SlideShare a Scribd company logo
1 of 4
Download to read offline
Gensui Imaging, Episode 5-
Archive Consolidation
A Short Story by Grant Lindsay
Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced, translated, or reduced to
any electronic medium of machine-readable form, in whole or in part, without the written consent of Sherpa Software Partners, except in
the manner described in the software agreement.
© Copyright 2011 Everest Software, L.P., d.b.a. Sherpa Software Partners, L.P.
All rights reserved. Printed in the United States.
Compliance Attender for Lotus Notes is the registered trademark of Sherpa Software Partners, L.P.
| Page 2 of 4
eter Terrell, Gensui Acme Imaging's Vice President of Technology, sat at his desk engrossed in his
email. Each morning, like this one, he scanned status updates from direct reports, various system
notifications and threaded conversations with various peers and subordinates. His goal was to get a
handle on what needed his immediate attention and what could wait.
The months since Gensui Imaging's merger with Acme Co. had been frantic ones for the entire Information
Technology department. Combining the computer systems of two different companies was complicated and time-
consuming at all levels from senior management down to junior technicians. The only certainty was change.
Absorbed in his triage, Peter failed to notice that his Manager of Messaging Systems, Valerie Wright, had
appeared at his open office door.
She knocked to get his attention. “Have a minute?”
Peter looked up from this laptop screen, “If it's good news.”
“It's not,” Valerie informed him as she stepped into his office anyway.
Peter's shoulders dropped as he sighed. After a pause, he gestured to the chair in front of his desk and Valerie
took a seat.
Peter braced himself, then asked, “Okay. What is it?”
“Ryan lost his laptop,” Valerie said. “Well, had it stolen, apparently?”
“Head of accounting, Ryan? Ryan Thurmond?”
“Yep. He was on a trip out west and his rental car was broken into. His laptop case was on the passenger seat.”
It had taken a moment for Peter to catch up, but now he was wondering why this news was coming from his
Messaging Systems Manager. It seemed more of an issue for Desktop Services and, even then, not one that
needed a face-to-face conversation. The company had internal systems setup for procurement and even
reporting lost and stolen property.
“And this is a Messaging issue because...?”
“Ryan had local mail archives on his laptop,” Valerie revealed. “The Risk Assessment scan we completed last
month shows us what is included in those archives.”
Peter processed this. “And now they're gone...,” he started.
“And we don't have backups of local files,” Valerie completed the picture for her boss. “The messages in that
archive were the only copies.”
“What can we do at this point?” Peter asked.
“For Ryan's mail, nothing. What's gone is gone.”
“I see. Can we do anything going forward?”
“From my perspective, since I care most about the messages and being complaint with retention policies, we
need to get these archives off all laptops and to a place where we can manage them effectively. And there are
other risks besides theft to all this distributed data.”
“Such as?” Peter fished.
“P
| Page 3 of 4
“Hard drives crash. Users do stup... I mean, make mistakes. They can delete whole files on their machines
thinking they are saving space or they can trash individual messages within the archives. All bad things.”
Peter nodded his understanding of the issue. “I assume you have a solution in mind already,” Peter stated. He
knew Val's approach. Along with the problem, she always came with a solution or, at least, some suggestions.
Valerie smiled. “Sherpa Software has a service that will consolidate distributed archives back to our servers
where we can apply retention policies, back up the files and search them when needed. Since we have the
results of their Risk Assessment scan, we also know who has these files and their sizes.”
“And you have a quote, if I know my Val.”
Valerie placed the document on Peter's desk almost before he had finished his sentence. As she left, it occurred
to him that Valerie could—and, given her new role, she should—be empowered to make these decisions herself.
Yes indeed, nothing was certain but change.
| Page 4 of 4
About the Author
As the Product Manager for Compliance Attender for Notes, Grant is responsible for product
research and development, pre-sales technical support (e.g., Demos), post-sales technical
support and competitive research.
Grant joined Sherpa Software in 2007 and has 17 years of experience in Information
Technology. Of those, more than 16 were spent building applications with Lotus Notes and
Domino. He worked with a wide range of company sizes and across several industries
including insurance, consulting, venture capital, manufacturing, software and more.
Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance,
LotusScript, Notes Formula Language, application design and security. He is also skilled in C/C++ and Java
Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered
technologies: HTML, CSS, and JavaScript.
He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends
his off time with his wife, Lydia, of 19 years and their three retired greyhound racers, Rio, Wavorly and Oriole.

More Related Content

Similar to Gensui Acme Imaging — Episode 5: Archive Consolidation

Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysOri Pekelman
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Whats robotic process robotization
Whats robotic process robotizationWhats robotic process robotization
Whats robotic process robotizationMDEmamHossen3
 
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...Dana Gardner
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHLeonardo Sepulcri
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryLeonardo Sepulcri
 
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsAs Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsDana Gardner
 
New text document
New text documentNew text document
New text documentsleucwnq
 
New text document
New text documentNew text document
New text documentsleucwnq
 
Protecting your application investment white paper 0908 2
Protecting your application investment white paper 0908  2 Protecting your application investment white paper 0908  2
Protecting your application investment white paper 0908 2 Laurie LeBlanc
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️Ori Pekelman
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsMuruga J
 

Similar to Gensui Acme Imaging — Episode 5: Archive Consolidation (20)

Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Whats robotic process robotization
Whats robotic process robotizationWhats robotic process robotization
Whats robotic process robotization
 
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
 
Ferret
FerretFerret
Ferret
 
UUUU
UUUUUUUU
UUUU
 
Ferret - Data Seepage
Ferret - Data SeepageFerret - Data Seepage
Ferret - Data Seepage
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISH
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information Delivery
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Managed File Transfer infographic - Files and Tribulations slideshow
Managed File Transfer infographic - Files and Tribulations slideshowManaged File Transfer infographic - Files and Tribulations slideshow
Managed File Transfer infographic - Files and Tribulations slideshow
 
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsAs Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
 
New text document
New text documentNew text document
New text document
 
New text document
New text documentNew text document
New text document
 
Protecting your application investment white paper 0908 2
Protecting your application investment white paper 0908  2 Protecting your application investment white paper 0908  2
Protecting your application investment white paper 0908 2
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 

More from Sherpa Software

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information GovernanceSherpa Software
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media Sherpa Software
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildSherpa Software
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

More from Sherpa Software (12)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Gensui Acme Imaging — Episode 5: Archive Consolidation

  • 1. Gensui Imaging, Episode 5- Archive Consolidation A Short Story by Grant Lindsay Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced, translated, or reduced to any electronic medium of machine-readable form, in whole or in part, without the written consent of Sherpa Software Partners, except in the manner described in the software agreement. © Copyright 2011 Everest Software, L.P., d.b.a. Sherpa Software Partners, L.P. All rights reserved. Printed in the United States. Compliance Attender for Lotus Notes is the registered trademark of Sherpa Software Partners, L.P.
  • 2. | Page 2 of 4 eter Terrell, Gensui Acme Imaging's Vice President of Technology, sat at his desk engrossed in his email. Each morning, like this one, he scanned status updates from direct reports, various system notifications and threaded conversations with various peers and subordinates. His goal was to get a handle on what needed his immediate attention and what could wait. The months since Gensui Imaging's merger with Acme Co. had been frantic ones for the entire Information Technology department. Combining the computer systems of two different companies was complicated and time- consuming at all levels from senior management down to junior technicians. The only certainty was change. Absorbed in his triage, Peter failed to notice that his Manager of Messaging Systems, Valerie Wright, had appeared at his open office door. She knocked to get his attention. “Have a minute?” Peter looked up from this laptop screen, “If it's good news.” “It's not,” Valerie informed him as she stepped into his office anyway. Peter's shoulders dropped as he sighed. After a pause, he gestured to the chair in front of his desk and Valerie took a seat. Peter braced himself, then asked, “Okay. What is it?” “Ryan lost his laptop,” Valerie said. “Well, had it stolen, apparently?” “Head of accounting, Ryan? Ryan Thurmond?” “Yep. He was on a trip out west and his rental car was broken into. His laptop case was on the passenger seat.” It had taken a moment for Peter to catch up, but now he was wondering why this news was coming from his Messaging Systems Manager. It seemed more of an issue for Desktop Services and, even then, not one that needed a face-to-face conversation. The company had internal systems setup for procurement and even reporting lost and stolen property. “And this is a Messaging issue because...?” “Ryan had local mail archives on his laptop,” Valerie revealed. “The Risk Assessment scan we completed last month shows us what is included in those archives.” Peter processed this. “And now they're gone...,” he started. “And we don't have backups of local files,” Valerie completed the picture for her boss. “The messages in that archive were the only copies.” “What can we do at this point?” Peter asked. “For Ryan's mail, nothing. What's gone is gone.” “I see. Can we do anything going forward?” “From my perspective, since I care most about the messages and being complaint with retention policies, we need to get these archives off all laptops and to a place where we can manage them effectively. And there are other risks besides theft to all this distributed data.” “Such as?” Peter fished. “P
  • 3. | Page 3 of 4 “Hard drives crash. Users do stup... I mean, make mistakes. They can delete whole files on their machines thinking they are saving space or they can trash individual messages within the archives. All bad things.” Peter nodded his understanding of the issue. “I assume you have a solution in mind already,” Peter stated. He knew Val's approach. Along with the problem, she always came with a solution or, at least, some suggestions. Valerie smiled. “Sherpa Software has a service that will consolidate distributed archives back to our servers where we can apply retention policies, back up the files and search them when needed. Since we have the results of their Risk Assessment scan, we also know who has these files and their sizes.” “And you have a quote, if I know my Val.” Valerie placed the document on Peter's desk almost before he had finished his sentence. As she left, it occurred to him that Valerie could—and, given her new role, she should—be empowered to make these decisions herself. Yes indeed, nothing was certain but change.
  • 4. | Page 4 of 4 About the Author As the Product Manager for Compliance Attender for Notes, Grant is responsible for product research and development, pre-sales technical support (e.g., Demos), post-sales technical support and competitive research. Grant joined Sherpa Software in 2007 and has 17 years of experience in Information Technology. Of those, more than 16 were spent building applications with Lotus Notes and Domino. He worked with a wide range of company sizes and across several industries including insurance, consulting, venture capital, manufacturing, software and more. Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance, LotusScript, Notes Formula Language, application design and security. He is also skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered technologies: HTML, CSS, and JavaScript. He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends his off time with his wife, Lydia, of 19 years and their three retired greyhound racers, Rio, Wavorly and Oriole.