Message Image  

Blogs

Be the first person to recommend this.
Everyday it seems as if another breakthrough is made in tech. Another big moment, cool invention, new business use, or fun toy seems to appear out of thin air. This week, its bigger than usual. Google, one of the internet staples has been open sourcing code and designs for some time. Open-sourcing means to share on the internet and make public to all users. While they are careful to only share relevant information that doesn’t effect their business negatively, sharing code has cemented Google as a brand of innovation, tech leadership, and knowledge. Most recently they open-sourced an important AI code. AI, or artificial intelligence, is the idea that computers...
0 comments
Be the first person to recommend this.
The benefits of providing self-service, community-oriented support to customers and partners in an externally-facing context are broadly recognised - helping to improve the level and speed of service that people have access to, while reducing calls to the helpdesk and lowering organisational costs as a result. However, it's not just your customers and partners that can benefit from this type of approach; there are major advantages to be had from applying the same thinking to your internal support environment too, using social collaboration technologies. One of the key challenges that organisations have when implementing these types of tools...
0 comments
Be the first person to recommend this.
RSA-4096 encryption virus contributes to cyber extortion. It transforms nearly every bit of data on the host device. The files become gibberish. That is, appropriate software cannot read the data. Once the modification completes, a victim is presented with a notification. Unlike the scrambled files, the message by ransomware is readily available for reading in three formats. Those files containing the same message are created in every folder on the computer concerned. The malicious software deploying the crypto attack is currently spreading worldwide. It targets, first of all, the devices registered in the regions with the highest per capita income....
0 comments
Be the first person to recommend this.
As people use more web and mobile applications in their personal lives, they’re expecting more out of technology in their professional lives. The role of the Information Professional has become even more important in these new buying cycles. The Information Professional is to minimize the costs, both in time and money, to the rest of his or her organization as these new technologies are being reviewed. It's the Information Professional's role to clarify all of the various dialects. The Information Professional was a Translator I used to think that one of the roles of an Information Professional was to be a software translator. I like to think...
0 comments
Be the first person to recommend this.
Forrester forecasts B2B e-commerce sales to skyrocket by 2020 as a result of the digital turn. As B2B customers tend to buy more and more online, manufacturers, wholesalers and distributors can benefit from this emerging opportunity to cut their operating costs by providing self-service customer portals. An intuitive customer portal with a coherent structure, rich functionality and relevant information becomes a hard-to-copy competitive advantage that appears much stronger than price discounts. It’s obvious that a good customer portal requires an efficient customer portal software, but for now let’s turn to the pre-development stage and consider...
0 comments
1 person recommends this.
This was taken from the next to last slide (full presentation available here ) from my keynote session at the IRMS Conference in Brighton, UK from 15-17 May, 2016. These things were also included in the ebook Digital Transformation in Action by John Mancini , that was put out in advance of the AIIM Conference in April 2016. These are five things, in my view, that you need to do if you want to foster innovation, transformation, and disruption (the good kind) in your organization. Focus on value, forget risk. - If your entire approach to managing information is based on minimizing risk (litigation, leaks, etc) you are never going to be...
0 comments
1 person recommends this.
I'm a big advocate of AIIM Training, and I have the honor of teaching some AIIM courses on occasion. As with the CIP, when you earn an AIIM training certificate or any other industry credential, you should display it proudly! The Challenge I have seen AIIM training certificate designations typed several different ways. It is easy enough to format these in rich email clients using superscripts for the level (Practitioner, Specialist, Master). But what about text-only fields on sites like LinkedIn and Twitter? Some use something like "ECMm" for Enterprise Content Management Master. That might be okay if only it would work on all designations. Unfortunately,...
0 comments
Be the first person to recommend this.
You may not have heard the term very often, but we are nevertheless on the cusp of a new era: the era of mobile records management . What is mobile records management? At TAB, we define mobile records management as a set of activities, including accessing tracking, organizing and managing information, that are carried out using mobile devices. This new era is being ushered in with the help of mobile-enabled records management software that leverages the computing power of devices such as smart phones and tablet computers. For example, the latest release of TAB FusionRMS allows users to conduct a number of records-management tasks on a mobile app that...
0 comments
Be the first person to recommend this.
Last week I had the fortunate opportunity to work Fred Pagoni from Colortrac, a colleague for over 15 years. We have both been involved in the “large format” industry. It’s amazing that with so much experience how you can still teach each other about the tricks and tips. We all find better ways to do things; we just need to share them. While training on the latest model of Colortrac Scanners, my staff asked Fred technical questions. He gave us new insight to how to work faster and more efficiently while getting the best results. I had to share these very obvious tips! Large format scanning can be a challenge, especially if you have limited experience....
0 comments
Be the first person to recommend this.
Most SAP using organizations are storing privacy relevant data in their SAP systems (think of personal data related to customers, vendors, business partners, employees, applicants, patients, etc. etc.) Many data privacy officers are aware of the new EU GDPR (General Data Protectionm Regulation) and are looking for instruments and know how to translate and apply data privacy measures to SAP data. The linked presentation gives you some basic insight regarding the implementation of data privacy measures in SAP: tinyurl.com/hc7op59
0 comments
Be the first person to recommend this.
Every so often I find myself going down what my wife calls an Internet rat hole. I come up with a question and start digging, find something cool, then cooler, and then I’m wondering how I got here. This one started with discovering that AIIM started as the National Microfilm Association. What I found was interesting. I found a post on Digital Landfill from back in 2013 that talked about the history of AIIM and the National Microfilm Association that started in 1950. I thought it would be fun to look back to the early days. The Document that Started it All The idea that would become AIIM started in 1944. Franklin M Morgan, of Graphic...
1 comment
Be the first person to recommend this.
Security information management solutions also called as ESM, SEIM, and SEM originate from network-management suits. SIM application makes use of system architectures identically to conventional network-management programs but then includes threat information, security intelligence, and compliance proficiency to assist IT professionals significantly better control} their security environment and address possible business threats. Security professionals only succeed when they have complete information from all parts of their network. However, more-complex infrastructure implies that security squads possess reams of information to plow through to discover...
0 comments
Be the first person to recommend this.
Security information management (SIM) systems started to appear because of the fact that security experts really needed a substitute for manually sorting the growing number of security signals and alerts collected across numerous devices and networks. SIM concept was created to automate the collection of event-log information from security equipment as well as assist users make sense of it by means of a universal administration console. SIM makes use of event-correlation and data-aggregation technologies much like the network-management software packages and applies these to event logs received from security devices, like proxy servers, firewalls,...
0 comments
Be the first person to recommend this.
Today, business knowledge is document-oriented. And while the document is an excellent way to encapsulate, organize, and manage the integrity of the knowledge specific to a business process, it is not compatible with today’s mobile devices and workforces. The process of searching, discovering, accessing, and using knowledge stored in documents and document renditions creates huge inefficiencies in the organization’s daily operations. This has a decisively negative impact on business competitiveness and agility. We need a way of revolutionizing how the business world delivers knowledge. Businesses need help to circumvent the drawbacks of delivering...
0 comments

Own Your ECM Career

Be the first person to recommend this.
Did any of us choose enterprise content management (ECM) as our career path when we joined the workforce? While there are degree programs in information studies, I think most of our paths were accidental. While we may have accidently entered ECM, the decision to stay has been our own choice. Still we often don’t look at ECM as our career, but at “computers” as our career. Yet I can hardly imagine a brain surgeon saying they were, “just a doctor.” I know I don’t want to keep being asked if I can fix someone’s printer. I think it’s time we own our career. At the AIIM conference last week, Eric Qualman ’s stated that everyone has a “Digital Stamp and...
0 comments

Defining Information ROT

1 person recommends this.
A good acronym can help communicate an important concept in a memorable way. One of my favorite acronyms in Information Management is ROT. This term conjures up images of junk that needs to be cleared out of our information systems. However, I have seen this acronym defined in two similar but different ways. Usage of the term ROT with both of these definitions dates at least as far back as the early 2000s. Let's look at each definition, and then pick one to use going forward. Definition 1: ROT = "Redundant, Outdated , Trivial" This definition of ROT is often used for Web content. We information architects and content strategists tell publishers to...
0 comments
1 person recommends this.
Übersicht über die Keynotes von Dr. Ulrich Kampffmeyer der Jahre 1993 bis 2015 mit Links zu Folien und, falls verfügbar, Videos der Veranstaltungen: http://bit.ly/KYN9315 . Die DMS und später die DMS EXPO war die zentrale Veranstaltung der Dokumentenmanagement-Branche in Deutschland. Einen Überblick über 20 Jahre DMS EXPO gibt dieser Vortrag: Folien http://bit.ly/20DMSEXPO2014 , Video http://bit.ly/20_Jahre_DMSEXPO Die DMS EXPO ist 2015 in der IT &Business aufgegangen. In 2000 und 2002 gab es parallel zur DMS auch die europäischen AIIM Conferences in Essen. Die Übersicht schließt sozusagen eine Ära der DMS-Branche in Deutschland ab, die von...
0 comments
1 person recommends this.
Folien des Vortrags "Von DMS und ECM zu EIM und darüber hinaus" von Dr. Ulrich Kampffmeyer auf dem Update Information Management 2016 auf Slideshare http://bit.ly/EIMupdate1 (Download kosten- und registrierungsfrei) Inhalt : - Einführung: von DMS zu ECM & EIM - Information & Informationsmanagement - Warum nur noch Informationsmanagement? Autor : - Dr. Ulrich Kampffmeyer, PROJECT CONSULT Unternehmensberatung Dr. Ulrich Kampffmeyer GmbH, Hamburg, www.PROJECT-CONSULT.com Update Information Management 2016 : - Die Präsentation ist der Eingangsvortrag zur Veranstaltungsreihe "Update Information Management...
0 comments
Be the first person to recommend this.
This blog is created as an outcome of the AIIM conference SharePoint discussion from AIIM conference lead by Kevin titled " Don't make us think getting SharePoint to be useful usable and used. We all want to make it work make it right and share our ideas to get the job done! So here is your form go wild. We are also on linkedin!! ​ https://www.linkedin.com/groups/8525355
2 comments
Be the first person to recommend this.
IT specialists purchasing SIM tools need to concentrate on several important characteristics when examining and evaluating vendor offers. As environments in which SIM systems will be implemented may vary, all IT supervisors searching for security information management products should ask themselves the following: So how exactly does the tool scale? IT supervisors should calculate the quantity of devices from which they need to gather data question the supplier if their solutions may handle the big volumes of log information. A lot of SIM solutions show what number of events per second they are able to catch, evaluate and store....
0 comments