SlideShare une entreprise Scribd logo
1  sur  21
Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
WAIT
? What  is Enterprise 2.0
? What  is ECM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object]
IMPORTANCE
Understanding
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source:  AIIM Content Security Market IQ, 2007
What Content Types Are You Targeting With Content Security? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
How Well Does Your Organization Understand Content Security? Source:  AIIM Content Security Market IQ, 2007
Who Owns The Content Security Initiative in Your Organization? Source:  AIIM Content Security Market IQ, 2007
Do You Have a Specific Group Within Your Organization to Address Content Security?  Source:  AIIM Content Security Market IQ, 2007
[object Object]

Contenu connexe

Tendances

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskCarl Frappaolo
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contactsjbasney
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For EmailSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber SecurityDatix Consulting
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsScott Griffith
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theftDataGravity
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 

Tendances (20)

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber Security
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small Firms
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theft
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 

Similaire à ECM's Role in Enterprise 2.0

KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefingmartingarland
 
Filenet test
Filenet testFilenet test
Filenet testkflana26
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management StrategiesSteve Kessler
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementBrian Huff
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxjeanettehully
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Nadine Burnett
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)Brian Huff
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkinsguiabusinessmedia
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information ManagementJesse Wilkins
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceCheryl McKinnon
 

Similaire à ECM's Role in Enterprise 2.0 (20)

Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefing
 
Filenet test
Filenet testFilenet test
Filenet test
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management Strategies
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content Management
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open Source
 
Document repositories-and-metadata
Document repositories-and-metadataDocument repositories-and-metadata
Document repositories-and-metadata
 

Plus de Carl Frappaolo

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCarl Frappaolo
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy DevelopmentCarl Frappaolo
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationCarl Frappaolo
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Carl Frappaolo
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxCarl Frappaolo
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and FictionCarl Frappaolo
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Carl Frappaolo
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Carl Frappaolo
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability WebinarCarl Frappaolo
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market StudyCarl Frappaolo
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to CompeteCarl Frappaolo
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinarCarl Frappaolo
 

Plus de Carl Frappaolo (16)

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural Barrier
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy Development
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the Box
 
Measuring Knowledge
Measuring KnowledgeMeasuring Knowledge
Measuring Knowledge
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and Fiction
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0
 
BPM Market IQ
BPM Market IQBPM Market IQ
BPM Market IQ
 
Findability Market IQ
Findability Market IQFindability Market IQ
Findability Market IQ
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability Webinar
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market Study
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to Compete
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinar
 
IRM and E-discovery
IRM and E-discoveryIRM and E-discovery
IRM and E-discovery
 

Dernier

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

ECM's Role in Enterprise 2.0

  • 1. Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
  • 3. ? What is Enterprise 2.0
  • 4. ? What is ECM
  • 5. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 6. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 7.
  • 8. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 9.
  • 12.
  • 13.
  • 14. Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source: AIIM Content Security Market IQ, 2007
  • 15. What Content Types Are You Targeting With Content Security? Source: AIIM Content Security Market IQ, 2007
  • 16. Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 17. Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 18. How Well Does Your Organization Understand Content Security? Source: AIIM Content Security Market IQ, 2007
  • 19. Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
  • 20. Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
  • 21.

Notes de l'éditeur

  1. Old Buzzword - New Buzzword But before we jump In I thought