SlideShare uma empresa Scribd logo
1 de 54
How to implement ECM?
Global best practices for implementing ECM
using the open methodology MIKE2
Implementation


Which 3 of these typical problems have affected your organization‟s
document or records management implementation?
                                                                     0%   5%   10%       15%   20%   25%   30%   35%   40%   45%

             Underestimated process and organizational issues

 Uneven usage due to poor procedures and lack of enforcement

         Lack of knowledge or training among our internal staff.

                             Project derailed by internal politics
            Low user acceptance due to poor design or clumsy
                            implementation
                                       Excessive quot;scope creepquot;
                                                                                                                                       Actual
                                                                                                                                       Anticipated
         Underestimated the effort to distill and migrate content

                                  Poorly defined business case
                                                                                                                                   Source:
        Failed to secure agreement on fileplans, taxonomy and
                              metadata                                                                                             AIIM ECM Survey
     Failed to think of benefits/issues beyond our business unit.                                                                  February, 2009
              Lack of knowledge or training among our external                                                                     All respondents (284)
                              staff/suppliers.
                                            Budget was overrun

                         Failed to prioritize quot;high-valuequot; content
                                                                                     2
The MIKE2 Methodology


 quot;MIKE2 (Method for an Integrated Knowledge
  Environment) is an Open Source methodology for
  Enterprise Information Managementquot;
  Source: mike2.openmethodology.org
  Developed by BearingPoint, released as Open Source under Creative
   Commons

 Meant to be repeatable and deliver working systems
  quickly, following trends in manufacturing and
  commercial software development
  Continuous improvement (Lean)
  Repeating implementation cycles (Agile)

      © AIIM | All rights reserved     3
MIKE2 Phases (description)


 Phase 1 - Business assessment
 Phase 2 - Technology assessment
 Phase 3 - Information management roadmap
 Phase 4 - Design increment
 Phase 5 - Incremental development, testing, deployment
  and improvement




     © AIIM | All rights reserved   4
MIKE2 Phase 1




                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                           5
Conduct initial direction setting with sponsor


 Sponsor needs to provide            Scope can be defined
  insights                             across a number of
                                       dimensions
 Difficult or impossible to
                                       Geographic
  do everything at once
                                       Organisational
  Scale of change
                                       Legacy content
  Nature of the impact to the
                                       Information types
   organisation
                                       Information classes
  Cost
                                       Timescales

                                      Prioritisation is key

      © AIIM | All rights reserved     6
Programme charter: Overall approach


 Should be developed in 3              Environment: Develop
  stages                                 high-level descriptions of
  Current-state                         Organisational behaviours
  The environment                       ECM support organisation
                                          structure
  The principles & the future-state
                                         ECM processes & instruments
 Future-state
  Produce initial model
  Identify and consult stakeholders
   across the organisation
  Review and revise


       © AIIM | All rights reserved      7
Defining organisationalbehaviours

                       Guidance & Protocols                              Organisational behaviours
  infrastructure FOR
   What we use the




                              ECM Principles                                  ECM 'Best Practices'
                         Examples:
                        • Duty to Share                                    Examples:
                                                             Drive        • Team-working across Functions
                        • Information as a Corporate
                                                                          • Re-using, not re-inventing
                          Resource
                        • Collaborative Working                           • Proactive sharing of knowledge
                                      Embodied




                                                                                           Support
                                         in
  The WAY we use
  the infrastructure




                                                                                  ECM Procedures
                                ECM Rules
                                                                            Examples:
                        Examples:
                                                                           • Procedure for requesting a new
                       • Information must be stored in the
                                                                              Team Site
                                                             Drive
                         appropriate location
                                                                           • Procedure for declaring a record
                       • Information with corporate value
                                                                              to the ECM Repository
                           is stored to the ECM Repository




                                                                     8
   © AIIM | All
rights reserved
Organisational QuickScanfor information
                      development

 Analyses current-state of              Assessments
  organisation across                     Application portfolio and
  multiple facets to identify              functionality
  the baseline for the                    Information flow
  organisation                            Information delivery
  Aids in planning what it will take     Information maturity and
   to get to the future-state vision       infrastructure maturity
                                          Economic value of information
                                          Information processes
                                          People skills and organisational
                                           structure


       © AIIM | All rights reserved       9
Strategic business requirements


 Establishes the overall set of strategic business
  requirements (business case) that translate into high
  level information requirements
 Forms the basis for scoping the programme
  Strategic business vision
  Strategic critical success factors (CSFs)
  Strategic key performance indicators (KPIs)
  Strategic success measures
  Strategic change drivers



       © AIIM | All rights reserved      10
Strategic business vision


 Defines what organisation wishes to achieve in the
  Future-State
 Done by interviewing executives via scripts to capture
  Business objectives
  Competitive forces of concern
  Differentiation and positioning statements
  Major customers, buying habits and cycles
  Major suppliers and incentives
  Major competitors, substitutes and discriminators
  Industry and historical supply chains
  Success factors
      © AIIM | All rights reserved         11
Business blueprint


 Key deliverable of MIKE2
 Final strategic analysis and synthesis of business
  assessment work
  Completes and formalises the business vision

 Completion of business blueprint results in
  Prioritised requirements
  Programme plan
  Business case
  Programme blueprint



      © AIIM | All rights reserved     12
Eat the elephant one bite at a time


 Go for specific projects,
  one at a time
 Each project addresses
  portion of ECM producing
  business value
  Start with something nutritious,
   not small and convenient

 Produce business case for
  each of these projects
  separately

       © AIIM | All rights reserved   13
Prioritise requirements


 Refines the strategic information requirements
  Determines the sequence of projects
  Strategic vs. tactical
  Within scope and outside of scope

 Ranking done via group workshops with executives who
  provided initial feedback
  With guidance of sponsor and stakeholders as appropriate
  Focus is on business requirements, not technology requirements

 Results in a list of work opportunities for the project


       © AIIM | All rights reserved      14
Linking tactics to strategy

       Drives
       Contributes to                    (Balanced scorecard)

                                                            Management /
   Strategic                                               executive board
   (C-level)

   Operational
                                                   Business area managers
   (Consequential impact)


                                                             Users / other
   Tactical
                                                             stakeholders




     © AIIM | All rights reserved   15
Business blueprint components


 Arranged in key sections
  Executive summary
  High-level programme plan
  Business case
   Strategic case
   Economic case
   Funding case
   Commercial case
   Project management case
  Future-state conceptual architecture
  Appendix

      © AIIM | All rights reserved        16
MIKE2 Phase 2




                             You are here




                                            Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                                    17
Technology assessment


 Concentrates on the technical aspects of your strategy
 Technology blueprint
  Strategically ties the business requirements developed in Phase 1 to a
   logical and physical information architecture

 Completes the “strategic programme blueprint”
  Defines the overall programme delivery plan that provides the starting
   point for the continuous implementation phase
  Refines the business requirements through ECM
  Defines the technology architecture
  Puts standards and technical infrastructure in place to support the
   software development process
      © AIIM | All rights reserved       18
Business drives technology


 Phase 1 and 2 parallelism
 Phase 1 deliverables must be completed before phase 2
  can be completed
  Specifically, phase 2 requires the following from phase 1 before a full
   infrastructure can be prescribed:
   Business vision
   High-level business case
   High-level information processes
   Scope of key systems




       © AIIM | All rights reserved      19
How to produce requirements: Overview


 5 main stages
  1. Plan
                                                  Plan
  2. Gather
  3. Analyse
  4. Document                         Agree                 Gather
  5. Agree

 Some stages are iterative
  and parts of entire process
                                           Document      Analyse
  can be iterative



       © AIIM | All rights reserved   20
Conduct gap analysis of current-state and
                             future-state

 Identify key gaps between current-state architecture and
  future-state
  Where will new capabilities be needed?
  What are those requirements?

 Becomes basis for RFP and vendor selection




      © AIIM | All rights reserved     21
MIKE2 Governance model




                    Improved Governance and Operating Model

                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                          22
Why information governance?


 Accountability for organisation‟s information assets
 Good governance
  Ensures compliance with regulations and legislation
  Enables productivity improvements
  Enables organisation to respond to change and new opportunities
  Helps information exchange with customers, partners and providers

 Sustains good information management practices




      © AIIM | All rights reserved      23
An information governance framework (IGF)


 A sound IGF includes


                                                 Policies




                         Processes                          Standards




                                      Tools &
         People                                               Audit
                                    technology



     © AIIM | All rights reserved                24
The role of ECM in information governance


 ECM environment is
  Key tool for Information Governance
  Repository for corporate memory

 ECM systems depend on creation and maintenance of
  „Content Management Instruments‟, including:
  Reference data (taxonomy, thesaurus, etc.)
  Metadata standard for information, including documents, records, and
   websites etc.
  Security and access classification scheme
  Disposition schedules


      © AIIM | All rights reserved       25
Continuous improvement

 Compliance Framework

  Detect                                                      Respond
                                   Detect         Respond
  • Audit                                                     • Investigation
  • Ombudsperson                                              • Communication
  • Monitoring                                                • Improvements
                                            Prevent
                                                              • Employee discipline
                                    Prevent
                                    • Risk assessments
                                    • Training
                                    • Policies & procedures
                                    • Executive commitment
    © AIIM | All rights reserved                  26
MIKE2 Phase 3 Roadmap


• Roadmap




    © AIIM | All rights reserved   27
Project roadmap overview


 Project roadmap is the guide for the entire project
  In each iteration of phase 3-5 however, it is the restricted guide for the
   requirements and level of detail involved in a SINGLE iteration

 Tasks
  Define overall release functionality
  Identify and prioritise project risks
  Identify infrastructure dependencies
  Identify design dependencies
  Define acceptance procedures
  Define detailed project plan


       © AIIM | All rights reserved        28
Identify and prioritise project risks


With each iteration, re-examine risks for iteration and project as a whole


Risk                       Likelihood Severity Mitigation
There is a risk to         Medium     Severe   Have two key developers undergo
schedule and                                   training.
quality as                                     Have a third party specialising in this
developers are                                 technology review high level designs
unfamiliar with                                before coding starts.
proposed                                       Prototype first two function points
technology for the                             before the remainder of the code is
project                                        developed.




       © AIIM | All rights reserved            29
MIKE2 Phase 3 Foundation activities


 Software development readiness
 Enterprise information
  architecture
 Taxonomy design
 Metadata development
 Solution architecture
  definition/revision
 Prototype the solution
  architecture




     © AIIM | All rights reserved   30
Foundation activities (1)


 Focused on ensuring that the environment is ready and
  that basic solution decisions have been made
 Important to establish at the beginning of each design,
  develop, deploy increment
 Primarily focused on understanding information issues,
  resolving these problems and defining target content
  models
 If not conducted first, other subsequent implementation
  work is likely to fail

                                    Source: http://mike2.openmethodology.org
     © AIIM | All rights reserved                          31
Foundation activities (2)


 Technical and design foundations
 Iterative
 Risk assessment and management




      © AIIM | All rights reserved   32
Taxonomic needs assessment

Cynefin framework




                                    Source: Dave Snowden
     © AIIM | All rights reserved                 33
Developing a taxonomy


                                        Identify
                                     stakeholders

                          Gather                         Define
                         feedback                       purpose




                      Deploy                              Determine
                      scheme                              approach




                                                         Collect
                      Pilot scheme
                                                      information


                                       Develop
                                       scheme


   © AIIM | All rights reserved                  34
MIKE2 Phase 4




                                                                You are here

                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                          35
Identify training and administration guide
                            requirements

 Used to estimate training needs
  Varies depending on complexity of the system, amount of change to the
   organisation required and ability of users to absorb the material

 Questions answered
  What is the nature of the audience and the contexts they will be using
   the ECM environment?
  Who will need the documentation, at what level, when and why?

 Typical targets for training
  Departmental users
  System operators
  Management
      © AIIM | All rights reserved       36
Develop outlines for operational manuals


 There will be multiple operational manuals, targeted at
  the specific audiences identified
 Typical examples
  User procedures manual – for specific business functions
  Operations procedures manual – for technical operations
  Desk procedures – how to do specific business jobs using the system

 Tasks
 1.Examine existing operational manuals for corporate standards
 2.Determine satisfaction with existing manuals
 3.Based on identified requirements, build outline, vet with audience

      © AIIM | All rights reserved       37
Design backup and recovery procedures

 If your solution is based on a single provider, single
  repository - in a word, simple - fairly straightforward
  Distributed, federated, integrated solutions exponentially more complex
  Dirty secret of the ECM industry that backup and recovery is
   exceedingly difficult
   Multiple repositories, integration paths, databases, indices, linkages
    between documents and repositories

 Best approach
  Closely work with solution provider and/or integrators to design and
   verify backup and recovery will actually work




      © AIIM | All rights reserved       38
Business value of prototyping


                       uncertainty




                                            uncertainty decreases over time

                                                               time
      business value
       Cumulative




                                                    Source (top): Barry Boehm
                                     Source (bottom): Jeff Patton, www.agileproductdesign.com
                                                                       39
   © AIIM | All
rights reserved
All users have raised expectations




       Source: NetFlix        Source: Apple iTunes Music Store




                         40
   © AIIM | All
rights reserved
MIKE2 Phase 5


 Develop
  Testing
  Training

 Deploy
 Operate
  Ongoing improvement

 Closeout




      © AIIM | All rights reserved   41
Develop user support documentation


 Created to provide step-by-step documentation, with
  appropriate screenshots, to illustrate an entire process
  or task
  Supplements any automated processes implemented within the system

 Keep in mind how documentation is intended to be used
  in YOUR environment
  Stand-alone reference manual
  Basis for live or on-demand training
  Develop at level of detail necessary for final use




       © AIIM | All rights reserved       42
Develop operations support guides
 Introduction                                                 Job scheduling
  Document distribution list                                  Monitoring & logging
  Document change process                                     Load balancing
                                                               Problem management
 Application overview
                                                               Change management
  Production environment
                                                               Vendor management
  Production architecture overview
                                                               Backup/restore procedures for application
  Production environment components
                                                                components
  Application servers
                                                               System maintenance
  Web servers, etc.
                                                               Print services
 Security                                                     Failure
  Server security configurations
                                                            Appendix A - User account setup process &
  Security log reviews                                      access rights
  Guidelines for access                                    Appendix B - Service level agreements
  Account administration                                   Appendix C - Contact matrix
 Data centre procedures                                    Appendix D - Software versions list
  Startup/shutdown
 Source: http://mike2.openmethodology.org/wiki/Operations_Procedure_Outline_Deliverable_Template
           © AIIM | All rights reserved                        43
Technology backplane development


 Making this available as soon as possible is critical for
  the development of ECM system
  Provides “developer ready” environment to build and test system based
   on work done in foundation activities and design
   Acquisition and training of developers was covered in phase 4

 Tasks
  Implement target repository
  Develop content interface components
  Develop process/automation components
  Develop metadata management integration
  Develop infrastructure management processes

      © AIIM | All rights reserved     44
User testing


 Pilots and model offices are popular approaches
  Refine design and implementation of new ecm-enabled environment by
   directly involving users

 Pilot approach
  Trial of „draft‟ proposed environment
   Uses a small subset of users
   Usually in their normal working environment

 Model office approach
  More of a „laboratory‟ environment - somewhat rare
  Typically used to „get it right‟, before moving to a pilot

       © AIIM | All rights reserved         45
Model offices & pilot: Benefits


 Technical evaluation                   Finalise environment
                                          Ensure all aspects of
 1. Functional testing
                                           environment are defined
 2. System integration testing
                                          Establish and „freeze‟ a
    (SIT)
                                           configuration for roll-out
 3. End-to-end testing (E2E)
                                         Training development
 4. Stress and volume testing
    (SVT)
                                          Develop and assess training
 Functionality evaluation                 materials and methods
                                          Train the trainers, help desk staff,
    Does it do all that is specified
                                           floor-walkers
     and required?
                                           etc.


      © AIIM | All rights reserved       46
Production deployment


 Post-pilot and/or model office work, the environment
  finally reaches a deployment-ready state
 Final steps for deployment involved finalising how the
  solution will be deployed technically for production use
 Tasks
 1. Define distribution and installation method
 2. Deploy baseline production environment
 3. Deploy software to production




      © AIIM | All rights reserved      47
Deploy software to production


 Solution is ready to be released into production, with
  final evaluation and launch of the solution to the target
  communities
 Production and operation procedures should be up and
  running alongside the infrastructure itself




      © AIIM | All rights reserved   48
Evaluation and launch


 Post technical deployment is the final evaluation,
  scheduled launch and post-launch verification and
  support
 Transfers operations and support from the
  development/project team to operations personnel for
  solution moving forward
 Contingency plans for any issues in final testing and
  launch should be in place and ready to activate, should
  any severe issues be identified
 Validates that system is truly ready for rollout

      © AIIM | All rights reserved   49
Training feedback loop


 Collect feedback
  At the time
  And later
                                      Improve           Review
 Review, learn and improve




                                                Learn



       © AIIM | All rights reserved   50
Importance of change readiness assessment


 Organisational change will always appear threatening
  People think of job security
  Some enterprises more freely disseminate information regarding change
   and strategy than others

 You need to assess your enterprise‟s readiness to
  change
  Readiness of management and the workers affected by the change
  How technology is used (or not) within the organisation

 QuickScans and early assessments of Phase 1 provide
  diagnostic tools, while this module is focused on
  enabling necessary change
       © AIIM | All rights reserved     51
Best practices for implementing change


 Change needs to be managed, but there are many
  different methods for this
  However, these methods share common themes

 Most important theme: change occurs in the context of
  the enterprise‟s natural and recognised capabilities
 All successful models
  Address all elements of change
  Provide a process for introducing change
  Address critical success factors




      © AIIM | All rights reserved     52
Creating user “wins”


 Early wins create a “Yes” environment
  Wins should be promoted widely

 Leverage existing and new “super users”
 Wins should be clear cut
  Not open to interpretation

 Wins should bring benefits to all
 Wins should appear to come easily
 Even a big bang approach can be
  delivered via a series of smaller wins…
      © AIIM | All rights reserved   53
AIIM ECM Specialist and Master Program
               - learn how to impl. ECM




                               www.aiim.org/training
© AIIM | All rights reserved              54

Mais conteúdo relacionado

Mais procurados

Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Tom Laszewski
 
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014Amazon Web Services
 
Integrating systems in the age of Quarkus and Camel
Integrating systems in the age of Quarkus and CamelIntegrating systems in the age of Quarkus and Camel
Integrating systems in the age of Quarkus and CamelClaus Ibsen
 
Migrating your Data Centre to AWS
Migrating your Data Centre to AWSMigrating your Data Centre to AWS
Migrating your Data Centre to AWSAmazon Web Services
 
AWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS CloudAWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS CloudAmazon Web Services
 
Mule with workday connectors
Mule with workday connectorsMule with workday connectors
Mule with workday connectorsSon Nguyen
 
Building a Solid Business Case for Cloud Migration
Building a Solid Business Case for Cloud MigrationBuilding a Solid Business Case for Cloud Migration
Building a Solid Business Case for Cloud MigrationAmazon Web Services
 
Real-Time Data Flows with Apache NiFi
Real-Time Data Flows with Apache NiFiReal-Time Data Flows with Apache NiFi
Real-Time Data Flows with Apache NiFiManish Gupta
 
Building a Big Data Pipeline
Building a Big Data PipelineBuilding a Big Data Pipeline
Building a Big Data PipelineJesus Rodriguez
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...Amazon Web Services
 
Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Adrien Blind
 
Enterprise communication using archiMate
Enterprise communication using archiMateEnterprise communication using archiMate
Enterprise communication using archiMateLouw Labuschagne
 
Integrating microservices with apache camel on kubernetes
Integrating microservices with apache camel on kubernetesIntegrating microservices with apache camel on kubernetes
Integrating microservices with apache camel on kubernetesClaus Ibsen
 
Digital reference architecture in hybrid cloud
Digital reference architecture in hybrid cloudDigital reference architecture in hybrid cloud
Digital reference architecture in hybrid cloudDavide Veronese
 
Modern Enterprise integration Strategies
Modern Enterprise integration StrategiesModern Enterprise integration Strategies
Modern Enterprise integration StrategiesJesus Rodriguez
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
Apache Superset at Airbnb
Apache Superset at AirbnbApache Superset at Airbnb
Apache Superset at AirbnbBill Liu
 

Mais procurados (20)

Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
 
Integrating systems in the age of Quarkus and Camel
Integrating systems in the age of Quarkus and CamelIntegrating systems in the age of Quarkus and Camel
Integrating systems in the age of Quarkus and Camel
 
Migrating your Data Centre to AWS
Migrating your Data Centre to AWSMigrating your Data Centre to AWS
Migrating your Data Centre to AWS
 
AWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS CloudAWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS Cloud
 
Mule with workday connectors
Mule with workday connectorsMule with workday connectors
Mule with workday connectors
 
Dataflow with Apache NiFi
Dataflow with Apache NiFiDataflow with Apache NiFi
Dataflow with Apache NiFi
 
Building a Solid Business Case for Cloud Migration
Building a Solid Business Case for Cloud MigrationBuilding a Solid Business Case for Cloud Migration
Building a Solid Business Case for Cloud Migration
 
Real-Time Data Flows with Apache NiFi
Real-Time Data Flows with Apache NiFiReal-Time Data Flows with Apache NiFi
Real-Time Data Flows with Apache NiFi
 
Building a Big Data Pipeline
Building a Big Data PipelineBuilding a Big Data Pipeline
Building a Big Data Pipeline
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)
 
Enterprise communication using archiMate
Enterprise communication using archiMateEnterprise communication using archiMate
Enterprise communication using archiMate
 
Integrating microservices with apache camel on kubernetes
Integrating microservices with apache camel on kubernetesIntegrating microservices with apache camel on kubernetes
Integrating microservices with apache camel on kubernetes
 
Digital reference architecture in hybrid cloud
Digital reference architecture in hybrid cloudDigital reference architecture in hybrid cloud
Digital reference architecture in hybrid cloud
 
Modern Enterprise integration Strategies
Modern Enterprise integration StrategiesModern Enterprise integration Strategies
Modern Enterprise integration Strategies
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Oracle Cloud Infrastructure
Oracle Cloud InfrastructureOracle Cloud Infrastructure
Oracle Cloud Infrastructure
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
Apache Superset at Airbnb
Apache Superset at AirbnbApache Superset at Airbnb
Apache Superset at Airbnb
 

Destaque

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachSam Thomsett
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyShiva Hullavarad
 
Deliver a Successful ECM Project
Deliver a Successful ECM ProjectDeliver a Successful ECM Project
Deliver a Successful ECM ProjectNuxeo
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesThe Dayhuff Group
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information ManagementBilly Cripe
 

Destaque (6)

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation Strategy
 
Deliver a Successful ECM Project
Deliver a Successful ECM ProjectDeliver a Successful ECM Project
Deliver a Successful ECM Project
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human Resources
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information Management
 
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
 

Semelhante a How to implement ECM?

Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support ServicesSteven Bonacorsi
 
Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support ServicesSteven Bonacorsi
 
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...IEEEP Karachi
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayGovCloud Network
 
Csi Blackbelt Ia Masterclass Kl
Csi Blackbelt  Ia Masterclass KlCsi Blackbelt  Ia Masterclass Kl
Csi Blackbelt Ia Masterclass KlTommy Seah
 
Csi Blackbelt Ia Masterclass Sg
Csi Blackbelt  Ia Masterclass SgCsi Blackbelt  Ia Masterclass Sg
Csi Blackbelt Ia Masterclass SgTommy Seah
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogerstrogers77
 
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeAPQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeMarc Aafjes
 
On Kue Business Architecture101
On Kue Business Architecture101On Kue Business Architecture101
On Kue Business Architecture101Carolyn N. Evans
 
Change Management
Change ManagementChange Management
Change Managementpromoking
 
Learning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersLearning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersCorpU
 
5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Finalphlckb
 
Toward Innovation Capability Maturity
Toward Innovation Capability MaturityToward Innovation Capability Maturity
Toward Innovation Capability MaturityHeinz Essmann
 
Infusing EPM in people and process
Infusing EPM in people and processInfusing EPM in people and process
Infusing EPM in people and processRavi Tirumalai
 
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining PresentationTim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining Presentationtimbates2
 
Streamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationStreamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationCallidus Software
 
Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)muzamilsecova
 
The Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsThe Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsOneSpring LLC
 

Semelhante a How to implement ECM? (20)

Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support Services
 
Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support Services
 
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Csi Blackbelt Ia Masterclass Kl
Csi Blackbelt  Ia Masterclass KlCsi Blackbelt  Ia Masterclass Kl
Csi Blackbelt Ia Masterclass Kl
 
Csi Blackbelt Ia Masterclass Sg
Csi Blackbelt  Ia Masterclass SgCsi Blackbelt  Ia Masterclass Sg
Csi Blackbelt Ia Masterclass Sg
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogers
 
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeAPQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
 
On Kue Business Architecture101
On Kue Business Architecture101On Kue Business Architecture101
On Kue Business Architecture101
 
Change Management
Change ManagementChange Management
Change Management
 
Agile For Marketers
Agile For MarketersAgile For Marketers
Agile For Marketers
 
Learning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersLearning Organization Governance for Top Performers
Learning Organization Governance for Top Performers
 
5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final
 
Toward Innovation Capability Maturity
Toward Innovation Capability MaturityToward Innovation Capability Maturity
Toward Innovation Capability Maturity
 
ERP
ERPERP
ERP
 
Infusing EPM in people and process
Infusing EPM in people and processInfusing EPM in people and process
Infusing EPM in people and process
 
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining PresentationTim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
 
Streamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationStreamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales Organization
 
Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)
 
The Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsThe Stream Process™ for Defining Projects
The Stream Process™ for Defining Projects
 

Mais de Atle Skjekkeland

The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0Atle Skjekkeland
 
How to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesHow to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesAtle Skjekkeland
 
State of the Capture Industry 2014
State of the Capture Industry 2014State of the Capture Industry 2014
State of the Capture Industry 2014Atle Skjekkeland
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM systemAtle Skjekkeland
 
How to create a mobile strategy
How to create a mobile strategyHow to create a mobile strategy
How to create a mobile strategyAtle Skjekkeland
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
How to Automate Records Management
How to Automate Records ManagementHow to Automate Records Management
How to Automate Records ManagementAtle Skjekkeland
 
How to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minHow to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minAtle Skjekkeland
 
The New World of Marketing and Sales
The New World of Marketing and SalesThe New World of Marketing and Sales
The New World of Marketing and SalesAtle Skjekkeland
 
How to sell ECM consulting?
How to sell ECM consulting?How to sell ECM consulting?
How to sell ECM consulting?Atle Skjekkeland
 
What does it take to be an ECM expert?
What does it take to be an ECM expert?What does it take to be an ECM expert?
What does it take to be an ECM expert?Atle Skjekkeland
 
Riding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessRiding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessAtle Skjekkeland
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
How to set up an online community?
How to set up an online community?How to set up an online community?
How to set up an online community?Atle Skjekkeland
 
New Information Certification
New Information CertificationNew Information Certification
New Information CertificationAtle Skjekkeland
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
How to implement share point
How to implement share pointHow to implement share point
How to implement share pointAtle Skjekkeland
 

Mais de Atle Skjekkeland (20)

The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0
 
What is Content Analytics
What is Content AnalyticsWhat is Content Analytics
What is Content Analytics
 
How to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesHow to sell MCS - Managed Content Services
How to sell MCS - Managed Content Services
 
State of the Capture Industry 2014
State of the Capture Industry 2014State of the Capture Industry 2014
State of the Capture Industry 2014
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM system
 
How to create a mobile strategy
How to create a mobile strategyHow to create a mobile strategy
How to create a mobile strategy
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
How to Automate Records Management
How to Automate Records ManagementHow to Automate Records Management
How to Automate Records Management
 
How to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minHow to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 min
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
The New World of Marketing and Sales
The New World of Marketing and SalesThe New World of Marketing and Sales
The New World of Marketing and Sales
 
How to sell ECM consulting?
How to sell ECM consulting?How to sell ECM consulting?
How to sell ECM consulting?
 
What does it take to be an ECM expert?
What does it take to be an ECM expert?What does it take to be an ECM expert?
What does it take to be an ECM expert?
 
How to sell solutions
How to sell solutionsHow to sell solutions
How to sell solutions
 
Riding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessRiding the wave of socal media to grow your business
Riding the wave of socal media to grow your business
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
How to set up an online community?
How to set up an online community?How to set up an online community?
How to set up an online community?
 
New Information Certification
New Information CertificationNew Information Certification
New Information Certification
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
How to implement share point
How to implement share pointHow to implement share point
How to implement share point
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

How to implement ECM?

  • 1. How to implement ECM? Global best practices for implementing ECM using the open methodology MIKE2
  • 2. Implementation Which 3 of these typical problems have affected your organization‟s document or records management implementation? 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Underestimated process and organizational issues Uneven usage due to poor procedures and lack of enforcement Lack of knowledge or training among our internal staff. Project derailed by internal politics Low user acceptance due to poor design or clumsy implementation Excessive quot;scope creepquot; Actual Anticipated Underestimated the effort to distill and migrate content Poorly defined business case Source: Failed to secure agreement on fileplans, taxonomy and metadata AIIM ECM Survey Failed to think of benefits/issues beyond our business unit. February, 2009 Lack of knowledge or training among our external All respondents (284) staff/suppliers. Budget was overrun Failed to prioritize quot;high-valuequot; content 2
  • 3. The MIKE2 Methodology  quot;MIKE2 (Method for an Integrated Knowledge Environment) is an Open Source methodology for Enterprise Information Managementquot;  Source: mike2.openmethodology.org  Developed by BearingPoint, released as Open Source under Creative Commons  Meant to be repeatable and deliver working systems quickly, following trends in manufacturing and commercial software development  Continuous improvement (Lean)  Repeating implementation cycles (Agile) © AIIM | All rights reserved 3
  • 4. MIKE2 Phases (description)  Phase 1 - Business assessment  Phase 2 - Technology assessment  Phase 3 - Information management roadmap  Phase 4 - Design increment  Phase 5 - Incremental development, testing, deployment and improvement © AIIM | All rights reserved 4
  • 5. MIKE2 Phase 1 Source: http://mike2.openmethodology.org © AIIM | All rights reserved 5
  • 6. Conduct initial direction setting with sponsor  Sponsor needs to provide  Scope can be defined insights across a number of dimensions  Difficult or impossible to  Geographic do everything at once  Organisational  Scale of change  Legacy content  Nature of the impact to the  Information types organisation  Information classes  Cost  Timescales  Prioritisation is key © AIIM | All rights reserved 6
  • 7. Programme charter: Overall approach  Should be developed in 3  Environment: Develop stages high-level descriptions of  Current-state  Organisational behaviours  The environment  ECM support organisation structure  The principles & the future-state  ECM processes & instruments  Future-state  Produce initial model  Identify and consult stakeholders across the organisation  Review and revise © AIIM | All rights reserved 7
  • 8. Defining organisationalbehaviours Guidance & Protocols Organisational behaviours infrastructure FOR What we use the ECM Principles ECM 'Best Practices' Examples: • Duty to Share Examples: Drive • Team-working across Functions • Information as a Corporate • Re-using, not re-inventing Resource • Collaborative Working • Proactive sharing of knowledge Embodied Support in The WAY we use the infrastructure ECM Procedures ECM Rules Examples: Examples: • Procedure for requesting a new • Information must be stored in the Team Site Drive appropriate location • Procedure for declaring a record • Information with corporate value to the ECM Repository is stored to the ECM Repository 8 © AIIM | All rights reserved
  • 9. Organisational QuickScanfor information development  Analyses current-state of  Assessments organisation across  Application portfolio and multiple facets to identify functionality the baseline for the  Information flow organisation  Information delivery  Aids in planning what it will take  Information maturity and to get to the future-state vision infrastructure maturity  Economic value of information  Information processes  People skills and organisational structure © AIIM | All rights reserved 9
  • 10. Strategic business requirements  Establishes the overall set of strategic business requirements (business case) that translate into high level information requirements  Forms the basis for scoping the programme  Strategic business vision  Strategic critical success factors (CSFs)  Strategic key performance indicators (KPIs)  Strategic success measures  Strategic change drivers © AIIM | All rights reserved 10
  • 11. Strategic business vision  Defines what organisation wishes to achieve in the Future-State  Done by interviewing executives via scripts to capture  Business objectives  Competitive forces of concern  Differentiation and positioning statements  Major customers, buying habits and cycles  Major suppliers and incentives  Major competitors, substitutes and discriminators  Industry and historical supply chains  Success factors © AIIM | All rights reserved 11
  • 12. Business blueprint  Key deliverable of MIKE2  Final strategic analysis and synthesis of business assessment work  Completes and formalises the business vision  Completion of business blueprint results in  Prioritised requirements  Programme plan  Business case  Programme blueprint © AIIM | All rights reserved 12
  • 13. Eat the elephant one bite at a time  Go for specific projects, one at a time  Each project addresses portion of ECM producing business value  Start with something nutritious, not small and convenient  Produce business case for each of these projects separately © AIIM | All rights reserved 13
  • 14. Prioritise requirements  Refines the strategic information requirements  Determines the sequence of projects  Strategic vs. tactical  Within scope and outside of scope  Ranking done via group workshops with executives who provided initial feedback  With guidance of sponsor and stakeholders as appropriate  Focus is on business requirements, not technology requirements  Results in a list of work opportunities for the project © AIIM | All rights reserved 14
  • 15. Linking tactics to strategy Drives Contributes to (Balanced scorecard) Management / Strategic executive board (C-level) Operational Business area managers (Consequential impact) Users / other Tactical stakeholders © AIIM | All rights reserved 15
  • 16. Business blueprint components  Arranged in key sections  Executive summary  High-level programme plan  Business case  Strategic case  Economic case  Funding case  Commercial case  Project management case  Future-state conceptual architecture  Appendix © AIIM | All rights reserved 16
  • 17. MIKE2 Phase 2 You are here Source: http://mike2.openmethodology.org © AIIM | All rights reserved 17
  • 18. Technology assessment  Concentrates on the technical aspects of your strategy  Technology blueprint  Strategically ties the business requirements developed in Phase 1 to a logical and physical information architecture  Completes the “strategic programme blueprint”  Defines the overall programme delivery plan that provides the starting point for the continuous implementation phase  Refines the business requirements through ECM  Defines the technology architecture  Puts standards and technical infrastructure in place to support the software development process © AIIM | All rights reserved 18
  • 19. Business drives technology  Phase 1 and 2 parallelism  Phase 1 deliverables must be completed before phase 2 can be completed  Specifically, phase 2 requires the following from phase 1 before a full infrastructure can be prescribed:  Business vision  High-level business case  High-level information processes  Scope of key systems © AIIM | All rights reserved 19
  • 20. How to produce requirements: Overview  5 main stages  1. Plan Plan  2. Gather  3. Analyse  4. Document Agree Gather  5. Agree  Some stages are iterative and parts of entire process Document Analyse can be iterative © AIIM | All rights reserved 20
  • 21. Conduct gap analysis of current-state and future-state  Identify key gaps between current-state architecture and future-state  Where will new capabilities be needed?  What are those requirements?  Becomes basis for RFP and vendor selection © AIIM | All rights reserved 21
  • 22. MIKE2 Governance model Improved Governance and Operating Model Source: http://mike2.openmethodology.org © AIIM | All rights reserved 22
  • 23. Why information governance?  Accountability for organisation‟s information assets  Good governance  Ensures compliance with regulations and legislation  Enables productivity improvements  Enables organisation to respond to change and new opportunities  Helps information exchange with customers, partners and providers  Sustains good information management practices © AIIM | All rights reserved 23
  • 24. An information governance framework (IGF)  A sound IGF includes Policies Processes Standards Tools & People Audit technology © AIIM | All rights reserved 24
  • 25. The role of ECM in information governance  ECM environment is  Key tool for Information Governance  Repository for corporate memory  ECM systems depend on creation and maintenance of „Content Management Instruments‟, including:  Reference data (taxonomy, thesaurus, etc.)  Metadata standard for information, including documents, records, and websites etc.  Security and access classification scheme  Disposition schedules © AIIM | All rights reserved 25
  • 26. Continuous improvement Compliance Framework Detect Respond Detect Respond • Audit • Investigation • Ombudsperson • Communication • Monitoring • Improvements Prevent • Employee discipline Prevent • Risk assessments • Training • Policies & procedures • Executive commitment © AIIM | All rights reserved 26
  • 27. MIKE2 Phase 3 Roadmap • Roadmap © AIIM | All rights reserved 27
  • 28. Project roadmap overview  Project roadmap is the guide for the entire project  In each iteration of phase 3-5 however, it is the restricted guide for the requirements and level of detail involved in a SINGLE iteration  Tasks  Define overall release functionality  Identify and prioritise project risks  Identify infrastructure dependencies  Identify design dependencies  Define acceptance procedures  Define detailed project plan © AIIM | All rights reserved 28
  • 29. Identify and prioritise project risks With each iteration, re-examine risks for iteration and project as a whole Risk Likelihood Severity Mitigation There is a risk to Medium Severe Have two key developers undergo schedule and training. quality as Have a third party specialising in this developers are technology review high level designs unfamiliar with before coding starts. proposed Prototype first two function points technology for the before the remainder of the code is project developed. © AIIM | All rights reserved 29
  • 30. MIKE2 Phase 3 Foundation activities  Software development readiness  Enterprise information architecture  Taxonomy design  Metadata development  Solution architecture definition/revision  Prototype the solution architecture © AIIM | All rights reserved 30
  • 31. Foundation activities (1)  Focused on ensuring that the environment is ready and that basic solution decisions have been made  Important to establish at the beginning of each design, develop, deploy increment  Primarily focused on understanding information issues, resolving these problems and defining target content models  If not conducted first, other subsequent implementation work is likely to fail Source: http://mike2.openmethodology.org © AIIM | All rights reserved 31
  • 32. Foundation activities (2)  Technical and design foundations  Iterative  Risk assessment and management © AIIM | All rights reserved 32
  • 33. Taxonomic needs assessment Cynefin framework Source: Dave Snowden © AIIM | All rights reserved 33
  • 34. Developing a taxonomy Identify stakeholders Gather Define feedback purpose Deploy Determine scheme approach Collect Pilot scheme information Develop scheme © AIIM | All rights reserved 34
  • 35. MIKE2 Phase 4 You are here Source: http://mike2.openmethodology.org © AIIM | All rights reserved 35
  • 36. Identify training and administration guide requirements  Used to estimate training needs  Varies depending on complexity of the system, amount of change to the organisation required and ability of users to absorb the material  Questions answered  What is the nature of the audience and the contexts they will be using the ECM environment?  Who will need the documentation, at what level, when and why?  Typical targets for training  Departmental users  System operators  Management © AIIM | All rights reserved 36
  • 37. Develop outlines for operational manuals  There will be multiple operational manuals, targeted at the specific audiences identified  Typical examples  User procedures manual – for specific business functions  Operations procedures manual – for technical operations  Desk procedures – how to do specific business jobs using the system  Tasks 1.Examine existing operational manuals for corporate standards 2.Determine satisfaction with existing manuals 3.Based on identified requirements, build outline, vet with audience © AIIM | All rights reserved 37
  • 38. Design backup and recovery procedures  If your solution is based on a single provider, single repository - in a word, simple - fairly straightforward  Distributed, federated, integrated solutions exponentially more complex  Dirty secret of the ECM industry that backup and recovery is exceedingly difficult  Multiple repositories, integration paths, databases, indices, linkages between documents and repositories  Best approach  Closely work with solution provider and/or integrators to design and verify backup and recovery will actually work © AIIM | All rights reserved 38
  • 39. Business value of prototyping uncertainty uncertainty decreases over time time business value Cumulative Source (top): Barry Boehm Source (bottom): Jeff Patton, www.agileproductdesign.com 39 © AIIM | All rights reserved
  • 40. All users have raised expectations Source: NetFlix Source: Apple iTunes Music Store 40 © AIIM | All rights reserved
  • 41. MIKE2 Phase 5  Develop  Testing  Training  Deploy  Operate  Ongoing improvement  Closeout © AIIM | All rights reserved 41
  • 42. Develop user support documentation  Created to provide step-by-step documentation, with appropriate screenshots, to illustrate an entire process or task  Supplements any automated processes implemented within the system  Keep in mind how documentation is intended to be used in YOUR environment  Stand-alone reference manual  Basis for live or on-demand training  Develop at level of detail necessary for final use © AIIM | All rights reserved 42
  • 43. Develop operations support guides  Introduction  Job scheduling  Document distribution list  Monitoring & logging  Document change process  Load balancing  Problem management  Application overview  Change management  Production environment  Vendor management  Production architecture overview  Backup/restore procedures for application  Production environment components components  Application servers  System maintenance  Web servers, etc.  Print services  Security  Failure  Server security configurations  Appendix A - User account setup process &  Security log reviews access rights  Guidelines for access  Appendix B - Service level agreements  Account administration  Appendix C - Contact matrix  Data centre procedures  Appendix D - Software versions list  Startup/shutdown Source: http://mike2.openmethodology.org/wiki/Operations_Procedure_Outline_Deliverable_Template © AIIM | All rights reserved 43
  • 44. Technology backplane development  Making this available as soon as possible is critical for the development of ECM system  Provides “developer ready” environment to build and test system based on work done in foundation activities and design  Acquisition and training of developers was covered in phase 4  Tasks  Implement target repository  Develop content interface components  Develop process/automation components  Develop metadata management integration  Develop infrastructure management processes © AIIM | All rights reserved 44
  • 45. User testing  Pilots and model offices are popular approaches  Refine design and implementation of new ecm-enabled environment by directly involving users  Pilot approach  Trial of „draft‟ proposed environment  Uses a small subset of users  Usually in their normal working environment  Model office approach  More of a „laboratory‟ environment - somewhat rare  Typically used to „get it right‟, before moving to a pilot © AIIM | All rights reserved 45
  • 46. Model offices & pilot: Benefits  Technical evaluation  Finalise environment  Ensure all aspects of 1. Functional testing environment are defined 2. System integration testing  Establish and „freeze‟ a (SIT) configuration for roll-out 3. End-to-end testing (E2E)  Training development 4. Stress and volume testing (SVT)  Develop and assess training  Functionality evaluation materials and methods  Train the trainers, help desk staff,  Does it do all that is specified floor-walkers and required? etc. © AIIM | All rights reserved 46
  • 47. Production deployment  Post-pilot and/or model office work, the environment finally reaches a deployment-ready state  Final steps for deployment involved finalising how the solution will be deployed technically for production use  Tasks 1. Define distribution and installation method 2. Deploy baseline production environment 3. Deploy software to production © AIIM | All rights reserved 47
  • 48. Deploy software to production  Solution is ready to be released into production, with final evaluation and launch of the solution to the target communities  Production and operation procedures should be up and running alongside the infrastructure itself © AIIM | All rights reserved 48
  • 49. Evaluation and launch  Post technical deployment is the final evaluation, scheduled launch and post-launch verification and support  Transfers operations and support from the development/project team to operations personnel for solution moving forward  Contingency plans for any issues in final testing and launch should be in place and ready to activate, should any severe issues be identified  Validates that system is truly ready for rollout © AIIM | All rights reserved 49
  • 50. Training feedback loop  Collect feedback  At the time  And later Improve Review  Review, learn and improve Learn © AIIM | All rights reserved 50
  • 51. Importance of change readiness assessment  Organisational change will always appear threatening  People think of job security  Some enterprises more freely disseminate information regarding change and strategy than others  You need to assess your enterprise‟s readiness to change  Readiness of management and the workers affected by the change  How technology is used (or not) within the organisation  QuickScans and early assessments of Phase 1 provide diagnostic tools, while this module is focused on enabling necessary change © AIIM | All rights reserved 51
  • 52. Best practices for implementing change  Change needs to be managed, but there are many different methods for this  However, these methods share common themes  Most important theme: change occurs in the context of the enterprise‟s natural and recognised capabilities  All successful models  Address all elements of change  Provide a process for introducing change  Address critical success factors © AIIM | All rights reserved 52
  • 53. Creating user “wins”  Early wins create a “Yes” environment  Wins should be promoted widely  Leverage existing and new “super users”  Wins should be clear cut  Not open to interpretation  Wins should bring benefits to all  Wins should appear to come easily  Even a big bang approach can be delivered via a series of smaller wins… © AIIM | All rights reserved 53
  • 54. AIIM ECM Specialist and Master Program - learn how to impl. ECM www.aiim.org/training © AIIM | All rights reserved 54