SlideShare a Scribd company logo
1 of 4
Download to read offline
Gensui Imaging, Episode 5-
Archive Consolidation
A Short Story by Grant Lindsay
Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced, translated, or reduced to
any electronic medium of machine-readable form, in whole or in part, without the written consent of Sherpa Software Partners, except in
the manner described in the software agreement.
© Copyright 2011 Everest Software, L.P., d.b.a. Sherpa Software Partners, L.P.
All rights reserved. Printed in the United States.
Compliance Attender for Lotus Notes is the registered trademark of Sherpa Software Partners, L.P.
| Page 2 of 4
eter Terrell, Gensui Acme Imaging's Vice President of Technology, sat at his desk engrossed in his
email. Each morning, like this one, he scanned status updates from direct reports, various system
notifications and threaded conversations with various peers and subordinates. His goal was to get a
handle on what needed his immediate attention and what could wait.
The months since Gensui Imaging's merger with Acme Co. had been frantic ones for the entire Information
Technology department. Combining the computer systems of two different companies was complicated and time-
consuming at all levels from senior management down to junior technicians. The only certainty was change.
Absorbed in his triage, Peter failed to notice that his Manager of Messaging Systems, Valerie Wright, had
appeared at his open office door.
She knocked to get his attention. “Have a minute?”
Peter looked up from this laptop screen, “If it's good news.”
“It's not,” Valerie informed him as she stepped into his office anyway.
Peter's shoulders dropped as he sighed. After a pause, he gestured to the chair in front of his desk and Valerie
took a seat.
Peter braced himself, then asked, “Okay. What is it?”
“Ryan lost his laptop,” Valerie said. “Well, had it stolen, apparently?”
“Head of accounting, Ryan? Ryan Thurmond?”
“Yep. He was on a trip out west and his rental car was broken into. His laptop case was on the passenger seat.”
It had taken a moment for Peter to catch up, but now he was wondering why this news was coming from his
Messaging Systems Manager. It seemed more of an issue for Desktop Services and, even then, not one that
needed a face-to-face conversation. The company had internal systems setup for procurement and even
reporting lost and stolen property.
“And this is a Messaging issue because...?”
“Ryan had local mail archives on his laptop,” Valerie revealed. “The Risk Assessment scan we completed last
month shows us what is included in those archives.”
Peter processed this. “And now they're gone...,” he started.
“And we don't have backups of local files,” Valerie completed the picture for her boss. “The messages in that
archive were the only copies.”
“What can we do at this point?” Peter asked.
“For Ryan's mail, nothing. What's gone is gone.”
“I see. Can we do anything going forward?”
“From my perspective, since I care most about the messages and being complaint with retention policies, we
need to get these archives off all laptops and to a place where we can manage them effectively. And there are
other risks besides theft to all this distributed data.”
“Such as?” Peter fished.
“P
| Page 3 of 4
“Hard drives crash. Users do stup... I mean, make mistakes. They can delete whole files on their machines
thinking they are saving space or they can trash individual messages within the archives. All bad things.”
Peter nodded his understanding of the issue. “I assume you have a solution in mind already,” Peter stated. He
knew Val's approach. Along with the problem, she always came with a solution or, at least, some suggestions.
Valerie smiled. “Sherpa Software has a service that will consolidate distributed archives back to our servers
where we can apply retention policies, back up the files and search them when needed. Since we have the
results of their Risk Assessment scan, we also know who has these files and their sizes.”
“And you have a quote, if I know my Val.”
Valerie placed the document on Peter's desk almost before he had finished his sentence. As she left, it occurred
to him that Valerie could—and, given her new role, she should—be empowered to make these decisions herself.
Yes indeed, nothing was certain but change.
| Page 4 of 4
About the Author
As the Product Manager for Compliance Attender for Notes, Grant is responsible for product
research and development, pre-sales technical support (e.g., Demos), post-sales technical
support and competitive research.
Grant joined Sherpa Software in 2007 and has 17 years of experience in Information
Technology. Of those, more than 16 were spent building applications with Lotus Notes and
Domino. He worked with a wide range of company sizes and across several industries
including insurance, consulting, venture capital, manufacturing, software and more.
Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance,
LotusScript, Notes Formula Language, application design and security. He is also skilled in C/C++ and Java
Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered
technologies: HTML, CSS, and JavaScript.
He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends
his off time with his wife, Lydia, of 19 years and their three retired greyhound racers, Rio, Wavorly and Oriole.

More Related Content

Similar to Gensui Acme Imaging — Episode 5: Archive Consolidation

Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysOri Pekelman
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Whats robotic process robotization
Whats robotic process robotizationWhats robotic process robotization
Whats robotic process robotizationMDEmamHossen3
 
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...Dana Gardner
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHLeonardo Sepulcri
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryLeonardo Sepulcri
 
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsAs Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsDana Gardner
 
New text document
New text documentNew text document
New text documentsleucwnq
 
New text document
New text documentNew text document
New text documentsleucwnq
 
Protecting your application investment white paper 0908 2
Protecting your application investment white paper 0908  2 Protecting your application investment white paper 0908  2
Protecting your application investment white paper 0908 2 Laurie LeBlanc
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️Ori Pekelman
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsMuruga J
 

Similar to Gensui Acme Imaging — Episode 5: Archive Consolidation (20)

Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Whats robotic process robotization
Whats robotic process robotizationWhats robotic process robotization
Whats robotic process robotization
 
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...The IT Intelligence Foundation For Digital Business Transformation Builds fro...
The IT Intelligence Foundation For Digital Business Transformation Builds fro...
 
UUUU
UUUUUUUU
UUUU
 
Ferret - Data Seepage
Ferret - Data SeepageFerret - Data Seepage
Ferret - Data Seepage
 
Ferret
FerretFerret
Ferret
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
CO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISHCO_Scenario_IntInfoDelv_FINAL ENGLISH
CO_Scenario_IntInfoDelv_FINAL ENGLISH
 
IBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information DeliveryIBM Start Now- Interactive Information Delivery
IBM Start Now- Interactive Information Delivery
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Managed File Transfer infographic - Files and Tribulations slideshow
Managed File Transfer infographic - Files and Tribulations slideshowManaged File Transfer infographic - Files and Tribulations slideshow
Managed File Transfer infographic - Files and Tribulations slideshow
 
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation ToolsAs Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
As Hybrid IT Complexity Ramps Up, Operators Look To Data-Driven Automation Tools
 
New text document
New text documentNew text document
New text document
 
New text document
New text documentNew text document
New text document
 
Protecting your application investment white paper 0908 2
Protecting your application investment white paper 0908  2 Protecting your application investment white paper 0908  2
Protecting your application investment white paper 0908 2
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 

More from Sherpa Software

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information GovernanceSherpa Software
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media Sherpa Software
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildSherpa Software
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

More from Sherpa Software (12)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Gensui Acme Imaging — Episode 5: Archive Consolidation

  • 1. Gensui Imaging, Episode 5- Archive Consolidation A Short Story by Grant Lindsay Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced, translated, or reduced to any electronic medium of machine-readable form, in whole or in part, without the written consent of Sherpa Software Partners, except in the manner described in the software agreement. © Copyright 2011 Everest Software, L.P., d.b.a. Sherpa Software Partners, L.P. All rights reserved. Printed in the United States. Compliance Attender for Lotus Notes is the registered trademark of Sherpa Software Partners, L.P.
  • 2. | Page 2 of 4 eter Terrell, Gensui Acme Imaging's Vice President of Technology, sat at his desk engrossed in his email. Each morning, like this one, he scanned status updates from direct reports, various system notifications and threaded conversations with various peers and subordinates. His goal was to get a handle on what needed his immediate attention and what could wait. The months since Gensui Imaging's merger with Acme Co. had been frantic ones for the entire Information Technology department. Combining the computer systems of two different companies was complicated and time- consuming at all levels from senior management down to junior technicians. The only certainty was change. Absorbed in his triage, Peter failed to notice that his Manager of Messaging Systems, Valerie Wright, had appeared at his open office door. She knocked to get his attention. “Have a minute?” Peter looked up from this laptop screen, “If it's good news.” “It's not,” Valerie informed him as she stepped into his office anyway. Peter's shoulders dropped as he sighed. After a pause, he gestured to the chair in front of his desk and Valerie took a seat. Peter braced himself, then asked, “Okay. What is it?” “Ryan lost his laptop,” Valerie said. “Well, had it stolen, apparently?” “Head of accounting, Ryan? Ryan Thurmond?” “Yep. He was on a trip out west and his rental car was broken into. His laptop case was on the passenger seat.” It had taken a moment for Peter to catch up, but now he was wondering why this news was coming from his Messaging Systems Manager. It seemed more of an issue for Desktop Services and, even then, not one that needed a face-to-face conversation. The company had internal systems setup for procurement and even reporting lost and stolen property. “And this is a Messaging issue because...?” “Ryan had local mail archives on his laptop,” Valerie revealed. “The Risk Assessment scan we completed last month shows us what is included in those archives.” Peter processed this. “And now they're gone...,” he started. “And we don't have backups of local files,” Valerie completed the picture for her boss. “The messages in that archive were the only copies.” “What can we do at this point?” Peter asked. “For Ryan's mail, nothing. What's gone is gone.” “I see. Can we do anything going forward?” “From my perspective, since I care most about the messages and being complaint with retention policies, we need to get these archives off all laptops and to a place where we can manage them effectively. And there are other risks besides theft to all this distributed data.” “Such as?” Peter fished. “P
  • 3. | Page 3 of 4 “Hard drives crash. Users do stup... I mean, make mistakes. They can delete whole files on their machines thinking they are saving space or they can trash individual messages within the archives. All bad things.” Peter nodded his understanding of the issue. “I assume you have a solution in mind already,” Peter stated. He knew Val's approach. Along with the problem, she always came with a solution or, at least, some suggestions. Valerie smiled. “Sherpa Software has a service that will consolidate distributed archives back to our servers where we can apply retention policies, back up the files and search them when needed. Since we have the results of their Risk Assessment scan, we also know who has these files and their sizes.” “And you have a quote, if I know my Val.” Valerie placed the document on Peter's desk almost before he had finished his sentence. As she left, it occurred to him that Valerie could—and, given her new role, she should—be empowered to make these decisions herself. Yes indeed, nothing was certain but change.
  • 4. | Page 4 of 4 About the Author As the Product Manager for Compliance Attender for Notes, Grant is responsible for product research and development, pre-sales technical support (e.g., Demos), post-sales technical support and competitive research. Grant joined Sherpa Software in 2007 and has 17 years of experience in Information Technology. Of those, more than 16 were spent building applications with Lotus Notes and Domino. He worked with a wide range of company sizes and across several industries including insurance, consulting, venture capital, manufacturing, software and more. Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance, LotusScript, Notes Formula Language, application design and security. He is also skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered technologies: HTML, CSS, and JavaScript. He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends his off time with his wife, Lydia, of 19 years and their three retired greyhound racers, Rio, Wavorly and Oriole.