The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
Introduction to Mashups, Web2.0, Social MediaRunway Digital
This is a presentation @joannespain and I (@samanthabell1 on twitter) gave to a government department here in Melbourne, Australia in December 2009. Enjoy, let me know what you think - leave a comment!
Accessibility 2.0: Blended Learning For Blended Accessibilitylisbk
Brian Kelly gave a plenary talk on Accessibility 2.0: Blended Learning For Blended Accessibility at the 'Blended Learning to Splendid Learning' Technology Innovation in Higher Education Conference at the Manchester Metropolitan Business School on 9th June 2006.
Introduction to Mashups, Web2.0, Social MediaRunway Digital
This is a presentation @joannespain and I (@samanthabell1 on twitter) gave to a government department here in Melbourne, Australia in December 2009. Enjoy, let me know what you think - leave a comment!
Accessibility 2.0: Blended Learning For Blended Accessibilitylisbk
Brian Kelly gave a plenary talk on Accessibility 2.0: Blended Learning For Blended Accessibility at the 'Blended Learning to Splendid Learning' Technology Innovation in Higher Education Conference at the Manchester Metropolitan Business School on 9th June 2006.
Web 2.0: Implications For The Cultural Heritage Sectorlisbk
Brian Kelly, UKOLN gave a talk on "Web 2.0: Implications For The Cultural Heritage Sector" at a seminar on "From Bits to Blogs - Taking the IT Revolution into Museums, Libraries and Archives" organised by MLA North East and held at Teesside University, Middlesbrough on 18 October 2006.
See http://www.ukoln.ac.uk/web-focus/events/seminars/mla-ne-2006-10/
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
Panel discussion and presentation to business professionals and members of the Charleston Area Alliance (Charleston WV) on the value of blogging in business.
LegalTech09: 5 Things Every Practice Should Know About Web 2.0Lee Bryant
V. Mary Abraham very kindly agreed to run a joint session at LegalTech NY, February 2009, and these are the slides we used for what turned out to be a very well-attended and interactive session. Many thanks to all who took part.
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
Web 2.0: Implications For The Cultural Heritage Sectorlisbk
Brian Kelly, UKOLN gave a talk on "Web 2.0: Implications For The Cultural Heritage Sector" at a seminar on "From Bits to Blogs - Taking the IT Revolution into Museums, Libraries and Archives" organised by MLA North East and held at Teesside University, Middlesbrough on 18 October 2006.
See http://www.ukoln.ac.uk/web-focus/events/seminars/mla-ne-2006-10/
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
Panel discussion and presentation to business professionals and members of the Charleston Area Alliance (Charleston WV) on the value of blogging in business.
LegalTech09: 5 Things Every Practice Should Know About Web 2.0Lee Bryant
V. Mary Abraham very kindly agreed to run a joint session at LegalTech NY, February 2009, and these are the slides we used for what turned out to be a very well-attended and interactive session. Many thanks to all who took part.
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
This presentation delivered on March 10, 2011 described how to develop a social media policy, the elements and policy statements to include in a comprehensive policy, and other considerations for managing social media.
This presentation to the ARMA Cincinnati Chapter introduced Web 2.0 tools, provided some use cases for each tool, and then described strategies for managing the content created by these tools.
20110411 Archive Systems User Conference Keynote Future of EDRMJesse Wilkins
This keynote was delivered at the Archive Systems User Conference in Orlando and focused on the 8 trends that will affect document and records management
Making Informed Business Decisions with an Enterprise Information Management ...Perficient, Inc.
Perficient presents: An Enterprise Information Management (EIM) solution provides an integration of structured and unstructured information in a context that is used by users to make decisions.
EIM Solutions provide a seamless, role based set of tools that let users be more efficient in completing their key tasks
These tools can include;
Business Intelligence
Enterprise Content Management
Portal
Enterprise Search
Collaboration
E-Mail Management
Knowledge Management and the Evolution of the WorkplaceSilicon Halton
Silicon Halton Meetup#16 featured a keynote by Reema Duggal from the Sitaran Group and Chris Willard from Igloo Software on the topic of Knowledge Management and the Social Workplace.
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
SharePoint 2013, Yammer and Office 365 product families bring new capabilities for content sharing, finding, organizing, and authoring. They also create new challenges. The move to the cloud and the integration of SharePoint with the enterprise social network with yammer, and have made this release so profound and disruptive to the business. In this session we'll dig into planning and strategy for social architectures around both business process and the technologies to help ensure compliance and success. Social enterprise technology is transformative and will lead to more agile business when used correctly, but a disaster and chaos when not used properly.
Web governance has matured from simply ‘ownership’ and an ‘editorial board’ to providing a broad enabling framework for the people, process, technology, documentation and standards required to deliver an effective (usually multi-estate) public website.
Current trends in social media, wireless web, open technology standards and the economy mean that web governance must adopt a broader perspective:
• look outward to consider the organisation’s broader web presence beyond its website
• look inward to drive down costs and improve enterprise efficiency with KM to leverage common technology platforms, content re-utilisation, information lifecycle management and so on.
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
Get an in-depth look at the first step of Intelligent Information Management (IIM) where it's all about your content – creating it, capturing it, and collaborating with it. Click through this ebook preview, to explore changing business drivers that are impacting the crucial first step in the information lifecycle.
Download a Free copy of the eBook here: https://info.aiim.org/create-capture-collaborate
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
Meet Your CIP Expert Panel
We thank these IIM executives – all Certified Information
Professionals (CIPs) – for their commitment to share their expertise and time in order to improve the overall level of competence and knowledge within the industry.
Quotes within this report in each CIP Expert section were made
during a special panel discussion of the survey results on March 4, 2021. The intention was to use the survey findings as a foundation for a conversation focused not just on the trends suggested by the data, but on what to do about them. To ensure confidentiality and candid perspectives, this discussion was conducted under a variation of “Chatham House” rules.
The quotes within the report are intentionally not attributed to
the individual participants in the Panel and reflect individual
perspectives rather than those of the organizations they represent.
Get a FREE copy of the report here: https://info.aiim.org/state-of-the-intelligent-information-management-industry-2021
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
Learn how these Intelligent Automation best practices can help you save time, money, and effort by freeing up your manually-driven and paper-based processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/intelligent-automation-proven-practices-for-saving-time-money-and-effort
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
Learn how to develop a clear business case for why your organization needs a legacy system replacement and how YOU can be the champion driving success.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/legacy-system-replacement
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
How do you balance information access with necessary controls? Get a firsthand look at two different successful cloud content management projects.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/cloud-content-management-success-stories
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
In this webinar, we explore a new approach to managing your Organizational Intelligence that won’t disrupt user’s work habits.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/new-approaches-to-classification-and-retention-that-wont-disrupt-users-work-habits
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
In this webinar, we’ll show you how to truly connect the dots - from O365, to network folders, line of business applications, and beyond!
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/driving-digital-change-with-o365-and-iim
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
In this webinar, we’ll share the 5 Essential Capabilities every digital transformation initiative needs to succeed.
Want to follow along with the webinar replay? Download it here for FREE: working-smarter-and-faster-in-a-digital-transforming-world
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
In this webinar, we’ll show you how to get more out of your existing content with Artificial Intelligence in very achievable ways.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/using-ai-to-easily-automate-all-of-your-correspondence-channels
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
In this webinar, exclusively for BPOs and Outsourced Service Providers, we share with you the results of our recent survey from the leaders of capture projects. Find out how Parascript works with its partners to ensure that customers improve and update their capture platform and processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/capture-leaders-and-their-projects-2019
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
In this webinar, learn the value that e-signature workflow content automation can bring to your operations to support your digital business transformation strategy. You will also get a walk-through of an optimized workflow in SharePoint Online that will illustrate how enterprises can digitize their content processes and enhance their customer & partner journeys.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/how-to-extend-the-value-of-your-information-management-systems
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
n this webinar, we'll explain the IIM toolkit, and how it can be applied to your everyday work to reach your digital transformation goals as well as offer practical advice on how to get started.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/your-2019-information-management-resolution-2
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
Join us as we share best practices for the capturing of key information and data from paper and electronic documents and forms.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/effectively-capturing-paper-and-digital-documents-in-your-existing-applications
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
In this webinar, we’ll teach you how to take advantage of your Office 365 and SharePoint implementations as well as improve the ROI of your existing software investments.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/improving-your-collaborative-and-case-centric-processes
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
In this webinar, we pinpoint common problems with meeting content strategies of today, learn how to address the struggles with legacy solutions as well as how to tackle them head-on.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/modern-problems-require-modern-solutions
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
In this webinar, we’ll examine ways that RPA can help your organization tackle these challenges. We’ll take a detailed look at actual customer case studies involving data migration projects large and small, and how RPA can help.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/dreading-your-data-migration-project
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
In a cloud and virtualized environment, information variety and volume are growing geometrically. As such, organizations are struggling to take advantage of cloud, mobile and consumer technologies while connecting to their back-end systems of record. No one person has the time or energy to sort through thousands of files to a) identify records or b) pull metadata for the records. That's where analytics enters the equation. Learn how we used analytics tools and methods to resolve our information migration challenges.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
1. Managing Web 2.0 Records: Facebook, Twitter and Everything in Between Jesse Wilkins, CRM AIIM International January 11, 2011
2. About AIIM International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
3. Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of Directors (2007-2010) Frequent industry speaker and author AIIM ERM Expert Blogger Instructor for AIIM Certificate Programs 3
4. Agenda Use cases for social technologies Commercial vs. enterprise social technologies Managing social content as records
19. Identity management - commercial Need separate accounts for most sites Many sites leveraging identity management Facebook Connect Twitter OAuth
20. Identity management - enterprise Integration into identity infrastructure Ensure security and confidentiality Provide accountability Support for groups and ethical walls Access to other resources inside the organization 20
21. Archiving - commercial Doesn’t exist for most sites Available for Facebook since Oct 2010 Some third-party services available
23. Integration with other systems - commercial Some using FB Connect, Oauth Very little integration into line of business systems - today
24. Integration with other systems - enterprise Allow import from other systems Allow export to other systems 24
25. Auditing and reporting - commercial Most commercial services offer very little in the way of analytics and auditing Some third-party services available, especially for Twitter Social “listening platforms” and CRM (sCRM)
26. Auditing and report - enterprise Significant amounts of information available for reporting Who has done what What has been done to a particular article/item/etc. Any changes made to the system, security, etc. 26
34. Is it a record? Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision?
35. What is the record? Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key
36. Duplication Determine whether content is unique If it’s already being captured elsewhere, treat as a duplicate record or as a non-record A note about co-creation
39. Records management in brief Archive selected items locally Use search queries and monitoring Store selected items locally using search queries or RSS
40. Use the native backup to store locally Store locally using built-in tools
41. Use a third-party service to store locally Store locally using third-party service
46. Conclusion Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization And they can be managed as records Lead your organization to use them effectively
47. For more information Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins
48. Additional Resources “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 Guideline for Outsourcing Records Storage to the Cloud, ARMA International, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009
49. Additional Resources “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Guidance on Social Networking”, Arizona State Library, Archives, and Public Records, June 2010 http://www.lib.az.us/records/documents/pdf/Social_Networking.pdf
50. Additional Resources NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf
51. Florida Social Media Toolkit http://sites.google.com/site/flsocmed/ “Friends, Followers, and Feeds: A National Survey of Social Media Use in Government”, NASCIO, September 2010 http://www.nascio.org/publications/documents/NASCIO-SocialMedia.pdf Texas Dept of Information Resources Social Media Policy http://www.texas.gov/en/about/Pages/social-media-policy.aspx
52. Additional resources Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices
53. Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com
Editor's Notes
Keep in touch with remote offices, colleagues, and even familyNetworking - personal, professional, career
Learn new things. Lots of what folks post day-in and day-out is trivial. Then again, so is the RECMGMT-L listserv – and yet how many of you are on that and swear by the value you receive from it?
80% of companies use social media for recruitment – 95% use LinkedIn. And every recruiter and HR manager does due diligence on candidates using Google – and the top links for many are their profiles on LinkedIn, Facebook, etc.
Because information can be easily augmented with photos, videos, and links
[twitter] Web 2.0 considerations and issues[/twitter]
[twitter] Web 2.0 considerations and issues[/twitter]
The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
The next step is to determine exactly what is the record and must therefore be retained. Again, this will likely vary not just by content, but also by the nature of the tool. An individual social network status update or Tweet could rise to the level of a record, though I suspect this will be uncommon; in the case of a protracted discussion on someone’s wall or via Twitter, it might be the entire stream of updates on a particular topic or over a given period. This is analogous to determining when an instant message is a record. Many of these tools don’t really have metadata in the traditional sense. Twitter, for example, has the following public metadata: SenderMentions (the @ or DM it is addressed to, and could be more than one)A unique Twitter IDAn in-response-to Twitter ID if it uses the Twitter Reply capabilityA ReTweet ID if it was ReTweetedDate and time sentThe client used to send the update, if knownAny hashtags could be considered metadataBut note what there isn’t: No subject line or topic, no mechanism for filing it, no keywords (except maybe the hashtag). Other systems may offer more or less metadata but it is difficult to access some of that, even if it is retained by the system or commercial provider. The key is to have a records policy that is broad enough to encompass all of these tools and that stresses the content and context of information rather than its format. And as we noted earlier, just because it exists does not make it a record per se.[twitter] The next step is to determine exactly what is the record and must therefore be retained. [/twitter]
Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
At this point I’d be pleased to entertain your questions.
In conclusion, Web 2.0 is not something coming down the road or over the horizon – it’s here today and is probably in your organization, whether you know about it or not. It is all but impossible to effectively prohibit them – and the tools can significantly improve an organization’s collaboration and knowledge sharing, thereby adding value to the organization. It is incumbent on records management professionals to step up and lead your organizations in the effective use and management of these tools.