery and archive
for long-term data retention
26. Control, Optimize, and Govern…
Active content =
externalize
Inactive content
= archive
Delete
27. Big Savings Through Externalization
Metadata
SharePoint
End User Metadata
BLOB ID
RBS Provider
Metadata
BLOB
BLOB
BLOB
Files
Maximize SharePoint’s performance by using an RBS Provider to
redirect binary large objects (BLOBs) directly to storage
28. Efficiency to Migrate through SharePoint Versions
Externalize Archive
Reduce size of database Capture inactive sites and
first content
Less content to migrate Preserve, protect, and produce
*Before migrating, archive inactive content to reduce the size of SharePoint’s
database, then externalize any large files to further reduce the size of the database.
This means less content to move and a faster migration.
29. How Can Governance Improve Performance
By employing a solution that is able to determine:
Location awareness of data
De-duplication
Reduction of inactive content
Proactive management
Reduction of load on resources for active content
30. What needs to be done
Start simple
Make it effective
Enable the right
tools for the right Deploy
Define a
needs and
Policy
Enforce
Next Usage Define
Awareness Functional
Criteria
Historical stacks
Business Analytics
Intelligence Active content – RBS/EBS
Inactive content – Archive
(to Stub or not to Stub)
Search and research
31. The Gains and Benefits
Predictable Usage Patterns
Storage Management
Retention Actions
Responsive Workgroup Resources
Litigation Ready
Think of it as Insurance
Rapid Response Convergence
Time To Decision
Reduce Cost, Increase Capabilities
32. Native SharePoint Tools – it does it all…. Right??
Internal methods to SharePoint
Enacting Governance
Accounts, Accounts, Accounts, oh and Groups too
It can backup and delete
Site level
33. Think Outside the Box
Pan Enterprise Search
More than just SharePoint
Here a Silo, there a Silo, everywhere a Silo
One document, many sources
The single Instance Payback
De-Duplicate, rejuvenate
Two Methods, one service
RBS/EBS
Archive and Stub
Retention and Disposition
Retire according to policy
Retain beyond if needed
Manage at the corporate level, records management
34. EMC SourceOne for Microsoft SharePoint
Increase productivity, decrease costs
EMC VNX
Metadata
SharePoint 95%
End User
SharePoint
Reduction SourceOne
RBS
Provider
Externalize
Active BLOB
Content
Servers
Organize and
Classify
SharePoint 100%
End User SharePoint SourceOne
Server(s) Full
Reduction Text
Index
Archive
Inactive
Content Archive
Store Content EMC VNX, Centera,
Servers Container Atmos and Data Domain
Files
35. Bishop Technologies, Inc. – Bishopit.com
Founded: 2002
Headquarters: At Bishop Technologies, we architect, implement, customize,
Elgin, IL and proactively support affordable, effective governance
archive and search solutions for organizations, across all
Organization: sizes and industry types.
>50% Engineering
Staff
We specialize in:
Email, Instant Messaging, Social Media, File
and SharePoint Archiving
Regulatory and Corporate Governance
Consulting and Support Services
Archive and Data Migration
Enterprise eDiscovery and Litigation
Preparation