How to Clean Up Files for Better Information Management Brian Tuemmler. Network Shared Drives: RIM FUNDAMENTALS
|
|
- Sibyl Dickerson
- 6 years ago
- Views:
Transcription
1 Network Shared Drives: How to Clean Up Files for Better Information Management Brian Tuemmler 26 JANUARY/FEBRUARY 2012 INFORMATIONMANAGEMENT
2 This article offers recommendations about what an organization can do at the enterprise, workgroup, and personal level, both through process changes and technology, to prep and clean up their shared drives for better information management and for potential migration to an electronic content and records management (ECRM) system. recently went through the Iprocess of painting some rooms in my house. One of the things I had to do before painting was tape up all the doors and frames. This is one of the less satisfying household tasks I can think of since it takes time and, by itself, doesn t actually beautify the room. It does, however, provide huge benefits: it gives a good perspective on the job at hand and any problems that might arise, and it results in straight edges and a lot less clean up. A similar lesson can be applied to the process of transforming an organization s shared drives; some prep work can add a lot of benefits. Getting a Handle on Electronic Records A number of large organizations are transforming shared drives or cleaning up, organizing, and managing information located there as part of their overall program of getting a handle on electronic records. This is often, but not always, done in anticipation of implementing an ECRM system. Just as taping before painting pays off, content cleanup leveraging classification tools, if possible as preparation for the shared drive transformation can greatly simplify and make the outcome more accurate. Shared drives frequently are thought of as the place where office computer files are stored for collaboration. However, based on this author s organization s experience with Fortune 500 clients, this type of usage represents only about 35-45% of the files found on shared drives for many organizations. The rest, which should not or cannot be migrated to an ECRM, comes from: Creating, downloading, and distributing software Putting convenience copies in multiple places Creating, sharing, and running databases Moving s and.pst archives so they don t fill up the inbox Backing up a desktop when a new computer is installed or when an individual leaves the organization Developing and publishing web content to the organization (Technically, publishing web content should be done in an ECRM, but migrating this content from shared drives can be tricky and will likely break links.) Needing a temporary place to store such things as itunes or company party photos A proper information management strategy around shared drives is focused on segregating the different types of content so each can be managed more effectively. This can be done by: Putting databases, install files, and applications on dedicated servers separate from electronic records Putting the good content into structures that allows individuals to manage, classify, or purge it Getting rid of useless, non-business content so managing everything else becomes easier All this can be done using the right tools and a solid approach for developing policies. Using the Right Tools Index and classification management (ICM) tools represent a fairly new category of tools that is available to help with the cleanup and categorization of unstructured content, which is any type of digital content that is not inside a database, from office documents and images to applications. These tools will inventory a network share and gather information from the file (e.g., dates and size), the file attributes (e.g., author), and file content (e.g., words, phrases, and numbers). All these pieces of data can be combined to categorize information in a way that can be acted upon. ICM tools can support multiple taxonomy facets (e.g., retention category, content type, security, and status), which can be applied to content across the enterprise simultaneously. The actions can range from deleting and moving, to outputting migration scripts, to moving files and metadata into content repositories. The quickest and most beneficial thing these tools do is provide insight into what content actually looks like. It is hard to size a content repository and plan migration unless an organization knows how much content it has. Transforming shared drives requires much more than just installing an ICM tool, though, just as buying the paint brush is only one step in painting a room. Enterprise Level The first step in cleaning a shared drive is to make sure the JANUARY/FEBRUARY 2012 INFORMATIONMANAGEMENT 27
3 right people are involved, as it requires input from a number of constituencies. All of these groups will benefit from an organized share drive, so they should all be willing to participate in defining requirements and policies for the project. Those constituencies and their areas of focus include: Information technology (IT) IT policies and requirements often come from trying to meet the storage and information security needs of the organization. IT will have policies and requirements regarding whether employees can download applications. If so, decide if any applications can be deleted. Human resources (HR) HR can be very helpful in connecting content with business function by identifying who works where. This department is also involved with terminated employees and their content. Both of these areas are critical in developing a classification structure. Litigation support Legal is concerned that nothing gets deleted that the organization is required to preserve. If an organization s process for preservation is in place (leaving responsive files where they currently reside on shares, rather than copying them elsewhere), the legal department s participation is critical in identifying what needs to be preserved. Records management If the goal is to reduce the volume of storage on shares, there are some good opportunities using ICM tools. Quick-wins are the high-volume, short-retention categories. For example, general administration retention items, such as pencil requests, travel confirmations, and employee recognition files, can be identified and may be voluminous. The organization Employees across the enterprise should be primarily involved with figuring out how to set up the foldering structure based on what is important to them. At the enterprise level, the files on shared drives may be able to be organized in a more useful manner. In addition to depending on a retention policy and schedule, transforming shared drives may also require dependence on some less-ob- Basing root level, first-tier, and second-tier folders on a functional model will help efforts to organize content. File Structure Policy Basing root level, first-tier, and second-tier folders on a functional model will help efforts to organize content. A function is a combination of a verb and a noun (e.g., receive compliance reports, plan conferences, initiate projects, and develop training ). It is not strictly necessary to adhere to the verb-noun combination (e.g., conference planning will also work), but using this functional approach describes content better and makes subfolders more consistent and will drastically improve overall classification accuracy: based on this author s organization s experience, up to 95% accuracy compared to an organizational model (80%) or ad hoc, three-letter initial model (65%). For example, in one organization s legal department, folders at the root level were labeled with three-letter initials of the responsivious policies that resolve questions, such as these: What will happen to files that someone has specifically identified as garbage, as a duplicate, or as outdated? Which duplicate (of several) is going to be kept? Is a rendition (a PDF, for example) a duplicate? What about a.zip file? When does a draft become obsolete? When is a computer program a record? Work Group Level Departmental or workgroup shares evolve over time, usually with little guidance or structure. Often, at the root level, file structures are organized around: Organizational units identified with acronyms, which change over time, making indexing and classification less accurate Individuals names or initials (e.g., Bob s folder ) (These are the worst; after Bob leaves the organization, nobody will ever look in that folder.) Old versions Other miscellaneous topics The overall accuracy of the classification that comes from these types of shares can be improved with some reorganization. 28 JANUARY/FEBRUARY 2012 INFORMATIONMANAGEMENT
4 RIM FUNDAMENTALS ble attorneys. Because of this, each attorney and his or her team set up their own subfolders. One chose Contracts, one chose Contracts and Agreements, one chose AGMTS, and so on, so there was less consistency in folder names. When setting up new folder structures for content, keep the following guidelines in mind: Think about how someone who has no history with the organization will want to find content five years from now. This level of simplicity and clarity will help the ICM tools, as well. Don t set up a structure that easily provides for a single document to reside in multiple places. Folder structures work better if there is a mutually exclusive place to put things unless an organization can ensure the indexing allows for reorganization. If a folder for e- mails and a folder for specifications exist, an about specifications will be difficult to locate consistently. Don t set up a folder called ; e- mail is a delivery mechanism, not a document type. Use folder names that help identify common index fields for the documents placed in that area. Significant labor will be saved if a document automatically inherits the folder name as an index value. Other Clean-Up Activities In addition to foldering issues, a number of clean-up activities are best handled at the workgroup level. Chances are, many of the following items will be the responsibility of a limited number of individuals within the workgroup, providing maximum clean-up benefit with minimum user impact. ICM tools can report on and often fix such issues as: Odd characters ECRM systems have a hard time dealing with odd characters in file names (e.g.,!#$%^&()). Long file paths Tools to migrate content to ECRM systems may also have a problem with files or folder paths that are too long. An ICM report can help identify these. Duplicates Duplicates are made for a variety of reasons. Based on Using standard naming conventions is not just polite, it is helpful for individuals using the file shares. this author s organization s experience, around 20-30% of the files on a typical workgroup share are duplicated and usually with about three copies per duplicate set. As it turns out, 15% of the duplicates cannot be deleted without causing some larger collection of files to lose integrity because they are part of an application, database, or web collection. There is not a one-size-fits-all solution for dealing with duplicates. Large files by themselves are not bad. But, if the file is unnecessary, the benefit from getting rid of it is higher than for getting rid of other types of files. User Level Using standard naming conventions is not just polite, it is helpful for individuals using the file shares. Standard naming convention policies also help establish criteria that ICM tools can leverage. File and Folder Naming Policy Dos When naming files and folders, follow these rules: Establish common spellings for common entities. In other words, spell out Department of Justice rather than use the acronym DOJ. Establish a common method for abbreviations (e.g., removing vowels only). As long as there is consistency, the ICM tools can act upon them accordingly. Structure the use of dates to be consistent across the organization. The majority of date-specific content is quarterly based, which can be identified by the month. If dates are used on files, begin with month (i.e., MM-DD-YYYY). If the year is the most important element, consider using only the YYYY format. Do not spell out months. Remember that the network system tracks dates, but that last access dates and create dates are frequently inaccurate because they have been changed by a computer process, such as backing up the files. An individual may need to rely on file and folder dates using an ICM tool. Formalize the use of draft, ver.#, superseded, and final. This is a very important policy, as one of the greatest challenges with shared drives is being able to identify if a document has been declared as JANUARY/FEBRUARY 2012 INFORMATIONMANAGEMENT 29
5 final. Also, a number of records categories use superseded as the trigger for retention on a document. Therefore, if a document falls under such a category, and a new version is created, the old version should be renamed with the word superseded. A brief review of the retention schedule may be required when identifying these content types. Consider using postfix tags on folders indicating a lifecycle state and business function. This is useful for specific sets of documents that require greater control or that may be migrated to electronic content repositories in the future. The function may be one of several general functions (e.g., ADM for administration, RM for records management, IT for information technology, and mixed for more than one function), and the lifecycle may be represented, for example, by drafts, final, reference, and mixed ). This may result in a name, such as Correspondence [ADM, Final]. File and Folder Naming Policy Don ts When naming files or folders, avoid using: Employee or author names. Rename instead to reflect the function being performed. Abbreviations that are not pre-defined. Consider creating a wiki for those abbreviations that may be used for employees. Organizational units. These names often change. Document formats, such as Word, Excel, spreadsheets, and s. ICM tools can easily identify what the format is based on the file extension or the contents of the file. Folder names where the words are concatenated or connected with alternative characters, such as underscores. Often these conventions (e.g., Sample_files ) indicate the file is linked by external web pages and should be managed in a dedicated repository. Obsolescence indicators unless they also indicate when the files can be deleted. Examples of these are historical, archived, to be deleted, old files, and old versions. File systems evolve over many years through different individuals, so perfect consistency is hard to find. However, these shares can be cleaned and prepared at a variety of organizational levels to make the classification effort better. It is easier to tackle these issues before the cleanup or migration becomes the critical path in an organization s ECRM project. END Brian Tuemmler can be contacted at brian.tuemmler@gimmal.com. See his bio on page JANUARY/FEBRUARY 2012 INFORMATIONMANAGEMENT
Is SharePoint the. Andrew Chapman
Is SharePoint the Andrew Chapman Records management (RM) professionals have been challenged to manage electronic data for some time. Their efforts have tended to focus on unstructured data, such as documents,
More informationMANAGING GOVERNMENT
MANAGING GOVERNMENT EMAIL HELLO! I m Scott Larson, MPA Records Management Analyst for Wright County 1. THE STRUGGLE IS REAL What once made email great has now become what makes it challenging SYMPTOMS
More informationManaging Born- Digital Documents.
Managing Born- Digital Documents www.archives.nysed.gov Objectives Review the challenges of managing born-digital records Provide Practical strategies to ensure born-digital records are well managed Understand
More informationMemorandum ITS FOIL
Memorandum To: Agency General Counsels From: Karen Geduldig, General Counsel, NYS Office of Information Technology Services Date: June 18, 2013 Re: Email Consolidation and Email Management Over the past
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationBest Practices for Organizing Electronic Records
Best Practices for Organizing Electronic Records October 2017 CONTACT US Division of Library, Archives and Museum Collections govarc@wisconsinhistory.org Best Practices for Organizing Electronic Records
More informationThis factsheet intends to provide guidance on how you can manage your s. You will discover:
Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify
More informationEliminating the Blame Game: Creating your Company Strategy for Documented Defense
Eliminating the Blame Game: Creating your Company Strategy for Documented Defense Welcome Presenter: Wesley Ballance Sales Engineer Viewpoint Construction Software Wesley Ballance is a sales engineer with
More informationStandards for Test Automation
Standards for Test Automation Brian Tervo Windows XP Automation Applications Compatibility Test Lead Microsoft Corporation Overview Over the last five years, I ve had the opportunity to work in a group
More informationThe rapid expansion of usage over the last fifty years can be seen as one of the major technical, scientific and sociological evolutions of
1 The rapid expansion of email usage over the last fifty years can be seen as one of the major technical, scientific and sociological evolutions of recent times. Pre-dating the Internet and contributing
More informationWhy Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix
Why Information Architecture is Vital for Effective Information Management J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix J. Kevin Parker, CIP, INFO CEO & Principal Architect, Kwestix
More informationThe Principles: A Needs Assessment Case Study Presented by John Isaza, Esq., FAI ARMA Houston Chapter April 23, 2013
The Principles: A Needs Assessment Case Study Presented by John Isaza, Esq., FAI ARMA Houston Chapter April 23, 2013 Case Study Basic Facts Needs Assessment Based on the Principles Assessment Results Prioritizing
More informationEmerging Trends in Records Management Technology. Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018
Emerging Trends in Records Management Technology Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018 The Paperless World Source: Le Trefle ad (2013) Emerging Trends in Records Management Technology
More informationFUNCTIONAL BEST PRACTICES ORACLE USER PRODUCTIVITY KIT
FUNCTIONAL BEST PRACTICES ORACLE USER PRODUCTIVITY KIT Purpose Oracle s User Productivity Kit (UPK) provides functionality that enables content authors, subject matter experts, and other project members
More informationSetting the Stage for Automatic Disposition
Setting the Stage for Automatic Disposition Susan Cisco Director, Gimmal Education Code: MO01-4025 1 Learning Objectives Upon completion of this session, participants will be able to: 1. Define an information
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More informationManage as Records in SharePoint to Reduce Risk and Cost
Manage Email as Records in SharePoint to Reduce Risk and Cost Presented by: Warren Solow (Viacom) & Joel Klinger (Gimmal) A little context The problem with email 3% growth rate per year 112.5 Billion business
More informationGDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper
White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents
More informationRecords Management Metadata Standard
Records Management Metadata Standard Standard No: RIM203 2008 City Clerk s Office Records and Information Management Records and Information Management Standard Subject: Records Management Metadata Standard
More informationFederal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:
Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal
More informationCONTENT CALENDAR USER GUIDE SOCIAL MEDIA TABLE OF CONTENTS. Introduction pg. 3
TABLE OF CONTENTS SOCIAL MEDIA Introduction pg. 3 CONTENT 1 Chapter 1: What Is Historical Optimization? pg. 4 2 CALENDAR Chapter 2: Why Historical Optimization Is More Important Now Than Ever Before pg.
More informationQvidian Proposal Automation provides several options to help you accelerate the population of your content database.
Qvidian Proposal Automation Advantage: The Pragmatech Migration Opportunity This document describes the primary benefits that Pragmatech clients receive by migrating to Sant Suite 9, which through its
More informationPolicy for College Staff Relating to Electronic Records, File/Document Management
Policy for College Staff Relating to Electronic Records, File/Document Management Contents Policy for College Staff Relating to Electronic Records, File/Document Management... 1 1. Introduction... 2 PART
More informationBusiness Processes for Managing Engineering Documents & Related Data
Business Processes for Managing Engineering Documents & Related Data The essence of good information management in engineering is Prevention of Mistakes Clarity, Accuracy and Efficiency in Searching and
More informationPublications Database
Getting Started Guide Publications Database To w a r d s a S u s t a i n a b l e A s i a - P a c i f i c!1 Table of Contents Introduction 3 Conventions 3 Getting Started 4 Suggesting a Topic 11 Appendix
More informationSharePoint 2016 Site Collections and Site Owner Administration
Course 55234A: SharePoint 2016 Site Collections and Site Owner Administration Course Outline Module 1: Getting Started with SharePoint 2016 This module explains to site collection and site administrators
More informationExperiences in Data Quality
Experiences in Data Quality MIT IQIS 2010 Annette Pence July 14-16, 2010 Approved for Public Release: 10-0686 Distribution Unlimited As a public interest company, MITRE works in partnership with the government
More informationRecords Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017
Records Management at MSU Hillary Gatlin University Archives and Historical Collections January 27, 2017 Today s Agenda Introduction to University Archives Records Management at MSU Records Retention Schedules
More informationIBM Best Practices Working With Multiple CCM Applications Draft
Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices
More informationCreating and Maintaining Vocabularies
CHAPTER 7 This information is intended for the one or more business administrators, who are responsible for creating and maintaining the Pulse and Restricted Vocabularies. These topics describe the Pulse
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationWHY EFFECTIVE WEB WRITING MATTERS Web users read differently on the web. They rarely read entire pages, word for word.
Web Writing 101 WHY EFFECTIVE WEB WRITING MATTERS Web users read differently on the web. They rarely read entire pages, word for word. Instead, users: Scan pages Pick out key words and phrases Read in
More informationNationBuilder Handbook: How to get the most out of your database
NationBuilder Handbook: How to get the most out of your database Table of Contents Introduction... 1 Creating an Account & Accessing NationBuilder... 2 Profiles & Logging Information... 2 Finding & Tagging
More informationRecords management workflows
JISC Digital Preservation Future Proofing Project Records management workflows Kit Good, University Records Manager and Freedom of Information Officer The overall approach: The following workflows are
More informationA Digital Preservation Roadmap for Public Media Institutions
NDSR Project: A Digital Preservation Roadmap for Public Media Institutions Goal Summary Specific Objectives New York Public Radio (NYPR) seeks an NDSR resident to aid in the creation of a robust digital
More informationSitecore Projects with GatherContent
How to prepare content for Sitecore Projects with GatherContent By Jennifer Davies, Content Strategist, Razorfish Table of Contents 4 Introduction Guide overview 5 Step 1 Define your content structure
More informationIndexing Field Descriptions Recommended Practice
Indexing Field Descriptions Recommended Practice Service Alberta Enterprise Information Management Developed: Last Updated: https://www.alberta.ca/enterprise-information-management.aspx Contents Indexing...
More informationWelcome to Times News Tracker the enhanced tracking service available exclusively from nytimes.com
1 Getting Started Welcome to Times News Tracker the enhanced tracking service available exclusively from nytimes.com The following user guide tells you everything you need to know to make the most of your
More informationTREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationBYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM
THE NUTS AND BOLTS OF MAKING BYOD Mobile technology is changing at an astonishing rate, and employees are increasingly using their personally owned devices for business purposes sanctioned or not. Organizations,
More informationCase Study: Using the Principles to Assess Current & Future State Presented by John Isaza, Esq., FAI ARMA Houston Chapter April 23, 2013
Case Study: Using the Principles to Assess Current & Future State Presented by John Isaza, Esq., FAI ARMA Houston Chapter April 23, 2013 Case Study Basic Facts Needs Assessment Based on the Principles
More informationSecure Client Portal - User Guide
Secure Client Portal - User Guide March 2014 03.19.2014-16:00 p.m. - CEH Draft Before You Begin Please read this User Guide in it's entirety before submitting a support ticket or calling GetNetSet for
More informationIntroduction to Autodesk VaultChapter1:
Introduction to Autodesk VaultChapter1: Chapter 1 This chapter provides an overview of Autodesk Vault features and functionality. You learn how to use Autodesk Vault to manage engineering design data in
More informationMaking a Business Case for Electronic Document or Records Management
Making a Business Case for Electronic Document or Records Management Building and maintaining an edms system is a significant investment in both tools and people. It requires on-going care and attention.
More informationWHEATON COLLEGE RETENTION POLICY May 16, 2013
WHEATON COLLEGE E-MAIL RETENTION POLICY May 16, 2013 I. PURPOSE Electronic mail (e-mail) has become a ubiquitous service that greatly enhances communication, both internally within the Wheaton community
More informationInvesting in a Better Storage Environment:
Investing in a Better Storage Environment: Best Practices for the Public Sector Investing in a Better Storage Environment 2 EXECUTIVE SUMMARY The public sector faces numerous and known challenges that
More informationCALL FOR EXPRESSION OF INTEREST (EOI N PTD/15/101) Enterprise Content Management (ECM) Implementation. Annex II BACKGROUND INFORMATION
CALL FOR EXPRESSION OF INTEREST (EOI N PTD/15/101) Enterprise Content Management (ECM) Implementation Annex II BACKGROUND INFORMATION EOI N PTD/15/101 (ECM Implementation) Background Information 1 7 1.
More informationSharePoint 2013 Site Owner
SharePoint 2013 Site Owner Effective Content and Document Collaboration with Axalta Teams 9 May 2014 Instructor: Jason Christie Site Owner Course Topics to be Covered Content Management Creating and configuring
More informationEnterprise Vault Best Practices
Enterprise Vault Best Practices Implementing SharePoint Archiving This document contains information on best practices when implementing Enterprise Vault for SharePoint If you have any feedback or questions
More informationUsing the State Records Center Web Module
Using the State Records Center Web Module Effective Date: July 1, 2011 Revised Date: December 4, 2013 (Procedure VSARA0012) TABLE OF CONTENTS I. Overview / Description... 1 II. Versatile Basics... 2 A.
More informationUSS Albany Association, Inc.
USS Albany Association, Inc. How to Series Newsletter Editor Guidelines Original Issue Date: September, 2012 Date Revised: Introduction The Newsletter Editor has one function; periodically produce and
More informationTags, Categories and Keywords
Tags, Categories and Keywords Document Management Tip Sheet As more and more content gets added to your repository, it will become harder to find what you need. Documents may become buried in multi-level
More informationCHAPTER 19: MANAGING SERVICE QUEUES
Chapter 19: Managing Service Queues CHAPTER 19: MANAGING SERVICE QUEUES Objectives Introduction The objectives are: Understand the basics of queues and the flow of cases and activities through queues.
More informationWelcome To Account Manager 2.0
Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account
More informationEnterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev
Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the
More informationKing County Housing Authority Delivers Multimedia Online Help with MadCap Doc-To-Help
A Case Study in Technical Communication Best Practices King County Housing Authority Delivers Multimedia Online Help with MadCap Doc-To-Help GOALS Streamline the process of developing and publishing online
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationClean & Speed Up Windows with AWO
Clean & Speed Up Windows with AWO C 400 / 1 Manage Windows with this Powerful Collection of System Tools Every version of Windows comes with at least a few programs for managing different aspects of your
More informationSFC Interface Extranet User Manual
SFC Interface Extranet User Manual Introduction... 2 How to access SFC Interface Extranet... 2 Management of SFC Interface Extranet... 3 Management of information in LINKS... 3 Records Management... 3
More informationData Management Checklist
Data Management Checklist Managing research data throughout its lifecycle ensures its long-term value and prevents data from falling into digital obsolescence. Proper data management is a key prerequisite
More informationPOC Evaluation Guide May 09, 2017
POC Evaluation Guide May 09, 2017 This page intentionally left blank P r o p r i e t a r y a n d C o n f i d e n t i a l. 2 0 1 7 R F P M o n k e y. c o m L L C Page 2 CONTENTS Read Me First... 4 About
More informationTaxonomies and controlled vocabularies best practices for metadata
Original Article Taxonomies and controlled vocabularies best practices for metadata Heather Hedden is the taxonomy manager at First Wind Energy LLC. Previously, she was a taxonomy consultant with Earley
More informationPlymouth Rd, Suite 212, Plymouth Meeting, PA
Picture yourself standing next to an empty tool box. If you are building a shed, you ll need to make sure that tool box contains a hammer, a saw, a level, and the host of other tools necessary to build
More informationThe Root Cause of Unstructured Data Problems is Not What You Think
The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?
More informationAbout the integration of IBM Content Collector with IBM Classification Module
About the integration of IBM Content Collector with IBM Classification Module ii About the integration of IBM Content Collector with IBM Classification Module Contents About the integration of IBM Content
More informationMANAGING YOUR MAILBOX: TRIMMING AN OUT OF CONTROL MAILBOX
MANAGING YOUR : DEALING WITH AN OVERSIZE - WHY BOTHER? It s amazing how many e-mails you can get in a day, and it can quickly become overwhelming. Before you know it, you have hundreds, even thousands
More informationRecordkeeping Metadata Study Committee
Recordkeeping Metadata Study Committee Agenda: 15 September 2000 9:00 a.m. to 11:00 a.m., Department of Human Services Committee Members: Rudi Anders (Supreme Court) Absent Karen Bondy (Department of Children,
More informationCATCH ERRORS BEFORE THEY HAPPEN. Lessons for a mature data governance practice
CATCH ERRORS BEFORE THEY HAPPEN Lessons for a mature data governance practice A guide to working with cross-departmental teams to establish proactive data governance for your website or mobile app. 2 Robust
More information"Charting the Course... MOC A: SharePoint 2016 Site Collections and Site Owner Administration. Course Summary
MOC 55234 A: 2016 Site Collections Course Summary Description This five-day instructor-led course is intended for power users and IT professionals who are tasked with working within the 2016 environment
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationCOLUMN. Choosing the right CMS authoring tools. Three key criteria will determine the most suitable authoring environment NOVEMBER 2003
KM COLUMN NOVEMBER 2003 Choosing the right CMS authoring tools The authoring environment is the most important aspect of a content management system (CMS), for without content authors, there would be nothing
More informationSYSTEM ADMINISTRATION GUIDE VERSION 14
SYSTEM ADMINISTRATION GUIDE VERSION 14 Copyright 2014 FileHold Systems Inc. All rights reserved. For further information about this manual or other FileHold Systems products, contact us at Suite 250-4664
More informationAutodesk Vault and Data Management Questions and Answers
Autodesk Civil 3D 2007 Autodesk Vault and Data Management Questions and Answers Autodesk Civil 3D software is a powerful, mature, civil engineering application designed to significantly increase productivity,
More informationLosing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data
Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com
More informationQ&A Session for Connect with Remedy - CMDB Best Practices Coffee Break
Q&A Session for Connect with Remedy - CMDB Best Practices Coffee Break Date: Thursday, March 05, 2015 Q: When going to Asset Management Console and making an update on there, does that go to a sandbox
More informationIt s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.
It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationMigration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1
22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/
More informationSalesforce CRM Content Implementation Guide
Salesforce CRM Content Implementation Guide Salesforce, Winter 18 @salesforcedocs Last updated: October 13, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationBisnode View Why is it so damn hard to piece together information across the enterprise?
Bisnode View Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Creating
More informationGetting Started with Rational Team Concert
Getting Started with Rational Team Concert or RTC in 16 Steps Kai-Uwe Maetzel IBM Rational Software kai-uwe_maetzel@us.ibm.com SDP 20 2009 IBM Corporation This Presentation is Good for You if You know
More informationHP Application Lifecycle Management. Upgrade Best Practices
HP Application Lifecycle Management Upgrade Best Practices Document Release Date: October 2010 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationArchive to the Cloud: Hands on Experience with Enterprise Vault.cloud
Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email
More informationINSTRUCTIONS for PLANNING RECOMMENDATIONS in TracDat Program Level
INSTRUCTIONS for PLANNING RECOMMENDATIONS in TracDat Program Level Table of Contents Introduction to TracDat... 2 Background... 2 Logging into TracDat... 2 Definitions... 2 Recommendations... 3 TracDat
More informationKM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t
KM COLUMN JANUARY 2002 How to evaluate a content management system Selecting and implementing a content management system (CMS) will be one of the largest IT projects tackled by many organisations. With
More informationINTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP
INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP Best Practices to Improve the Quality of Your Customer Data Why Data Governance and Stewardship? 3 Devoting resources to data quality pays dividends 1: Assess
More informationTHINGS. Setup Guide. David Allen Company
THINGS Setup Guide David Allen Company TABLE OF CONTENTS FOCUS OF THIS GUIDE WHAT YOU CAN EXPECT FROM THIS GUIDE 1 FOCUS OF THIS GUIDE UNDERSTANDING THE GTD BEST PRACTICES AN OVERVIEW OF THE KEY BEST PRACTICES
More informationHow to Guide. How to Create Mobile Surveys and Forms START
How to Guide How to Create Mobile Surveys and Forms START sales@textlocal.in 040-3085-8603 www.textlocal.in Contents Getting started 3 An introduction to surveys and forms 3 Creating a mobile survey 5
More informationHow to choose the right Data Governance resources. by First San Francisco Partners
How to choose the right Data Governance resources by First San Francisco Partners 2 Your organization is unique. It has its own strengths, opportunities, products, services and customer base. Your culture
More informationPolicy Manager in Compliance 360 Version 2018
Policy Manager in Compliance 360 Version 2018 Policy Manager Overview 3 Create a Policy 4 Relate a Policy to Other Policies, Departments, and Incidents 8 Edit a Policy 10 Edit a Policy by Using the Edit
More informationSharePoint 2016 Site Collections and Site Owner Administration
SharePoint 2016 Site Collections and Site Owner Administration Course 55234A - Five days - Instructor-led - Hands-on Introduction This five-day instructor-led course is intended for power users and IT
More informationI ll do anything except data migrations.
In our recent meeting with a senior IT executive, she shared that she accepted her current position a few years ago with the caveat, I ll do anything except data migrations. Doing data migrations, or system
More informationHow to Guide. How to create mobile surveys. and forms START
06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299 www.textlocal.com 06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299
More informationSECTION K: FILE MANAGEMENT
SECTION K: FILE MANAGEMENT K1: FOLDER AND FILE NAMING CONVENTIONS GUIDELINES INTRODUCTION WHY USE NAMING CONVENTIONS? Consistency in naming files, emails or folders is important to identify information
More informationClearing Out Legacy Electronic Records
For whom is this guidance intended? Clearing Out Legacy Electronic Records This guidance is intended for any member of University staff who has a sizeable collection of old electronic records, such as
More informationSAP Security Remediation: Three Steps for Success Using SAP GRC
SAP Security Remediation: Three Steps for Success Using SAP GRC All companies need strong application security environments as part of a successful overall risk management strategy. Strong risk-oriented
More informationRECORDS AND INFORMATION MANAGEMENT AND RETENTION
RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and
More informationSharing Schedules and Planning Meetings
CHAPTER Sharing Schedules and Planning Meetings In this chapter Sharing Group Schedules 378 Planning a Meeting with Outlook 383 Rescheduling or Canceling a Meeting 388 Responding to Meeting Requests 388
More informationFRONT USER GUIDE Getting Started with Front
USER GUIDE USER GUIDE Getting Started with Front ESSENTIALS Teams That Use Front How To Roll Out Front Quick Start Productivity Tips Downloading Front Adding Your Team Inbox Add Your Own Work Email Update
More information