SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Knowing what’s in store


                How identifying vital information about your data files supports compliance, cuts
                waste and removes implementation risk from IT infrastructure projects

                Summary
                Not all files have equal value. Some are critical to the business. Others could be archived. Still others should be
                deleted. Files used by desktop applications in particular tend to be under-managed and out of control.
                What’s more, the needs of certain files supporting essential business processes—files that should influence the
                design and implementation of the larger IT infrastructure—frequently fly under the IT radar. Files created in older
                software versions, for example, may not function properly unless you convert the files successfully and image the
                new desktop operating environment appropriately. Or files that may be subject to compliance regulations such as
                Sarbanes-Oxley or HIPAA are unknown, undocumented and unprotected.
                This white paper discusses a method that helps you identify which files and applications have high business value
                for your organization. By knowing which files contain critical information or support important business processes,
                you can properly support and protect them. In the end you reduce waste, protect against compliance breaches and
                fines, and lower IT deployment and infrastructure costs.

                Audience
                •   Executives
                •   Deployment managers
                •   Information technology staff
                •   Consultants practicing business desktop deployment, information life cycle management, enterprise content
                    management and related disciplines

                Information to take away
                •   A means to determine a file’s business value
                •   Examples of IT projects which can benefit significantly from identifying business-critical files and applications
                •   Examples of actionable information about files and applications which help improve project planning and
                    implementation
                •   A methodology to ensure desktop file compatibility exists before deploying infrastructure upgrades

                To better manage large IT projects, start by identifying business-critical files
                In a recent engagement with an international power utility, ConverterTechnology discovered over two million files
                existing in duplicate. Of 15 million files on the enterprise’s servers, only five million had been touched in the 18
                months preceding the inventory. Nearly 15 percent of all files were in applications no longer part of the enterprise’s
                standard operating environment. And 1.9 million legacy Microsoft Office files were at risk of malfunctioning upon
                being upgraded to Office 2003.

                Each of these data points helped managers efficiently plan and execute a major server consolidation and desktop
                application upgrade. For example:


Rev. 1.0
Aug. 10, 2010
•   The identification of duplicate files alerted managers to opportunities to conserve disk storage space and
    reduce confusion among file users.
•   The identification of at-risk business-critical files helped make sure they could be converted to function
    properly when deployed for use with Office 2003.
•   The identification of previously unknown files that tracked key financial data facilitated compliance with
    regulatory requirements.

The state of the files influences larger IT issues
Your infrastructure plan determines where your files will be stored and which applications can use them. But as
we see above, it’s also true that the nature of your files may influence which IT systems and application software
versions you can implement. Here’s another real-life example that shows how interconnected every part of the IT
chain can be:
A major Midwestern retail business wanted to make its knowledge workers more productive by facilitating their
collaboration on projects. The company also needed to meet records-retention requirements mandated by the
Sarbanes-Oxley Act. Achieving these goals required the company implement enterprise content management, or
ECM. But, the desired ECM system was based on SharePoint® Services and SharePoint Portal Server, which require
Microsoft Office 2003, and this company was using Office 97. Upgrading wasn’t routine because not all Office 97
files function properly upon being upgraded.
As a result, this company had to (1) identify which files were critical to the business in order to be included in ECM,
and (2) take steps to preserve their functionality upon being upgraded to Office 2003. Only then could their goals
for greater collaboration and regulatory compliance be realized.
The examples above illustrate what we call the “Four C’s” of file management: Consolidation, Compatibility,
Collaboration, and Compliance. Optimizing for each “C” demands clarity about which files to update, share, ignore,
move, archive or delete. Without such clarity, IT projects will deliver less than their potential, cost more than they
should and risk failure altogether. If these examples illustrate some of the problems, what are the solutions?
ConverterTechnology’s method reveals information critical to file management and speeds the IT
upgrade process
ConverterTechnology processes and software help IT professionals discover what they’re dealing with in terms of
files, their business value, and their compatibility with desktop software and other infrastructure upgrades. We
call this process of file discovery, analysis, conversion and migration the ConverterTechnology can help you answer
these questions and more:
• What files have business value to retain, protect, update and migrate?
• Which files should be archived or deleted?
• What does the standard desktop operating environment need to                  Goals
      look like in order to accommodate business-critical files?
• Which tools for automation should be used to quickly and easily               •    Inventory and classify files.
      identify, analyze, and repair problematic files?                          •    Plan efficiently.
                                                                                •    Reduce deployment complexity.
IT scenarios calling for the OfficeConverter                                    •    Shorten schedules.
Microsoft Office software upgrades - for example, converting files from         •    Avoid compliance breaches and
                                                                                     fines.
the Office 97 suite to function properly with Office 2003 or Office 2007
                                                                                •    Lower IT deployment and
ECM implementations - identifying, determining relevance, describing                 infrastructure costs.
and migrating files to enterprise content management systems such as
Windows SharePoint Services
Platform consolidations - relocating files on servers and storage devices
Disaster recovery planning - classifying files to determine the appropriate data protection strategy
An inventory and analysis of the files on your servers tells you what to keep, what to modernize, what to delete,
what to archive, and what needs extra attention to work properly in a new environment. ConverterTechnology’s
OfficeConverter process and tools reveal these key data points about your file inventory:
• Where files reside by site, server, file share, path and filename
• Their concentration by file type and extension
• Total storage space devoted to used, unused or duplicate files
• Files that are critical to the business
• Files that are subject to compatibility errors

OfficeConverter reports
OfficeConverter generates reports you can use to make informed decisions. Reports may be customized to the
needs of a particular project.

Summary of applications found
Information in this report was used to drive a three-part technology refresh: (1) consolidate servers, (2) upgrade
from NT4 and Office 97 to Windows Server 2003 and Office 2003, and (3) migrate from NetWare to Windows
Server 2003. Among other purposes for this information, the enterprise wished to know whether it could reduce
the number of supported applications by omitting non-Microsoft applications from its standard operating
environment without major disruption to the business.

Summary of duplicate files
ConverterTechnology’s OfficeConverter reports help you manage redundant files—a vital task for SharePoint
migrations, server consolidation, file classification and file compatibility projects. The first step is to discover the
extent of the problem.
Shown: excerpt of an actual report for a ConverterTechnology client.
This project defines “business-critical files” as those modified within 18 months prior to this report.
Business-critical file counts by site and server




ConverterTechnology: Specialists in file discovery, analysis, conversion and migration
ConverterTechnology analyzes usage of business critical applications and makes legacy files compatible and useful
with new platforms. Our process involves five stages:
Planning: Determine what resources, time lines and milestones will govern the project.
Discovery: What files exist where, and how relevant are they to the organization’s work.
Compatibility analysis: Determine which files may not open or function correctly upon being upgraded or
relocated.
File conversion: Upon determining which files are at risk to malfunction, fix them automatically, before
deployment.
File migration: Once files are identified, classified and updated, move those files into the proper production
environment.
End-user enterprises have the benefit of faster, more trouble-free technology upgrades.
Service provider partners use our methods, process and software to qualify for more engagements, improve
service, utilize staff more fully, reduce costs and increase profits.
ConverterTechnology can conduct the process from our secure site or your premises.
ConverterTechnology specializes in enterprises with 5,000 desktops or more. Our engagements reach worldwide.
Are you implementing ECM?
        Enterprise content management demands that you classify your enterprise’s files into categories such as the five
        below:
        1. Production files that need to be functional and accessible always.
        2. Less-used files which need to be retained and available due to regulatory or other factors.
        3. Files that should be shared.
        4. Files that may be archived.
        5. Files that ought to be deleted.
        ConverterTechnology can help managers set criteria, classify files and make decisions that help manage enterprise
        content and implement related systems in efficient and effective ways.

        ConverterTechnology file conversion offerings
        ConverterTechnology also supplies OfficeConverter™ software to automate the discovery and repair of at-risk files
        for seamless upgrades to Microsoft Office 2003, Office 2007, or Office 2010. OfficeConverter has following feature
        modules:
        • DiscoverIT
        • ReportIT
        • SubmitIT




ConverterTechnology provides software and services to help enterprises capitalize on the benefits of the Microsoft platform
without the migration risks of data corruption, reduced employee productivity and critical business application down time.
Founded in 1997, ConverterTechnology has helped more than one million users identify, analyze and fix compatibility errors
before they occur, accelerating time to deployment. ConverterTechnology is headquartered in Nashua, N.H., with offices in Europe
and Australia, and is a wholly-owned subsidiary of Powerlan Limited. For more information, visit www.convertertechnology.com

Contenu connexe

Tendances

Document Archieving System (DAS) by In2sol Riyadh
Document Archieving System (DAS) by In2sol RiyadhDocument Archieving System (DAS) by In2sol Riyadh
Document Archieving System (DAS) by In2sol Riyadhin2sol
 
CH005
CH005CH005
CH005JUC
 
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Barclay T. Blair
 
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...Christoph Adler
 
CH004
CH004CH004
CH004JUC
 
ULIS-Desky Document manager brochure #03101801.pptx
ULIS-Desky Document manager brochure #03101801.pptxULIS-Desky Document manager brochure #03101801.pptx
ULIS-Desky Document manager brochure #03101801.pptxKushal Navandar
 
ERP [Compatibility Mode]
ERP [Compatibility Mode]ERP [Compatibility Mode]
ERP [Compatibility Mode]Gunjan Mehta
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2Jeanie Arnoco
 
Application retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applicationsApplication retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applicationsFrank Morris
 
Resume Of David Kragness
Resume Of David KragnessResume Of David Kragness
Resume Of David KragnessOmahaDBA
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeChristoph Adler
 
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...Christoph Adler
 

Tendances (20)

Candler Felder Resume 2015
Candler Felder Resume 2015Candler Felder Resume 2015
Candler Felder Resume 2015
 
Document Archieving System (DAS) by In2sol Riyadh
Document Archieving System (DAS) by In2sol RiyadhDocument Archieving System (DAS) by In2sol Riyadh
Document Archieving System (DAS) by In2sol Riyadh
 
CH005
CH005CH005
CH005
 
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
Solving Shared Drives: 10 Tips for Cleaning Up, Organizing, and Migrating Con...
 
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
 
CH004
CH004CH004
CH004
 
DMS component for MAXIMO
DMS component for MAXIMODMS component for MAXIMO
DMS component for MAXIMO
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 
ULIS-Desky Document manager brochure #03101801.pptx
ULIS-Desky Document manager brochure #03101801.pptxULIS-Desky Document manager brochure #03101801.pptx
ULIS-Desky Document manager brochure #03101801.pptx
 
eDocumentus for IBM Maximo
eDocumentus for IBM MaximoeDocumentus for IBM Maximo
eDocumentus for IBM Maximo
 
Chap01
Chap01Chap01
Chap01
 
Delphix 4.0
Delphix 4.0Delphix 4.0
Delphix 4.0
 
ERP [Compatibility Mode]
ERP [Compatibility Mode]ERP [Compatibility Mode]
ERP [Compatibility Mode]
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2
 
Application retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applicationsApplication retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applications
 
Case mis ch05
Case mis ch05Case mis ch05
Case mis ch05
 
Basics of Good Documentation & Document Control System
Basics of Good Documentation & Document Control SystemBasics of Good Documentation & Document Control System
Basics of Good Documentation & Document Control System
 
Resume Of David Kragness
Resume Of David KragnessResume Of David Kragness
Resume Of David Kragness
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
 
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...
ICS UserGroup - 2015 - Infrastructure Assessment - Analyze, Visualize and Opt...
 

Similaire à White Paper: Identifying Problem Files during Upgrade

Surviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebookSurviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebookKesavan Munuswamy
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Nathan Bijnens
 
The Information Governance Headache - SharePoint ECM
The Information Governance Headache - SharePoint ECMThe Information Governance Headache - SharePoint ECM
The Information Governance Headache - SharePoint ECMGareth Fisher
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricNathan Bijnens
 
Queue Management Solution
Queue Management SolutionQueue Management Solution
Queue Management SolutionFinance Hub
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga
 
Top examples of enterprise content management (ecm) application 1
Top examples of enterprise content management (ecm) application  1Top examples of enterprise content management (ecm) application  1
Top examples of enterprise content management (ecm) application 1Benevolence Technologies
 
Datasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdDatasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdMidVision
 
GouriShankar_Informatica
GouriShankar_InformaticaGouriShankar_Informatica
GouriShankar_InformaticaGouri Shankar M
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
 

Similaire à White Paper: Identifying Problem Files during Upgrade (20)

Conducting_a_Business_and_Systems_Analysis
Conducting_a_Business_and_Systems_AnalysisConducting_a_Business_and_Systems_Analysis
Conducting_a_Business_and_Systems_Analysis
 
Surviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebookSurviving Migration To Office 365 an it pros guide ebook
Surviving Migration To Office 365 an it pros guide ebook
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
 
Abdul ETL Resume
Abdul ETL ResumeAbdul ETL Resume
Abdul ETL Resume
 
The Information Governance Headache - SharePoint ECM
The Information Governance Headache - SharePoint ECMThe Information Governance Headache - SharePoint ECM
The Information Governance Headache - SharePoint ECM
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
Automation of correspondence and file management
Automation of correspondence and file managementAutomation of correspondence and file management
Automation of correspondence and file management
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
 
Queue Management Solution
Queue Management SolutionQueue Management Solution
Queue Management Solution
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
 
Top examples of enterprise content management (ecm) application 1
Top examples of enterprise content management (ecm) application  1Top examples of enterprise content management (ecm) application  1
Top examples of enterprise content management (ecm) application 1
 
Datasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdDatasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrd
 
GouriShankar_Informatica
GouriShankar_InformaticaGouriShankar_Informatica
GouriShankar_Informatica
 
Benefits of a data lake
Benefits of a data lake Benefits of a data lake
Benefits of a data lake
 
Info sphere overview
Info sphere overviewInfo sphere overview
Info sphere overview
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 

Dernier

2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)Delhi Call girls
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)Delhi Call girls
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...mitaliverma221
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)Delhi Call girls
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theorydrae5
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationbrynpueblos04
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkavikas rana
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxpadhand000
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)Delhi Call girls
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfpastor83
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...Cara Menggugurkan Kandungan 087776558899
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morvikas rana
 

Dernier (14)

2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
 
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentation
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptx
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
 

White Paper: Identifying Problem Files during Upgrade

  • 1. Knowing what’s in store How identifying vital information about your data files supports compliance, cuts waste and removes implementation risk from IT infrastructure projects Summary Not all files have equal value. Some are critical to the business. Others could be archived. Still others should be deleted. Files used by desktop applications in particular tend to be under-managed and out of control. What’s more, the needs of certain files supporting essential business processes—files that should influence the design and implementation of the larger IT infrastructure—frequently fly under the IT radar. Files created in older software versions, for example, may not function properly unless you convert the files successfully and image the new desktop operating environment appropriately. Or files that may be subject to compliance regulations such as Sarbanes-Oxley or HIPAA are unknown, undocumented and unprotected. This white paper discusses a method that helps you identify which files and applications have high business value for your organization. By knowing which files contain critical information or support important business processes, you can properly support and protect them. In the end you reduce waste, protect against compliance breaches and fines, and lower IT deployment and infrastructure costs. Audience • Executives • Deployment managers • Information technology staff • Consultants practicing business desktop deployment, information life cycle management, enterprise content management and related disciplines Information to take away • A means to determine a file’s business value • Examples of IT projects which can benefit significantly from identifying business-critical files and applications • Examples of actionable information about files and applications which help improve project planning and implementation • A methodology to ensure desktop file compatibility exists before deploying infrastructure upgrades To better manage large IT projects, start by identifying business-critical files In a recent engagement with an international power utility, ConverterTechnology discovered over two million files existing in duplicate. Of 15 million files on the enterprise’s servers, only five million had been touched in the 18 months preceding the inventory. Nearly 15 percent of all files were in applications no longer part of the enterprise’s standard operating environment. And 1.9 million legacy Microsoft Office files were at risk of malfunctioning upon being upgraded to Office 2003. Each of these data points helped managers efficiently plan and execute a major server consolidation and desktop application upgrade. For example: Rev. 1.0 Aug. 10, 2010
  • 2. The identification of duplicate files alerted managers to opportunities to conserve disk storage space and reduce confusion among file users. • The identification of at-risk business-critical files helped make sure they could be converted to function properly when deployed for use with Office 2003. • The identification of previously unknown files that tracked key financial data facilitated compliance with regulatory requirements. The state of the files influences larger IT issues Your infrastructure plan determines where your files will be stored and which applications can use them. But as we see above, it’s also true that the nature of your files may influence which IT systems and application software versions you can implement. Here’s another real-life example that shows how interconnected every part of the IT chain can be: A major Midwestern retail business wanted to make its knowledge workers more productive by facilitating their collaboration on projects. The company also needed to meet records-retention requirements mandated by the Sarbanes-Oxley Act. Achieving these goals required the company implement enterprise content management, or ECM. But, the desired ECM system was based on SharePoint® Services and SharePoint Portal Server, which require Microsoft Office 2003, and this company was using Office 97. Upgrading wasn’t routine because not all Office 97 files function properly upon being upgraded. As a result, this company had to (1) identify which files were critical to the business in order to be included in ECM, and (2) take steps to preserve their functionality upon being upgraded to Office 2003. Only then could their goals for greater collaboration and regulatory compliance be realized. The examples above illustrate what we call the “Four C’s” of file management: Consolidation, Compatibility, Collaboration, and Compliance. Optimizing for each “C” demands clarity about which files to update, share, ignore, move, archive or delete. Without such clarity, IT projects will deliver less than their potential, cost more than they should and risk failure altogether. If these examples illustrate some of the problems, what are the solutions? ConverterTechnology’s method reveals information critical to file management and speeds the IT upgrade process ConverterTechnology processes and software help IT professionals discover what they’re dealing with in terms of files, their business value, and their compatibility with desktop software and other infrastructure upgrades. We call this process of file discovery, analysis, conversion and migration the ConverterTechnology can help you answer these questions and more: • What files have business value to retain, protect, update and migrate? • Which files should be archived or deleted? • What does the standard desktop operating environment need to Goals look like in order to accommodate business-critical files? • Which tools for automation should be used to quickly and easily • Inventory and classify files. identify, analyze, and repair problematic files? • Plan efficiently. • Reduce deployment complexity. IT scenarios calling for the OfficeConverter • Shorten schedules. Microsoft Office software upgrades - for example, converting files from • Avoid compliance breaches and fines. the Office 97 suite to function properly with Office 2003 or Office 2007 • Lower IT deployment and ECM implementations - identifying, determining relevance, describing infrastructure costs. and migrating files to enterprise content management systems such as Windows SharePoint Services
  • 3. Platform consolidations - relocating files on servers and storage devices Disaster recovery planning - classifying files to determine the appropriate data protection strategy An inventory and analysis of the files on your servers tells you what to keep, what to modernize, what to delete, what to archive, and what needs extra attention to work properly in a new environment. ConverterTechnology’s OfficeConverter process and tools reveal these key data points about your file inventory: • Where files reside by site, server, file share, path and filename • Their concentration by file type and extension • Total storage space devoted to used, unused or duplicate files • Files that are critical to the business • Files that are subject to compatibility errors OfficeConverter reports OfficeConverter generates reports you can use to make informed decisions. Reports may be customized to the needs of a particular project. Summary of applications found Information in this report was used to drive a three-part technology refresh: (1) consolidate servers, (2) upgrade from NT4 and Office 97 to Windows Server 2003 and Office 2003, and (3) migrate from NetWare to Windows Server 2003. Among other purposes for this information, the enterprise wished to know whether it could reduce the number of supported applications by omitting non-Microsoft applications from its standard operating environment without major disruption to the business. Summary of duplicate files ConverterTechnology’s OfficeConverter reports help you manage redundant files—a vital task for SharePoint migrations, server consolidation, file classification and file compatibility projects. The first step is to discover the extent of the problem. Shown: excerpt of an actual report for a ConverterTechnology client. This project defines “business-critical files” as those modified within 18 months prior to this report.
  • 4. Business-critical file counts by site and server ConverterTechnology: Specialists in file discovery, analysis, conversion and migration ConverterTechnology analyzes usage of business critical applications and makes legacy files compatible and useful with new platforms. Our process involves five stages: Planning: Determine what resources, time lines and milestones will govern the project. Discovery: What files exist where, and how relevant are they to the organization’s work. Compatibility analysis: Determine which files may not open or function correctly upon being upgraded or relocated. File conversion: Upon determining which files are at risk to malfunction, fix them automatically, before deployment. File migration: Once files are identified, classified and updated, move those files into the proper production environment. End-user enterprises have the benefit of faster, more trouble-free technology upgrades. Service provider partners use our methods, process and software to qualify for more engagements, improve service, utilize staff more fully, reduce costs and increase profits. ConverterTechnology can conduct the process from our secure site or your premises. ConverterTechnology specializes in enterprises with 5,000 desktops or more. Our engagements reach worldwide.
  • 5. Are you implementing ECM? Enterprise content management demands that you classify your enterprise’s files into categories such as the five below: 1. Production files that need to be functional and accessible always. 2. Less-used files which need to be retained and available due to regulatory or other factors. 3. Files that should be shared. 4. Files that may be archived. 5. Files that ought to be deleted. ConverterTechnology can help managers set criteria, classify files and make decisions that help manage enterprise content and implement related systems in efficient and effective ways. ConverterTechnology file conversion offerings ConverterTechnology also supplies OfficeConverter™ software to automate the discovery and repair of at-risk files for seamless upgrades to Microsoft Office 2003, Office 2007, or Office 2010. OfficeConverter has following feature modules: • DiscoverIT • ReportIT • SubmitIT ConverterTechnology provides software and services to help enterprises capitalize on the benefits of the Microsoft platform without the migration risks of data corruption, reduced employee productivity and critical business application down time. Founded in 1997, ConverterTechnology has helped more than one million users identify, analyze and fix compatibility errors before they occur, accelerating time to deployment. ConverterTechnology is headquartered in Nashua, N.H., with offices in Europe and Australia, and is a wholly-owned subsidiary of Powerlan Limited. For more information, visit www.convertertechnology.com