This document discusses trends in enterprise information management (EIM) and their implications for information architecture. It notes that EIM is shifting from control of information to improved access. Modern information architecture must evolve beyond old models and be personalized, integrated and tailored to each user. To better enable EIM, information architecture should consolidate and secure important information, improve data accuracy and integrity, resolve inconsistencies, and integrate information across boundaries according to a long-term strategy. The document argues that effective information management requires understanding what data is important, what metrics exist, what inconsistencies occur, what the overall strategy is, and taking a long view.
How to Better Manage Your IT InfrastructureEdarat Group
Cloud computing can benefit a business in various ways. But before we discuss this in details, it’s better to have an elementary idea about cloud and its functionality. Cloud computing outlines a scenario in which hosted services are delivered over the internet. Cloud is essential for businesses because computation and storage have long been two vital requirements for enterprises. Through cloud computing, these requirements can be met easily and instantly without hardware usage.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
How to Better Manage Your IT InfrastructureEdarat Group
Cloud computing can benefit a business in various ways. But before we discuss this in details, it’s better to have an elementary idea about cloud and its functionality. Cloud computing outlines a scenario in which hosted services are delivered over the internet. Cloud is essential for businesses because computation and storage have long been two vital requirements for enterprises. Through cloud computing, these requirements can be met easily and instantly without hardware usage.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
Presented at Online ITIL Indonesia Webinar #5.
Content:
> Setting up the context
> Understanding holistic IT Management point of view
> IT Service Management Transformation
> Key Performance Indicator (KPI)
> IT Service Catalogue
> IT Sourcing
> Agile Incident Management
Where does IT value come from? IT is not money. IT is a tool. To understand the value of a tool, what must be shown is how its use makes a difference. The question of "value" is about what difference is important and how that difference is made. If that's not what you're managing, then you're not managing value.
The Belgian Railways Journey to Enterprise Information ManagementStephane Haelterman
Agendat: Introduction, Definition, Motivation, Information Management, Framework, Dimensions, Inventory, Strategy, Corporate objectives, Value, Return-On-Investment, Aproach, Information Governance, Information Architecture, Unstructured data management, Information Security, Communication channels, Next Step.
Here's a look at what we discuss at an IANS Connector Event. We bring together a diverse group of high-level information security professionals for collective discussion and problem-solving. Participants will take away actionable insights which will allow them to become more effective leaders.
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
Enterprises increasingly require higher level of assurance credentials for authentication. How do enterprises inspire trust for users? How do they impart that identity management solutions value and uphold privacy best-practices and regulations? Jenn will highlight how the application of a user-experience discipline intersects both legal and trust issues surrounding cloud-based applications. Discussion will underscore legal advantages of user-centric identity management as an authentication compliance strategy. The industry goal of improving trust of a solution by focusing on user control will also be linked to consumer and relying party adoption as a market-differentiating privacy risk mitigation strategy.
When data that is critical to cybersecurity tools remains in silos, everyone loses. This siloed approach diminishes the value of the data and leaves organizations with incomplete visibility, significant management overhead, and uncertainty about which security tools are actually necessary to ingest and analyze the data to protect the business.
These slides--based on the webinar--help answer the following questions:
- Which cybersecurity tools are necessary for full internal and external coverage, and which are redundant or outdated?
-What are the signs that a vendor can back up their promises, or that they’re exaggerating their product’s capabilities?
-How can you leverage machine learning to reduce security response time?
- How can you combine the strengths of a big data model with adaptive machine learning for more accurate, effective security protection and detection capabilities?
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
Presented at Online ITIL Indonesia Webinar #5.
Content:
> Setting up the context
> Understanding holistic IT Management point of view
> IT Service Management Transformation
> Key Performance Indicator (KPI)
> IT Service Catalogue
> IT Sourcing
> Agile Incident Management
Where does IT value come from? IT is not money. IT is a tool. To understand the value of a tool, what must be shown is how its use makes a difference. The question of "value" is about what difference is important and how that difference is made. If that's not what you're managing, then you're not managing value.
The Belgian Railways Journey to Enterprise Information ManagementStephane Haelterman
Agendat: Introduction, Definition, Motivation, Information Management, Framework, Dimensions, Inventory, Strategy, Corporate objectives, Value, Return-On-Investment, Aproach, Information Governance, Information Architecture, Unstructured data management, Information Security, Communication channels, Next Step.
Here's a look at what we discuss at an IANS Connector Event. We bring together a diverse group of high-level information security professionals for collective discussion and problem-solving. Participants will take away actionable insights which will allow them to become more effective leaders.
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
Enterprises increasingly require higher level of assurance credentials for authentication. How do enterprises inspire trust for users? How do they impart that identity management solutions value and uphold privacy best-practices and regulations? Jenn will highlight how the application of a user-experience discipline intersects both legal and trust issues surrounding cloud-based applications. Discussion will underscore legal advantages of user-centric identity management as an authentication compliance strategy. The industry goal of improving trust of a solution by focusing on user control will also be linked to consumer and relying party adoption as a market-differentiating privacy risk mitigation strategy.
When data that is critical to cybersecurity tools remains in silos, everyone loses. This siloed approach diminishes the value of the data and leaves organizations with incomplete visibility, significant management overhead, and uncertainty about which security tools are actually necessary to ingest and analyze the data to protect the business.
These slides--based on the webinar--help answer the following questions:
- Which cybersecurity tools are necessary for full internal and external coverage, and which are redundant or outdated?
-What are the signs that a vendor can back up their promises, or that they’re exaggerating their product’s capabilities?
-How can you leverage machine learning to reduce security response time?
- How can you combine the strengths of a big data model with adaptive machine learning for more accurate, effective security protection and detection capabilities?
Enterprise Architecture in the Boardroom with Dragon1Dragon1 Inc.
How do we get a good overview and insight of the organization? What information do you need as decision-maker, and what are the costs that have to be made to solve the business issues to continue the business operations?
AIIM and Vamosa - Practical Cosniderations when Implementing ECMnicarcher
AIIM give a great overview of a recent survey on the motivators for implementing ECM in todays economy, and Vamosa talk about how to get the best out of your content through enterprise content governance
Why does your organization need IOA trained professionals? What are the AIIM IOA certificate courses like? These questions and more are answered in this one hour presentation.
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...Ted McLaughlan
Information Technology (IT) concerns and strategies a Chief Information Officer (CIO) deals with are equally relevant for small businesses and startups, as they are for larger businesses. A presentation to the Loudoun Small Business Development Center (SBDC).
Data Science - Part I - Sustaining Predictive Analytics CapabilitiesDerek Kane
This is the first lecture in a series of data analytics topics and geared to individuals and business professionals who have no understand of building modern analytics approaches. This lecture provides an overview of the models and techniques we will address throughout the lecture series, we will discuss Business Intelligence topics, predictive analytics, and big data technologies. Finally, we will walk through a simple yet effective example which showcases the potential of predictive analytics in a business context.
Where Does Your Organization Fall on the Enterprise Asset Management (EAM) Maturity Curve?
Map your business’ EAM transformation journey using SDI’s EAM Model, which synthesizes several complex industry EAM models into nine core elements to deliver a timely assessment with actionable recommendations.
The Increasing Criticality of MDM for Personalization for Customers and Employees
Master data management seems to be one of those perennial, evergreen programs that organizations continue to struggle with.
Every couple of years people say, “we're going to get a handle on our master data” and then spend hundreds of thousands to millions and tens of millions of dollars working toward a solution.
The challenge is that many of these solutions are not really getting to the root cause of the problem. They start with technology and begin by looking at specific data elements rather than looking at the business concepts that are important to the organization.
MDM programs are also difficult to anchor on a specific business value proposition such as improving the top line. Many initiatives are so deep in the weeds and so far upstream that executives lose interest and they lose faith in the business value that the project promises. Meanwhile frustrated data analysts, data architects and technology organizations feel cut off at the knees because they can't get the funding, support and attention that they need to be successful.
We've seen this time after time and until senior executives recognize the value and envision where the organization can go with control over its data across domains, this will continue to happen over and over again. Executives all nod their heads and say “Yes! Data is important, really important!” But when they see the price tag they say, “Whoa hold on there, it's not that important”.
Well, actually, it is that important.
We can't forget that under all of the systems, processes and shiny new technologies such as artificial intelligence and machine learning lies data. And that data is more important than the algorithm. If you have bad data your AI is not going to be able to fix it. Yes there are data remediation applications and there are mechanisms to harmonize or normalize certain data elements. But looking at this holistically requires human judgment: understanding business processes, understanding data flows, understanding dependencies and understanding of the entire customer experience ecosystem and the role of upstream tools, technologies and processes that enable that customer experience.
Until we take that holistic approach and connect it to business value these things are not going to get the time, attention and resources that they need.
Seth Earley, Founder & CEO, Earley Information Science
Dan O'Connor, Senior Product Manager at inriver
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Enterprise Knowledge
Lulit Tesfaye explains how foundational knowledge management and knowledge engineering approaches can play a key role in ensuring enterprise Artificial Intelligence (AI) initiatives start right, quickly demonstrate business value, and “stick” within the organization. The presentation includes real world case studies and examples of how organizations are approaching their data and AI transformations through knowledge maturity models to translate organizational information and data into actionable and clickable solutions. Originally delivered at data.world Summit, Spring 2022.
Business Intelligence, Data Analytics, and AIJohnny Jepp
Data is the new currency. In this session, best practices on data collection, management dashboards, and used cases will be shared using Azure Data Services.
Video accessible at bit.ly/APACSummitOnDemand
Shwetank Sheel
Chief Executive Officer
Just Analytics
Poonam Sampat
Cloud Solution Architect - Data & AI
Microsoft Asia Pacific
Maximo User Group Presentation extract - BIRT Reporting optionsSai Paravastu
Maximo User Group Presentation extract, BIRT reporting, Actuate reporting for Maximo, IBM Enterprise Asset Management - Maximo, Reporting options with Maximo, Alternative reporting options in Maximo using BIRT, BAR360 - Business Analytical Reporting 360 degrees view of your DATA
Telling Your Story To A Disrupting MarketplaceBilly Cripe
How does a small business scale their marketing initiatives and story telling to a marketplace that is in the midst of disruption? Understand the reasons for the disruption then engage using these 4 strategies and 3 tactics. From the amazing marketing team at Field Nation the fastest growing freelance marketplace for onsite work.
Christiania Parent Circle - Understanding How Kids Communicate social mediaBilly Cripe
Lecture delivered to Christiania Lutheran 2012 late as part of their Parenting Circle Talks Series. Topic: Equipping Parents to understand and engage with their kids through social media. Tips, talking points and reference urls in speaking notes section of each slide.
Next generation desktop backup must do more than simply store files. Learn how Digitiliti’s innovative cloud-based platform helps maintain compliance, continuity and control with zero business disruption. See how frictionless user experience is coupled with your security and your policy keeping control where it belongs – with you.
Presented by Billy Cripe at the 2012 AIIM International Conference. Speaking notes and citations are in the notes section of each slide. Contact BloomThink and Billy Cripe for social media strategy help.
Presentation given at AIIM International 2012 on 2 types of Collaboration. Lecture Notes in the To view the session on YouTube see: http://www.youtube.com/watch?v=j-m0OqT0gRE
BloomThink - The Social Media Shift - Tech TalkBilly Cripe
30 minute Tech Talk presented at 2012 Rotary Club District Conference. B2B Social Media focus. Presented by Billy Cripe (@billycripe) of BloomThink.
Contact us at http://facebook.com/bloomthink for your social media strategy.
see each slide note for speaking points
Oracle ECM 11g is here. Fishbowl Solutions, an Oracle Gold Partner with recognized Oracle ACE expertise presents 3 solutions for making the most of 11g. 1) migration and upgrade, 2) portal integration suite, 3) project automation suite.
Slides each with a curious picture and several lines that can be used to spur the imagination. Great tool for creative writing classes and teachers.
Images are culled from around the internet and inserted for educational purposes only.
2. EIM O Trends in EIM & Their Architecture Implications Why Men in Kilts (and the women who love them) Should Care
3.
4. EIM Trends: Less Control, More Access People first then Content focus shifting from control to access
5. EIM Trends – Power + Desirability Simplified Sophistication. E20. Power and Ease Sexiness and Reach Systems get more complex, people turn to simple, consumer web 2.0.
6. Purpose made solutions fit to the user Integratedinto whole system Ease of Use, Ease of Implementation, Ease of Integration – Simple doesn’t mean simplistic. Integration means enterprise ecosystem is vital EIM Trends – Personalized, Integrated & Tailor Made
7. EIM Trends – IA Must Evolve Information Architecture Must Evolve cant use old models to solve existing problems and expect dramatic results. Early models of ECM replicated old models of document management – filing cabinets, folders, locations etc. Fundamental limitations ensued.
8. EIM Trend Themes Access for Inviting to Early models of ECM replicated old models of document management – filing cabinets, folders, locations etc. Fundamental limitations ensued. Designed for USERS Moving toward
9. How Can IA Make Better EIM? Enterprise Information Management as defined by Gartner is “an organizational commitment to define, secureandimprovetheaccuracyandintegrityofinformationassetsandtoresolvesemanticinconsistenciesacrossallboundariesto support technical, operational and business objectives of a company's enterprise architecture strategy.
10. How Can IA Make Better EIM? defineandsecure: Manage what Matters – consolidate, federate, secure
11. How Can IA Make Better EIM? improveaccuracyandintegrity: Link, de-duplicate, index, score, capture ambient metrics Traditional BI and DW concepts applied to UNSTRUCTURED information. E20 and Social Compute Measures drive Pattern Recognition.
12. How Can IA Make Better EIM? resolveinconsistencies: Synchronize, single-source, workflow, re-use
13. How Can IA Make Better EIM? acrossboundaries: Integrate, information hub, SOA, strategy, LONG VIEW
14. How does this guy know What matters & how to secure it? What ambient metrics exist? What is inconsistent? What is the strategy? What is the long view?
15. Or this guy? What matters & how to secure it? What ambient metrics exist? What is inconsistent? What is the strategy? What is the long view?
16. Or even this guy? What matters & how to secure it? What ambient metrics exist? What is inconsistent? What is the strategy? What is the long view?
17. Men in Kilts Know… What matters & how to secure it. They have a scope, a defined area to manage and a profile of what to watch out for.
18. Men in Kilts Know… What ambient metrics exist. Because they are out and about. They watch, evaluate, measure and learn. They understand what users respond to, their likes, dislikes and interest.
19. Men in Kilts Know… What is inconsistent. Inconsistency is a characteristic of use or quality. It is not the same as check sum deltas. It comes from people.
20. Men in Kilts Know… What the strategy is. Because they participate. They experiment. They help set scope of what is possible, not just what is required of them.
21. Men in Kilts Know… The Long View Because of their familiarity with the technology, they understand how to leverage the frameworks, foundations and SOA models for true shared services.
24. Fishbowl Solutions Knows… EIM – Management, Use, Reuse, Access, and delivery Information Architecture – And how to leverage Oracle, integrate with applications and classify information with a long view. Business Problems – And How To Solve Them The Business Ecosystem – And How to engage the power of sophisticated systems with the simplicity that secures user adoption
26. Fishbowl & EIM For more information on Fishbowl Solutions or to schedule a Solution Briefing, call +1.952.465-3400, visit www.fishbowlsolutions.com, or send an email to info@fishbowlsolutions.com. blog: http://cfour.fishbowlsolutions.com Twitter: @billycripe Facebook Group Page: http://www.facebook.com/group.php?gid=203440885271
Editor's Notes
Man in kilt image:http://scottishwebfolk.files.wordpress.com/2007/12/kilt.jpg
http://aiim.typepad.com/aiim_blog/2009/06/some-musings-about-the-future-of-ecm.htmlBut web 20 lacks the reach and scope and security and approval of the enterprise. Enter Enterprise 2.0. But who will win and how will they do it?http://i145.photobucket.com/albums/r202/Cedlin123/kilt-1.jpg