SlideShare uma empresa Scribd logo
1 de 27
Romulo Lopez
&
Rainer Heufers

DATA MANAGEMENT AND OFFICE
COMMUNICATION
Biggest problem in today’s
office
 Too much information (TMI)
 Information overload (where do I start)
 Consumerization of resources everyone is
  their own IT.
 Connecting the dots
 Disperse knowledge (Information Silos)
Tools to communicate

 Email
 Social Networks
 Wiki’s
 Intranets
 Blogs
 Youtube
Tools to store information

 Paper
 Mainframes
 Servers and PC (Personal Computer)
 External disks (Laptops)
 SAS (Software as a Service)
 Cloud
Information storage paradigm
shift.
   Paper
   Mainframes - Dumb Terminals Not much can be done
   Personal computer revolution. Store everything on your PC
   Information Grows, use external storage
   Cloud storage
     Box
     Dropbox
     Sugar Sync
 PC is again a dumb or nearly dumb terminal, we use
  phones, tablets, readers, VDI (Virtual Desktop
  Infrastructure)
 Technology has gone from being centralized, to de-
  centralized to being a commodity like electricity or water.
Email Tools

 Exchange server, Outlook
 Hotmail, Yahoo, Gmail
 Offline email programs (for when you are not
  able to be online)
 Franklin Covey (Franklin Planner)
  Categorization
 Zero Inbox Philosophy
Other alternatives to email

 Social Networks
 Facebook private messages
 SMS and Twitter (hash tags)
 Google Hangouts
 Skype
 Comment tools in services like Box or Wiki or
  sites.
Document Collaboration

 Microsoft Office (SharePoint and now Office
    Live)
    http://www.microsoft.com/office/olsb/Splitte
    r-EN-US.html
   Google Docs https://docs.google.com
   Zoho Docs https://www.zoho.com/docs/
   Adobe PDF (you need full PDF version to use
    it)
   Wikia (from Wikipedia platform)
    ttp://www.wikia.com/Wikia
Document Collaboration
                 Less known but interesting
 Slide Share http://www.slideshare.net/
 Prezi http://prezi.com/explore/
 WebEx
 GoToMeeting (Atlas uses this)
Content Management systems
CMS
 Sharepoint
 Wordpress
 Typepad
 Blogger
 Wikis
 Microsoft Content Management Server
 Tumblr (Microblogging)
 Twitter (Microblogging)
Security

 Norton
 Microsoft Security Essentials
 Trust Apple security and genius like a
  Clapping seal!!
 If you are a geek use weird operating systems
  like Linux or friendly Ubuntu.
Security – Passwords

 Lastpass https://lastpass.com/
 Keypass http://keepass.info/
 Double Authentication
  http://support.google.com/accounts/bin/ans
  wer.py?hl=en&answer=180744
 Fingerprint reader on laptop?
 Random number generator
Security – Backups

 Mozy
 Carbonite
 Amazon Cloud S3, Amazon Cloud Player
 Box
 Dropbox
 Icloud (Apple, Itunes for Music)
 Google docs, Picasa Web (Pictures)
 You-tube
Security guidelines
 Keep sensitive information of the net.
 Spend time designing your security strategy.
 Use encryption whenever possible.
 Password protect your user when you turn your computer even
  after screensaver.
 Wipe used hard drives or destroy them with a construction
  hammer, before recycling computer. Darik's Boot And Nuke
 Beware of social engineering attacks.
  http://en.wikipedia.org/wiki/Social_engineering_%28security%2
  9
 Don’t be a fool. (If you fear someone finding your weird stuff,
  don’t even have it online).
  http://online.wsj.com/article/SB1000142405297020479530457722
  1164189123608.html (Why we tell all online)
Security tools
 Password manager
 Disk encryption in your computer, password protect your system
  (including after screensaver)
 Always use and enable https on email and other services.
 Avoid open Wifi, secure your home or office wifi.
 Use VPN if you need to use open wifi
       Hamachi https://secure.logmein.com/products/hamachi/download.aspx
   Change passwords frequently, specially after trips
   Check what IP’s are used to log on to your email, become familiar with
    your usual IP’s
   If you stop using an old account, visit it once a month and delete junk
    and change passwords. Forward emails to your main account.
   Register your cellphone with email in case you get locked out.
   Password protect your phone, have remote wipe procedures.
   Fill out security questions in case you get locked out.
Database

 CRM or ERP?
 Custom Made (might require to host server)
 Microsoft Access
 Salesforce (cloud)
Financial Software
The Mighty Might
 Quicken
 Mint
 Peachtree
 Quickbooks
Or the 800 pound Gorillas
 Raisers Edge
 Sage
 Microsoft Dynamics
 Sage ERP
Check this link:
http://www.techsoup.org/learningcenter/software/page5144.cfm
Voice and Video
communications
 Skype
 VoIP (Vonage.com, Google Voice)
 Google Hangouts
 WebEx
 GoToMeeting
 Cell phones- Smartphones
 PBX (does anyone uses this?)
Licenses

 Techsoup http://www.techsoup.org
 Microsoft
 Adobe
 Intuit.
 Pay as you go (pay by service) specially if you
  are in the cloud.
 Use open source
 www.ninite.com
A few principles before
choosing software, hardware
or tools.
   Consider it’s learning curve
   Network effects
   Lock in costs
   Don’t forget that software and hardware are tools not your main
    business reason.
   Outsource whenever possible
   Give crowdsourcing a chance.
   Rent don’t own
   SAAS prefer out of the box ready to work solutions, avoid servers
    or costly custom built solutions that depend on a developer or
    particular company.
Working trends
   Working from home.
   Working from your nearest coffee house.
   Using shared office spaces.
   Working on a different country or town
   Outsourcing
   Crowdsourcing
   Kony 2012, Invisible Children campaign
   Wikipedia
   Readers, how many of you try to sell your books?
   Usage of mobile devices, IPAD, Kindle
    http://www.inc.com/business-travel-2011/apps-that-make-
    your-ipad-work-like-a-laptop.html
Bonus tool to learn

    How to manage your crazy Inbox
         The Zero Inbox Tool
Zero Inbox Philosophy

 Works best when you can archive messages (not
  delete)
 Keep inbox clean only stuff that is current and
  not pending is kept, anything that has been
  already taken care has been archived.
 Newsletters and non important stuff is archived.
 Personal stuff is handled with Personal email.
  (keep your professional and your personal life
  separate).
 Unsubscribed from unwanted email or mark as
  Spam what is spam.
Zero Inbox Philosophy(cont.)

 Use search function to find emails.
 Enforce good subject lines, avoid hi, hello,
  just wondering, funny subject lines.
 Keep messages brief, avoid online discussion
  unless necessary
 Use email to keep track record.
 Avoid attachments, include relevant
  information in message.
How to Start Zero Inbox

 Spend long hours filtering stuff and deleting.
 Risk loosing important information
 Preferred option in Extreme cases


    Declare email bankruptcy.
Final recommendations

 Live a more automatic life
  http://blogs.hbr.org/schwartz/2012/03/why-you-
  need-to-make-your-life.html?cm_sp=blog_flyout-_-
  schwartz-_-why_you_need_to_make_your_life,
  internalize best practices, rehearse and repeat spend
  more time thinking about new stuff.
 Learn to learn and Read to just read. (use Blog
  readers-RSS, Google Reader, Facebook or Twitter to
  find material to read)
 Develop your own brand, keep your reputation, both
  offline and online.
 Small changes lead to big changes (Personal story)
Change is
possible

Mais conteúdo relacionado

Destaque

Service Coordination Overview Brochure
Service Coordination Overview BrochureService Coordination Overview Brochure
Service Coordination Overview BrochureBarry Newlin
 
Sales invoice standard (1)
Sales invoice standard (1)Sales invoice standard (1)
Sales invoice standard (1)kiabras
 
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorAutomating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorDigicomp Academy AG
 
APC AHNLAB Antivirus
APC AHNLAB AntivirusAPC AHNLAB Antivirus
APC AHNLAB Antivirusdaten
 
16025_callsheet_080516
16025_callsheet_08051616025_callsheet_080516
16025_callsheet_080516Scott Williams
 
The Why, How and What of Measuring Content
The Why, How and What of Measuring ContentThe Why, How and What of Measuring Content
The Why, How and What of Measuring ContentLars von Sneidern
 
Hortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleHortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleFull Time
 
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Visibl Me
 
Módulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasMódulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasAlejandro Cruz Artunduaga
 
Documento pdm el almendro
Documento pdm el almendroDocumento pdm el almendro
Documento pdm el almendroCalandro Calado
 
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dataconomy Media
 

Destaque (20)

Anteceden..[1]
Anteceden..[1]Anteceden..[1]
Anteceden..[1]
 
Service Coordination Overview Brochure
Service Coordination Overview BrochureService Coordination Overview Brochure
Service Coordination Overview Brochure
 
Gamba Natural en Castilla y León Económica
Gamba Natural en Castilla y León EconómicaGamba Natural en Castilla y León Económica
Gamba Natural en Castilla y León Económica
 
Bexi xexy
Bexi xexyBexi xexy
Bexi xexy
 
Tema 3 ozuna
Tema 3 ozunaTema 3 ozuna
Tema 3 ozuna
 
Sales invoice standard (1)
Sales invoice standard (1)Sales invoice standard (1)
Sales invoice standard (1)
 
Ppsmito
PpsmitoPpsmito
Ppsmito
 
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorAutomating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
 
Oferta especial biodental 2012
Oferta especial biodental   2012Oferta especial biodental   2012
Oferta especial biodental 2012
 
APC AHNLAB Antivirus
APC AHNLAB AntivirusAPC AHNLAB Antivirus
APC AHNLAB Antivirus
 
16025_callsheet_080516
16025_callsheet_08051616025_callsheet_080516
16025_callsheet_080516
 
The Why, How and What of Measuring Content
The Why, How and What of Measuring ContentThe Why, How and What of Measuring Content
The Why, How and What of Measuring Content
 
Hortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleHortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar Ville
 
3 double-take omega
3 double-take omega3 double-take omega
3 double-take omega
 
Cp ugm ucinf
Cp ugm ucinfCp ugm ucinf
Cp ugm ucinf
 
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
 
Módulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasMódulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsas
 
Tout écran, tous à cran?
Tout écran, tous à cran?Tout écran, tous à cran?
Tout écran, tous à cran?
 
Documento pdm el almendro
Documento pdm el almendroDocumento pdm el almendro
Documento pdm el almendro
 
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
 

Semelhante a Data management and office communication

OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" J T "Tom" Johnson
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Blogtalk 2008
 
Password management
Password managementPassword management
Password managementKaren F
 
Jisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationJisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationTransition Bristol
 
Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Andrea Vaccarella
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Creating a productive work environment
Creating a productive work environmentCreating a productive work environment
Creating a productive work environmentRachel Eichen
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012Highway T
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computingJan Wong
 
Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Mark Frydenberg
 

Semelhante a Data management and office communication (20)

Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption"
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008
 
Password management
Password managementPassword management
Password management
 
Jisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationJisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For Education
 
Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013
 
Wpd09 Sydney
Wpd09 SydneyWpd09 Sydney
Wpd09 Sydney
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Creating a productive work environment
Creating a productive work environmentCreating a productive work environment
Creating a productive work environment
 
Free and Low Cost Tools - Coldwater 10-09
Free and Low Cost Tools - Coldwater 10-09Free and Low Cost Tools - Coldwater 10-09
Free and Low Cost Tools - Coldwater 10-09
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Internet security
Internet securityInternet security
Internet security
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computing
 
Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Bentley College Computing Resources 2008
Bentley College Computing Resources 2008
 

Último

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Último (20)

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

Data management and office communication

  • 1. Romulo Lopez & Rainer Heufers DATA MANAGEMENT AND OFFICE COMMUNICATION
  • 2. Biggest problem in today’s office  Too much information (TMI)  Information overload (where do I start)  Consumerization of resources everyone is their own IT.  Connecting the dots  Disperse knowledge (Information Silos)
  • 3. Tools to communicate  Email  Social Networks  Wiki’s  Intranets  Blogs  Youtube
  • 4. Tools to store information  Paper  Mainframes  Servers and PC (Personal Computer)  External disks (Laptops)  SAS (Software as a Service)  Cloud
  • 5. Information storage paradigm shift.  Paper  Mainframes - Dumb Terminals Not much can be done  Personal computer revolution. Store everything on your PC  Information Grows, use external storage  Cloud storage  Box  Dropbox  Sugar Sync  PC is again a dumb or nearly dumb terminal, we use phones, tablets, readers, VDI (Virtual Desktop Infrastructure)  Technology has gone from being centralized, to de- centralized to being a commodity like electricity or water.
  • 6. Email Tools  Exchange server, Outlook  Hotmail, Yahoo, Gmail  Offline email programs (for when you are not able to be online)  Franklin Covey (Franklin Planner) Categorization  Zero Inbox Philosophy
  • 7. Other alternatives to email  Social Networks  Facebook private messages  SMS and Twitter (hash tags)  Google Hangouts  Skype  Comment tools in services like Box or Wiki or sites.
  • 8. Document Collaboration  Microsoft Office (SharePoint and now Office Live) http://www.microsoft.com/office/olsb/Splitte r-EN-US.html  Google Docs https://docs.google.com  Zoho Docs https://www.zoho.com/docs/  Adobe PDF (you need full PDF version to use it)  Wikia (from Wikipedia platform) ttp://www.wikia.com/Wikia
  • 9. Document Collaboration Less known but interesting  Slide Share http://www.slideshare.net/  Prezi http://prezi.com/explore/  WebEx  GoToMeeting (Atlas uses this)
  • 10. Content Management systems CMS  Sharepoint  Wordpress  Typepad  Blogger  Wikis  Microsoft Content Management Server  Tumblr (Microblogging)  Twitter (Microblogging)
  • 11. Security  Norton  Microsoft Security Essentials  Trust Apple security and genius like a Clapping seal!!  If you are a geek use weird operating systems like Linux or friendly Ubuntu.
  • 12. Security – Passwords  Lastpass https://lastpass.com/  Keypass http://keepass.info/  Double Authentication http://support.google.com/accounts/bin/ans wer.py?hl=en&answer=180744  Fingerprint reader on laptop?  Random number generator
  • 13. Security – Backups  Mozy  Carbonite  Amazon Cloud S3, Amazon Cloud Player  Box  Dropbox  Icloud (Apple, Itunes for Music)  Google docs, Picasa Web (Pictures)  You-tube
  • 14. Security guidelines  Keep sensitive information of the net.  Spend time designing your security strategy.  Use encryption whenever possible.  Password protect your user when you turn your computer even after screensaver.  Wipe used hard drives or destroy them with a construction hammer, before recycling computer. Darik's Boot And Nuke  Beware of social engineering attacks. http://en.wikipedia.org/wiki/Social_engineering_%28security%2 9  Don’t be a fool. (If you fear someone finding your weird stuff, don’t even have it online). http://online.wsj.com/article/SB1000142405297020479530457722 1164189123608.html (Why we tell all online)
  • 15. Security tools  Password manager  Disk encryption in your computer, password protect your system (including after screensaver)  Always use and enable https on email and other services.  Avoid open Wifi, secure your home or office wifi.  Use VPN if you need to use open wifi  Hamachi https://secure.logmein.com/products/hamachi/download.aspx  Change passwords frequently, specially after trips  Check what IP’s are used to log on to your email, become familiar with your usual IP’s  If you stop using an old account, visit it once a month and delete junk and change passwords. Forward emails to your main account.  Register your cellphone with email in case you get locked out.  Password protect your phone, have remote wipe procedures.  Fill out security questions in case you get locked out.
  • 16. Database  CRM or ERP?  Custom Made (might require to host server)  Microsoft Access  Salesforce (cloud)
  • 17. Financial Software The Mighty Might  Quicken  Mint  Peachtree  Quickbooks Or the 800 pound Gorillas  Raisers Edge  Sage  Microsoft Dynamics  Sage ERP Check this link: http://www.techsoup.org/learningcenter/software/page5144.cfm
  • 18. Voice and Video communications  Skype  VoIP (Vonage.com, Google Voice)  Google Hangouts  WebEx  GoToMeeting  Cell phones- Smartphones  PBX (does anyone uses this?)
  • 19. Licenses  Techsoup http://www.techsoup.org  Microsoft  Adobe  Intuit.  Pay as you go (pay by service) specially if you are in the cloud.  Use open source  www.ninite.com
  • 20. A few principles before choosing software, hardware or tools.  Consider it’s learning curve  Network effects  Lock in costs  Don’t forget that software and hardware are tools not your main business reason.  Outsource whenever possible  Give crowdsourcing a chance.  Rent don’t own  SAAS prefer out of the box ready to work solutions, avoid servers or costly custom built solutions that depend on a developer or particular company.
  • 21. Working trends  Working from home.  Working from your nearest coffee house.  Using shared office spaces.  Working on a different country or town  Outsourcing  Crowdsourcing  Kony 2012, Invisible Children campaign  Wikipedia  Readers, how many of you try to sell your books?  Usage of mobile devices, IPAD, Kindle http://www.inc.com/business-travel-2011/apps-that-make- your-ipad-work-like-a-laptop.html
  • 22. Bonus tool to learn How to manage your crazy Inbox The Zero Inbox Tool
  • 23. Zero Inbox Philosophy  Works best when you can archive messages (not delete)  Keep inbox clean only stuff that is current and not pending is kept, anything that has been already taken care has been archived.  Newsletters and non important stuff is archived.  Personal stuff is handled with Personal email. (keep your professional and your personal life separate).  Unsubscribed from unwanted email or mark as Spam what is spam.
  • 24. Zero Inbox Philosophy(cont.)  Use search function to find emails.  Enforce good subject lines, avoid hi, hello, just wondering, funny subject lines.  Keep messages brief, avoid online discussion unless necessary  Use email to keep track record.  Avoid attachments, include relevant information in message.
  • 25. How to Start Zero Inbox  Spend long hours filtering stuff and deleting.  Risk loosing important information  Preferred option in Extreme cases Declare email bankruptcy.
  • 26. Final recommendations  Live a more automatic life http://blogs.hbr.org/schwartz/2012/03/why-you- need-to-make-your-life.html?cm_sp=blog_flyout-_- schwartz-_-why_you_need_to_make_your_life, internalize best practices, rehearse and repeat spend more time thinking about new stuff.  Learn to learn and Read to just read. (use Blog readers-RSS, Google Reader, Facebook or Twitter to find material to read)  Develop your own brand, keep your reputation, both offline and online.  Small changes lead to big changes (Personal story)

Notas do Editor

  1. Open discussion, some notes on board, have input from participants.
  2. Remember to discuss organization problems for email.
  3. Systems that allow you to manage your own websites
  4. Do you have any security at all? Are you a Mac user?
  5. Do you use password management strategies?Do you have problems accessing or remembering passwords?Do you save your passwords in the browser?
  6. What would happen if your computer is stolen or disappears on a fire where all your backups are gone?What would you do with your documents
  7. Best Password can be beaten by lack of common senseWhy is it that we have become so prone to share everything we do online. Isn’t this a security threat in your countries? Do you check your security settings in Facebook and twitter. Do you share your personal life to everyone?
  8. -Security can seem ridiculous, but it’s something that is necessary. -Yes there are bad guys out there.-Yes it can happen to you.-No matter what you do someone is going to fool you. Doesn’t means that we can’t or we shouldn’t prepare.-I can see with a easy to find wifi scanner what you are doing on an open wifi. Always encrypt, or learn how to encrypt your communications.-Best tool, if you need to share a password, pick up the phone and call your friend, also a great excuse to talk to people.-Use your memory (or a password manager) no small papers or notes in your corkboard.
  9. Do you get software licenses for your non-profit?Check your country distributors, they are looking for good community partnerships they give away software.
  10. Which technology is more likely to get support from peers(Vhs or Beta and you choose Beta)
  11. Biggest campaign or issue is done by some small guy with a camera and youtube. The power of new and revolutionary ideas that make your think tank irrelevant.
  12. Only if there is time.
  13. The more automatic we live the more time we have to think new problems
  14. Who knows me more than 2 years ago?