SlideShare une entreprise Scribd logo
1  sur  54
How to implement ECM?
Global best practices for implementing ECM
using the open methodology MIKE2
Implementation


Which 3 of these typical problems have affected your organization‟s
document or records management implementation?
                                                                     0%   5%   10%       15%   20%   25%   30%   35%   40%   45%

             Underestimated process and organizational issues

 Uneven usage due to poor procedures and lack of enforcement

         Lack of knowledge or training among our internal staff.

                             Project derailed by internal politics
            Low user acceptance due to poor design or clumsy
                            implementation
                                       Excessive quot;scope creepquot;
                                                                                                                                       Actual
                                                                                                                                       Anticipated
         Underestimated the effort to distill and migrate content

                                  Poorly defined business case
                                                                                                                                   Source:
        Failed to secure agreement on fileplans, taxonomy and
                              metadata                                                                                             AIIM ECM Survey
     Failed to think of benefits/issues beyond our business unit.                                                                  February, 2009
              Lack of knowledge or training among our external                                                                     All respondents (284)
                              staff/suppliers.
                                            Budget was overrun

                         Failed to prioritize quot;high-valuequot; content
                                                                                     2
The MIKE2 Methodology


 quot;MIKE2 (Method for an Integrated Knowledge
  Environment) is an Open Source methodology for
  Enterprise Information Managementquot;
  Source: mike2.openmethodology.org
  Developed by BearingPoint, released as Open Source under Creative
   Commons

 Meant to be repeatable and deliver working systems
  quickly, following trends in manufacturing and
  commercial software development
  Continuous improvement (Lean)
  Repeating implementation cycles (Agile)

      © AIIM | All rights reserved     3
MIKE2 Phases (description)


 Phase 1 - Business assessment
 Phase 2 - Technology assessment
 Phase 3 - Information management roadmap
 Phase 4 - Design increment
 Phase 5 - Incremental development, testing, deployment
  and improvement




     © AIIM | All rights reserved   4
MIKE2 Phase 1




                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                           5
Conduct initial direction setting with sponsor


 Sponsor needs to provide            Scope can be defined
  insights                             across a number of
                                       dimensions
 Difficult or impossible to
                                       Geographic
  do everything at once
                                       Organisational
  Scale of change
                                       Legacy content
  Nature of the impact to the
                                       Information types
   organisation
                                       Information classes
  Cost
                                       Timescales

                                      Prioritisation is key

      © AIIM | All rights reserved     6
Programme charter: Overall approach


 Should be developed in 3              Environment: Develop
  stages                                 high-level descriptions of
  Current-state                         Organisational behaviours
  The environment                       ECM support organisation
                                          structure
  The principles & the future-state
                                         ECM processes & instruments
 Future-state
  Produce initial model
  Identify and consult stakeholders
   across the organisation
  Review and revise


       © AIIM | All rights reserved      7
Defining organisationalbehaviours

                       Guidance & Protocols                              Organisational behaviours
  infrastructure FOR
   What we use the




                              ECM Principles                                  ECM 'Best Practices'
                         Examples:
                        • Duty to Share                                    Examples:
                                                             Drive        • Team-working across Functions
                        • Information as a Corporate
                                                                          • Re-using, not re-inventing
                          Resource
                        • Collaborative Working                           • Proactive sharing of knowledge
                                      Embodied




                                                                                           Support
                                         in
  The WAY we use
  the infrastructure




                                                                                  ECM Procedures
                                ECM Rules
                                                                            Examples:
                        Examples:
                                                                           • Procedure for requesting a new
                       • Information must be stored in the
                                                                              Team Site
                                                             Drive
                         appropriate location
                                                                           • Procedure for declaring a record
                       • Information with corporate value
                                                                              to the ECM Repository
                           is stored to the ECM Repository




                                                                     8
   © AIIM | All
rights reserved
Organisational QuickScanfor information
                      development

 Analyses current-state of              Assessments
  organisation across                     Application portfolio and
  multiple facets to identify              functionality
  the baseline for the                    Information flow
  organisation                            Information delivery
  Aids in planning what it will take     Information maturity and
   to get to the future-state vision       infrastructure maturity
                                          Economic value of information
                                          Information processes
                                          People skills and organisational
                                           structure


       © AIIM | All rights reserved       9
Strategic business requirements


 Establishes the overall set of strategic business
  requirements (business case) that translate into high
  level information requirements
 Forms the basis for scoping the programme
  Strategic business vision
  Strategic critical success factors (CSFs)
  Strategic key performance indicators (KPIs)
  Strategic success measures
  Strategic change drivers



       © AIIM | All rights reserved      10
Strategic business vision


 Defines what organisation wishes to achieve in the
  Future-State
 Done by interviewing executives via scripts to capture
  Business objectives
  Competitive forces of concern
  Differentiation and positioning statements
  Major customers, buying habits and cycles
  Major suppliers and incentives
  Major competitors, substitutes and discriminators
  Industry and historical supply chains
  Success factors
      © AIIM | All rights reserved         11
Business blueprint


 Key deliverable of MIKE2
 Final strategic analysis and synthesis of business
  assessment work
  Completes and formalises the business vision

 Completion of business blueprint results in
  Prioritised requirements
  Programme plan
  Business case
  Programme blueprint



      © AIIM | All rights reserved     12
Eat the elephant one bite at a time


 Go for specific projects,
  one at a time
 Each project addresses
  portion of ECM producing
  business value
  Start with something nutritious,
   not small and convenient

 Produce business case for
  each of these projects
  separately

       © AIIM | All rights reserved   13
Prioritise requirements


 Refines the strategic information requirements
  Determines the sequence of projects
  Strategic vs. tactical
  Within scope and outside of scope

 Ranking done via group workshops with executives who
  provided initial feedback
  With guidance of sponsor and stakeholders as appropriate
  Focus is on business requirements, not technology requirements

 Results in a list of work opportunities for the project


       © AIIM | All rights reserved      14
Linking tactics to strategy

       Drives
       Contributes to                    (Balanced scorecard)

                                                            Management /
   Strategic                                               executive board
   (C-level)

   Operational
                                                   Business area managers
   (Consequential impact)


                                                             Users / other
   Tactical
                                                             stakeholders




     © AIIM | All rights reserved   15
Business blueprint components


 Arranged in key sections
  Executive summary
  High-level programme plan
  Business case
   Strategic case
   Economic case
   Funding case
   Commercial case
   Project management case
  Future-state conceptual architecture
  Appendix

      © AIIM | All rights reserved        16
MIKE2 Phase 2




                             You are here




                                            Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                                    17
Technology assessment


 Concentrates on the technical aspects of your strategy
 Technology blueprint
  Strategically ties the business requirements developed in Phase 1 to a
   logical and physical information architecture

 Completes the “strategic programme blueprint”
  Defines the overall programme delivery plan that provides the starting
   point for the continuous implementation phase
  Refines the business requirements through ECM
  Defines the technology architecture
  Puts standards and technical infrastructure in place to support the
   software development process
      © AIIM | All rights reserved       18
Business drives technology


 Phase 1 and 2 parallelism
 Phase 1 deliverables must be completed before phase 2
  can be completed
  Specifically, phase 2 requires the following from phase 1 before a full
   infrastructure can be prescribed:
   Business vision
   High-level business case
   High-level information processes
   Scope of key systems




       © AIIM | All rights reserved      19
How to produce requirements: Overview


 5 main stages
  1. Plan
                                                  Plan
  2. Gather
  3. Analyse
  4. Document                         Agree                 Gather
  5. Agree

 Some stages are iterative
  and parts of entire process
                                           Document      Analyse
  can be iterative



       © AIIM | All rights reserved   20
Conduct gap analysis of current-state and
                             future-state

 Identify key gaps between current-state architecture and
  future-state
  Where will new capabilities be needed?
  What are those requirements?

 Becomes basis for RFP and vendor selection




      © AIIM | All rights reserved     21
MIKE2 Governance model




                    Improved Governance and Operating Model

                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                          22
Why information governance?


 Accountability for organisation‟s information assets
 Good governance
  Ensures compliance with regulations and legislation
  Enables productivity improvements
  Enables organisation to respond to change and new opportunities
  Helps information exchange with customers, partners and providers

 Sustains good information management practices




      © AIIM | All rights reserved      23
An information governance framework (IGF)


 A sound IGF includes


                                                 Policies




                         Processes                          Standards




                                      Tools &
         People                                               Audit
                                    technology



     © AIIM | All rights reserved                24
The role of ECM in information governance


 ECM environment is
  Key tool for Information Governance
  Repository for corporate memory

 ECM systems depend on creation and maintenance of
  „Content Management Instruments‟, including:
  Reference data (taxonomy, thesaurus, etc.)
  Metadata standard for information, including documents, records, and
   websites etc.
  Security and access classification scheme
  Disposition schedules


      © AIIM | All rights reserved       25
Continuous improvement

 Compliance Framework

  Detect                                                      Respond
                                   Detect         Respond
  • Audit                                                     • Investigation
  • Ombudsperson                                              • Communication
  • Monitoring                                                • Improvements
                                            Prevent
                                                              • Employee discipline
                                    Prevent
                                    • Risk assessments
                                    • Training
                                    • Policies & procedures
                                    • Executive commitment
    © AIIM | All rights reserved                  26
MIKE2 Phase 3 Roadmap


• Roadmap




    © AIIM | All rights reserved   27
Project roadmap overview


 Project roadmap is the guide for the entire project
  In each iteration of phase 3-5 however, it is the restricted guide for the
   requirements and level of detail involved in a SINGLE iteration

 Tasks
  Define overall release functionality
  Identify and prioritise project risks
  Identify infrastructure dependencies
  Identify design dependencies
  Define acceptance procedures
  Define detailed project plan


       © AIIM | All rights reserved        28
Identify and prioritise project risks


With each iteration, re-examine risks for iteration and project as a whole


Risk                       Likelihood Severity Mitigation
There is a risk to         Medium     Severe   Have two key developers undergo
schedule and                                   training.
quality as                                     Have a third party specialising in this
developers are                                 technology review high level designs
unfamiliar with                                before coding starts.
proposed                                       Prototype first two function points
technology for the                             before the remainder of the code is
project                                        developed.




       © AIIM | All rights reserved            29
MIKE2 Phase 3 Foundation activities


 Software development readiness
 Enterprise information
  architecture
 Taxonomy design
 Metadata development
 Solution architecture
  definition/revision
 Prototype the solution
  architecture




     © AIIM | All rights reserved   30
Foundation activities (1)


 Focused on ensuring that the environment is ready and
  that basic solution decisions have been made
 Important to establish at the beginning of each design,
  develop, deploy increment
 Primarily focused on understanding information issues,
  resolving these problems and defining target content
  models
 If not conducted first, other subsequent implementation
  work is likely to fail

                                    Source: http://mike2.openmethodology.org
     © AIIM | All rights reserved                          31
Foundation activities (2)


 Technical and design foundations
 Iterative
 Risk assessment and management




      © AIIM | All rights reserved   32
Taxonomic needs assessment

Cynefin framework




                                    Source: Dave Snowden
     © AIIM | All rights reserved                 33
Developing a taxonomy


                                        Identify
                                     stakeholders

                          Gather                         Define
                         feedback                       purpose




                      Deploy                              Determine
                      scheme                              approach




                                                         Collect
                      Pilot scheme
                                                      information


                                       Develop
                                       scheme


   © AIIM | All rights reserved                  34
MIKE2 Phase 4




                                                                You are here

                                  Source: http://mike2.openmethodology.org
   © AIIM | All rights reserved                          35
Identify training and administration guide
                            requirements

 Used to estimate training needs
  Varies depending on complexity of the system, amount of change to the
   organisation required and ability of users to absorb the material

 Questions answered
  What is the nature of the audience and the contexts they will be using
   the ECM environment?
  Who will need the documentation, at what level, when and why?

 Typical targets for training
  Departmental users
  System operators
  Management
      © AIIM | All rights reserved       36
Develop outlines for operational manuals


 There will be multiple operational manuals, targeted at
  the specific audiences identified
 Typical examples
  User procedures manual – for specific business functions
  Operations procedures manual – for technical operations
  Desk procedures – how to do specific business jobs using the system

 Tasks
 1.Examine existing operational manuals for corporate standards
 2.Determine satisfaction with existing manuals
 3.Based on identified requirements, build outline, vet with audience

      © AIIM | All rights reserved       37
Design backup and recovery procedures

 If your solution is based on a single provider, single
  repository - in a word, simple - fairly straightforward
  Distributed, federated, integrated solutions exponentially more complex
  Dirty secret of the ECM industry that backup and recovery is
   exceedingly difficult
   Multiple repositories, integration paths, databases, indices, linkages
    between documents and repositories

 Best approach
  Closely work with solution provider and/or integrators to design and
   verify backup and recovery will actually work




      © AIIM | All rights reserved       38
Business value of prototyping


                       uncertainty




                                            uncertainty decreases over time

                                                               time
      business value
       Cumulative




                                                    Source (top): Barry Boehm
                                     Source (bottom): Jeff Patton, www.agileproductdesign.com
                                                                       39
   © AIIM | All
rights reserved
All users have raised expectations




       Source: NetFlix        Source: Apple iTunes Music Store




                         40
   © AIIM | All
rights reserved
MIKE2 Phase 5


 Develop
  Testing
  Training

 Deploy
 Operate
  Ongoing improvement

 Closeout




      © AIIM | All rights reserved   41
Develop user support documentation


 Created to provide step-by-step documentation, with
  appropriate screenshots, to illustrate an entire process
  or task
  Supplements any automated processes implemented within the system

 Keep in mind how documentation is intended to be used
  in YOUR environment
  Stand-alone reference manual
  Basis for live or on-demand training
  Develop at level of detail necessary for final use




       © AIIM | All rights reserved       42
Develop operations support guides
 Introduction                                                 Job scheduling
  Document distribution list                                  Monitoring & logging
  Document change process                                     Load balancing
                                                               Problem management
 Application overview
                                                               Change management
  Production environment
                                                               Vendor management
  Production architecture overview
                                                               Backup/restore procedures for application
  Production environment components
                                                                components
  Application servers
                                                               System maintenance
  Web servers, etc.
                                                               Print services
 Security                                                     Failure
  Server security configurations
                                                            Appendix A - User account setup process &
  Security log reviews                                      access rights
  Guidelines for access                                    Appendix B - Service level agreements
  Account administration                                   Appendix C - Contact matrix
 Data centre procedures                                    Appendix D - Software versions list
  Startup/shutdown
 Source: http://mike2.openmethodology.org/wiki/Operations_Procedure_Outline_Deliverable_Template
           © AIIM | All rights reserved                        43
Technology backplane development


 Making this available as soon as possible is critical for
  the development of ECM system
  Provides “developer ready” environment to build and test system based
   on work done in foundation activities and design
   Acquisition and training of developers was covered in phase 4

 Tasks
  Implement target repository
  Develop content interface components
  Develop process/automation components
  Develop metadata management integration
  Develop infrastructure management processes

      © AIIM | All rights reserved     44
User testing


 Pilots and model offices are popular approaches
  Refine design and implementation of new ecm-enabled environment by
   directly involving users

 Pilot approach
  Trial of „draft‟ proposed environment
   Uses a small subset of users
   Usually in their normal working environment

 Model office approach
  More of a „laboratory‟ environment - somewhat rare
  Typically used to „get it right‟, before moving to a pilot

       © AIIM | All rights reserved         45
Model offices & pilot: Benefits


 Technical evaluation                   Finalise environment
                                          Ensure all aspects of
 1. Functional testing
                                           environment are defined
 2. System integration testing
                                          Establish and „freeze‟ a
    (SIT)
                                           configuration for roll-out
 3. End-to-end testing (E2E)
                                         Training development
 4. Stress and volume testing
    (SVT)
                                          Develop and assess training
 Functionality evaluation                 materials and methods
                                          Train the trainers, help desk staff,
    Does it do all that is specified
                                           floor-walkers
     and required?
                                           etc.


      © AIIM | All rights reserved       46
Production deployment


 Post-pilot and/or model office work, the environment
  finally reaches a deployment-ready state
 Final steps for deployment involved finalising how the
  solution will be deployed technically for production use
 Tasks
 1. Define distribution and installation method
 2. Deploy baseline production environment
 3. Deploy software to production




      © AIIM | All rights reserved      47
Deploy software to production


 Solution is ready to be released into production, with
  final evaluation and launch of the solution to the target
  communities
 Production and operation procedures should be up and
  running alongside the infrastructure itself




      © AIIM | All rights reserved   48
Evaluation and launch


 Post technical deployment is the final evaluation,
  scheduled launch and post-launch verification and
  support
 Transfers operations and support from the
  development/project team to operations personnel for
  solution moving forward
 Contingency plans for any issues in final testing and
  launch should be in place and ready to activate, should
  any severe issues be identified
 Validates that system is truly ready for rollout

      © AIIM | All rights reserved   49
Training feedback loop


 Collect feedback
  At the time
  And later
                                      Improve           Review
 Review, learn and improve




                                                Learn



       © AIIM | All rights reserved   50
Importance of change readiness assessment


 Organisational change will always appear threatening
  People think of job security
  Some enterprises more freely disseminate information regarding change
   and strategy than others

 You need to assess your enterprise‟s readiness to
  change
  Readiness of management and the workers affected by the change
  How technology is used (or not) within the organisation

 QuickScans and early assessments of Phase 1 provide
  diagnostic tools, while this module is focused on
  enabling necessary change
       © AIIM | All rights reserved     51
Best practices for implementing change


 Change needs to be managed, but there are many
  different methods for this
  However, these methods share common themes

 Most important theme: change occurs in the context of
  the enterprise‟s natural and recognised capabilities
 All successful models
  Address all elements of change
  Provide a process for introducing change
  Address critical success factors




      © AIIM | All rights reserved     52
Creating user “wins”


 Early wins create a “Yes” environment
  Wins should be promoted widely

 Leverage existing and new “super users”
 Wins should be clear cut
  Not open to interpretation

 Wins should bring benefits to all
 Wins should appear to come easily
 Even a big bang approach can be
  delivered via a series of smaller wins…
      © AIIM | All rights reserved   53
AIIM ECM Specialist and Master Program
               - learn how to impl. ECM




                               www.aiim.org/training
© AIIM | All rights reserved              54

Contenu connexe

Tendances

Insights on Knative and how it changes the serverless landscape
Insights on Knative and how it changes the serverless landscapeInsights on Knative and how it changes the serverless landscape
Insights on Knative and how it changes the serverless landscapeJeremias Werner
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Managementmaddinapudi
 
Enterprise Content Management (ECM) System
Enterprise Content Management (ECM) SystemEnterprise Content Management (ECM) System
Enterprise Content Management (ECM) SystemAnand Subramaniam
 
Matinée3 Gestion Electronique des Documents (GED)
Matinée3   Gestion Electronique des Documents (GED)Matinée3   Gestion Electronique des Documents (GED)
Matinée3 Gestion Electronique des Documents (GED)ALTITUDE CONCEPT SPRL
 
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password ManagerIntroduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password ManagerStéphane DECK
 
BIAN Applied to Open Banking - Thoughts on Architecture and Implementation
BIAN Applied to Open Banking - Thoughts on Architecture and ImplementationBIAN Applied to Open Banking - Thoughts on Architecture and Implementation
BIAN Applied to Open Banking - Thoughts on Architecture and ImplementationBiao Hao
 
poster-agile framework to implement togaf with lean ix
poster-agile framework to implement togaf with lean ixposter-agile framework to implement togaf with lean ix
poster-agile framework to implement togaf with lean ixLaurent Nonne
 
EBIOS RM - Cryptovirus & COVID-19
EBIOS RM - Cryptovirus & COVID-19EBIOS RM - Cryptovirus & COVID-19
EBIOS RM - Cryptovirus & COVID-19Thierry Pertus
 
L’implantation d’un système de gestion documentaire
L’implantation d’un système de gestion documentaireL’implantation d’un système de gestion documentaire
L’implantation d’un système de gestion documentaireDidier Labonte
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content ManagementAndrey Karpov
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
100527 Gestion électronique des documents
100527 Gestion électronique des documents100527 Gestion électronique des documents
100527 Gestion électronique des documentsCOMPETITIC
 
Migrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IMigrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IKonveyor Community
 
Mainframe Integration, Offloading and Replacement with Apache Kafka
Mainframe Integration, Offloading and Replacement with Apache KafkaMainframe Integration, Offloading and Replacement with Apache Kafka
Mainframe Integration, Offloading and Replacement with Apache KafkaKai Wähner
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)Open Source Consulting
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewMohamed Sami El-Tahawy
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 

Tendances (20)

Insights on Knative and how it changes the serverless landscape
Insights on Knative and how it changes the serverless landscapeInsights on Knative and how it changes the serverless landscape
Insights on Knative and how it changes the serverless landscape
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Management
 
Enterprise Content Management (ECM) System
Enterprise Content Management (ECM) SystemEnterprise Content Management (ECM) System
Enterprise Content Management (ECM) System
 
Matinée3 Gestion Electronique des Documents (GED)
Matinée3   Gestion Electronique des Documents (GED)Matinée3   Gestion Electronique des Documents (GED)
Matinée3 Gestion Electronique des Documents (GED)
 
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password ManagerIntroduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
 
BIAN Applied to Open Banking - Thoughts on Architecture and Implementation
BIAN Applied to Open Banking - Thoughts on Architecture and ImplementationBIAN Applied to Open Banking - Thoughts on Architecture and Implementation
BIAN Applied to Open Banking - Thoughts on Architecture and Implementation
 
poster-agile framework to implement togaf with lean ix
poster-agile framework to implement togaf with lean ixposter-agile framework to implement togaf with lean ix
poster-agile framework to implement togaf with lean ix
 
EBIOS RM - Cryptovirus & COVID-19
EBIOS RM - Cryptovirus & COVID-19EBIOS RM - Cryptovirus & COVID-19
EBIOS RM - Cryptovirus & COVID-19
 
L’implantation d’un système de gestion documentaire
L’implantation d’un système de gestion documentaireL’implantation d’un système de gestion documentaire
L’implantation d’un système de gestion documentaire
 
COBIT
COBIT COBIT
COBIT
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Management
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
100527 Gestion électronique des documents
100527 Gestion électronique des documents100527 Gestion électronique des documents
100527 Gestion électronique des documents
 
Migrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2IMigrating Java JBoss EAP Applications to Kubernetes With S2I
Migrating Java JBoss EAP Applications to Kubernetes With S2I
 
Mainframe Integration, Offloading and Replacement with Apache Kafka
Mainframe Integration, Offloading and Replacement with Apache KafkaMainframe Integration, Offloading and Replacement with Apache Kafka
Mainframe Integration, Offloading and Replacement with Apache Kafka
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF Overview
 
TOGAF Complete Slide Deck
TOGAF Complete Slide DeckTOGAF Complete Slide Deck
TOGAF Complete Slide Deck
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 

En vedette

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachSam Thomsett
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyShiva Hullavarad
 
Deliver a Successful ECM Project
Deliver a Successful ECM ProjectDeliver a Successful ECM Project
Deliver a Successful ECM ProjectNuxeo
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesThe Dayhuff Group
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information ManagementBilly Cripe
 

En vedette (6)

Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation Strategy
 
Deliver a Successful ECM Project
Deliver a Successful ECM ProjectDeliver a Successful ECM Project
Deliver a Successful ECM Project
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human Resources
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information Management
 
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
[EN] Enterprise Information Management (EIM) | Ulrich Kampffmeyer | 2013
 

Similaire à How to implement ECM?

Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support ServicesSteven Bonacorsi
 
Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support ServicesSteven Bonacorsi
 
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...IEEEP Karachi
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayGovCloud Network
 
Csi Blackbelt Ia Masterclass Kl
Csi Blackbelt  Ia Masterclass KlCsi Blackbelt  Ia Masterclass Kl
Csi Blackbelt Ia Masterclass KlTommy Seah
 
Csi Blackbelt Ia Masterclass Sg
Csi Blackbelt  Ia Masterclass SgCsi Blackbelt  Ia Masterclass Sg
Csi Blackbelt Ia Masterclass SgTommy Seah
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogerstrogers77
 
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeAPQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeMarc Aafjes
 
On Kue Business Architecture101
On Kue Business Architecture101On Kue Business Architecture101
On Kue Business Architecture101Carolyn N. Evans
 
Change Management
Change ManagementChange Management
Change Managementpromoking
 
Learning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersLearning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersCorpU
 
5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Finalphlckb
 
Toward Innovation Capability Maturity
Toward Innovation Capability MaturityToward Innovation Capability Maturity
Toward Innovation Capability MaturityHeinz Essmann
 
Infusing EPM in people and process
Infusing EPM in people and processInfusing EPM in people and process
Infusing EPM in people and processRavi Tirumalai
 
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining PresentationTim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining Presentationtimbates2
 
Streamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationStreamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationCallidus Software
 
Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)muzamilsecova
 
The Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsThe Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsOneSpring LLC
 

Similaire à How to implement ECM? (20)

Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support Services
 
Professional Support Services
Professional Support ServicesProfessional Support Services
Professional Support Services
 
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
Strategic Advancement in Turbulent Environment thru Organizational Project Ma...
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Csi Blackbelt Ia Masterclass Kl
Csi Blackbelt  Ia Masterclass KlCsi Blackbelt  Ia Masterclass Kl
Csi Blackbelt Ia Masterclass Kl
 
Csi Blackbelt Ia Masterclass Sg
Csi Blackbelt  Ia Masterclass SgCsi Blackbelt  Ia Masterclass Sg
Csi Blackbelt Ia Masterclass Sg
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogers
 
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for KnowledgeAPQC, Developing a Shadow Organisation to Make the Market for Knowledge
APQC, Developing a Shadow Organisation to Make the Market for Knowledge
 
On Kue Business Architecture101
On Kue Business Architecture101On Kue Business Architecture101
On Kue Business Architecture101
 
Change Management
Change ManagementChange Management
Change Management
 
Agile For Marketers
Agile For MarketersAgile For Marketers
Agile For Marketers
 
Learning Organization Governance for Top Performers
Learning Organization Governance for Top PerformersLearning Organization Governance for Top Performers
Learning Organization Governance for Top Performers
 
5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final5 Ingredients Of The EVM Secret Sauce V Final
5 Ingredients Of The EVM Secret Sauce V Final
 
Toward Innovation Capability Maturity
Toward Innovation Capability MaturityToward Innovation Capability Maturity
Toward Innovation Capability Maturity
 
ERP
ERPERP
ERP
 
Infusing EPM in people and process
Infusing EPM in people and processInfusing EPM in people and process
Infusing EPM in people and process
 
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining PresentationTim Bates Mba Technology Conference 2007 Data Mining Presentation
Tim Bates Mba Technology Conference 2007 Data Mining Presentation
 
Streamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales OrganizationStreamlining the Quota Process for a World-Class Sales Organization
Streamlining the Quota Process for a World-Class Sales Organization
 
Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)Investing in people building a learning organization (2.1)
Investing in people building a learning organization (2.1)
 
The Stream Process™ for Defining Projects
The Stream Process™ for Defining ProjectsThe Stream Process™ for Defining Projects
The Stream Process™ for Defining Projects
 

Plus de Atle Skjekkeland

The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0Atle Skjekkeland
 
How to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesHow to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesAtle Skjekkeland
 
State of the Capture Industry 2014
State of the Capture Industry 2014State of the Capture Industry 2014
State of the Capture Industry 2014Atle Skjekkeland
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM systemAtle Skjekkeland
 
How to create a mobile strategy
How to create a mobile strategyHow to create a mobile strategy
How to create a mobile strategyAtle Skjekkeland
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
How to Automate Records Management
How to Automate Records ManagementHow to Automate Records Management
How to Automate Records ManagementAtle Skjekkeland
 
How to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minHow to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minAtle Skjekkeland
 
The New World of Marketing and Sales
The New World of Marketing and SalesThe New World of Marketing and Sales
The New World of Marketing and SalesAtle Skjekkeland
 
How to sell ECM consulting?
How to sell ECM consulting?How to sell ECM consulting?
How to sell ECM consulting?Atle Skjekkeland
 
What does it take to be an ECM expert?
What does it take to be an ECM expert?What does it take to be an ECM expert?
What does it take to be an ECM expert?Atle Skjekkeland
 
Riding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessRiding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessAtle Skjekkeland
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
How to set up an online community?
How to set up an online community?How to set up an online community?
How to set up an online community?Atle Skjekkeland
 
New Information Certification
New Information CertificationNew Information Certification
New Information CertificationAtle Skjekkeland
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
How to implement share point
How to implement share pointHow to implement share point
How to implement share pointAtle Skjekkeland
 

Plus de Atle Skjekkeland (20)

The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0The Death of the B2B Sales Rep 1.0
The Death of the B2B Sales Rep 1.0
 
What is Content Analytics
What is Content AnalyticsWhat is Content Analytics
What is Content Analytics
 
How to sell MCS - Managed Content Services
How to sell MCS - Managed Content ServicesHow to sell MCS - Managed Content Services
How to sell MCS - Managed Content Services
 
State of the Capture Industry 2014
State of the Capture Industry 2014State of the Capture Industry 2014
State of the Capture Industry 2014
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM system
 
How to create a mobile strategy
How to create a mobile strategyHow to create a mobile strategy
How to create a mobile strategy
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
How to Automate Records Management
How to Automate Records ManagementHow to Automate Records Management
How to Automate Records Management
 
How to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minHow to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 min
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
The New World of Marketing and Sales
The New World of Marketing and SalesThe New World of Marketing and Sales
The New World of Marketing and Sales
 
How to sell ECM consulting?
How to sell ECM consulting?How to sell ECM consulting?
How to sell ECM consulting?
 
What does it take to be an ECM expert?
What does it take to be an ECM expert?What does it take to be an ECM expert?
What does it take to be an ECM expert?
 
How to sell solutions
How to sell solutionsHow to sell solutions
How to sell solutions
 
Riding the wave of socal media to grow your business
Riding the wave of socal media to grow your businessRiding the wave of socal media to grow your business
Riding the wave of socal media to grow your business
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
How to set up an online community?
How to set up an online community?How to set up an online community?
How to set up an online community?
 
New Information Certification
New Information CertificationNew Information Certification
New Information Certification
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
How to implement share point
How to implement share pointHow to implement share point
How to implement share point
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

How to implement ECM?

  • 1. How to implement ECM? Global best practices for implementing ECM using the open methodology MIKE2
  • 2. Implementation Which 3 of these typical problems have affected your organization‟s document or records management implementation? 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Underestimated process and organizational issues Uneven usage due to poor procedures and lack of enforcement Lack of knowledge or training among our internal staff. Project derailed by internal politics Low user acceptance due to poor design or clumsy implementation Excessive quot;scope creepquot; Actual Anticipated Underestimated the effort to distill and migrate content Poorly defined business case Source: Failed to secure agreement on fileplans, taxonomy and metadata AIIM ECM Survey Failed to think of benefits/issues beyond our business unit. February, 2009 Lack of knowledge or training among our external All respondents (284) staff/suppliers. Budget was overrun Failed to prioritize quot;high-valuequot; content 2
  • 3. The MIKE2 Methodology  quot;MIKE2 (Method for an Integrated Knowledge Environment) is an Open Source methodology for Enterprise Information Managementquot;  Source: mike2.openmethodology.org  Developed by BearingPoint, released as Open Source under Creative Commons  Meant to be repeatable and deliver working systems quickly, following trends in manufacturing and commercial software development  Continuous improvement (Lean)  Repeating implementation cycles (Agile) © AIIM | All rights reserved 3
  • 4. MIKE2 Phases (description)  Phase 1 - Business assessment  Phase 2 - Technology assessment  Phase 3 - Information management roadmap  Phase 4 - Design increment  Phase 5 - Incremental development, testing, deployment and improvement © AIIM | All rights reserved 4
  • 5. MIKE2 Phase 1 Source: http://mike2.openmethodology.org © AIIM | All rights reserved 5
  • 6. Conduct initial direction setting with sponsor  Sponsor needs to provide  Scope can be defined insights across a number of dimensions  Difficult or impossible to  Geographic do everything at once  Organisational  Scale of change  Legacy content  Nature of the impact to the  Information types organisation  Information classes  Cost  Timescales  Prioritisation is key © AIIM | All rights reserved 6
  • 7. Programme charter: Overall approach  Should be developed in 3  Environment: Develop stages high-level descriptions of  Current-state  Organisational behaviours  The environment  ECM support organisation structure  The principles & the future-state  ECM processes & instruments  Future-state  Produce initial model  Identify and consult stakeholders across the organisation  Review and revise © AIIM | All rights reserved 7
  • 8. Defining organisationalbehaviours Guidance & Protocols Organisational behaviours infrastructure FOR What we use the ECM Principles ECM 'Best Practices' Examples: • Duty to Share Examples: Drive • Team-working across Functions • Information as a Corporate • Re-using, not re-inventing Resource • Collaborative Working • Proactive sharing of knowledge Embodied Support in The WAY we use the infrastructure ECM Procedures ECM Rules Examples: Examples: • Procedure for requesting a new • Information must be stored in the Team Site Drive appropriate location • Procedure for declaring a record • Information with corporate value to the ECM Repository is stored to the ECM Repository 8 © AIIM | All rights reserved
  • 9. Organisational QuickScanfor information development  Analyses current-state of  Assessments organisation across  Application portfolio and multiple facets to identify functionality the baseline for the  Information flow organisation  Information delivery  Aids in planning what it will take  Information maturity and to get to the future-state vision infrastructure maturity  Economic value of information  Information processes  People skills and organisational structure © AIIM | All rights reserved 9
  • 10. Strategic business requirements  Establishes the overall set of strategic business requirements (business case) that translate into high level information requirements  Forms the basis for scoping the programme  Strategic business vision  Strategic critical success factors (CSFs)  Strategic key performance indicators (KPIs)  Strategic success measures  Strategic change drivers © AIIM | All rights reserved 10
  • 11. Strategic business vision  Defines what organisation wishes to achieve in the Future-State  Done by interviewing executives via scripts to capture  Business objectives  Competitive forces of concern  Differentiation and positioning statements  Major customers, buying habits and cycles  Major suppliers and incentives  Major competitors, substitutes and discriminators  Industry and historical supply chains  Success factors © AIIM | All rights reserved 11
  • 12. Business blueprint  Key deliverable of MIKE2  Final strategic analysis and synthesis of business assessment work  Completes and formalises the business vision  Completion of business blueprint results in  Prioritised requirements  Programme plan  Business case  Programme blueprint © AIIM | All rights reserved 12
  • 13. Eat the elephant one bite at a time  Go for specific projects, one at a time  Each project addresses portion of ECM producing business value  Start with something nutritious, not small and convenient  Produce business case for each of these projects separately © AIIM | All rights reserved 13
  • 14. Prioritise requirements  Refines the strategic information requirements  Determines the sequence of projects  Strategic vs. tactical  Within scope and outside of scope  Ranking done via group workshops with executives who provided initial feedback  With guidance of sponsor and stakeholders as appropriate  Focus is on business requirements, not technology requirements  Results in a list of work opportunities for the project © AIIM | All rights reserved 14
  • 15. Linking tactics to strategy Drives Contributes to (Balanced scorecard) Management / Strategic executive board (C-level) Operational Business area managers (Consequential impact) Users / other Tactical stakeholders © AIIM | All rights reserved 15
  • 16. Business blueprint components  Arranged in key sections  Executive summary  High-level programme plan  Business case  Strategic case  Economic case  Funding case  Commercial case  Project management case  Future-state conceptual architecture  Appendix © AIIM | All rights reserved 16
  • 17. MIKE2 Phase 2 You are here Source: http://mike2.openmethodology.org © AIIM | All rights reserved 17
  • 18. Technology assessment  Concentrates on the technical aspects of your strategy  Technology blueprint  Strategically ties the business requirements developed in Phase 1 to a logical and physical information architecture  Completes the “strategic programme blueprint”  Defines the overall programme delivery plan that provides the starting point for the continuous implementation phase  Refines the business requirements through ECM  Defines the technology architecture  Puts standards and technical infrastructure in place to support the software development process © AIIM | All rights reserved 18
  • 19. Business drives technology  Phase 1 and 2 parallelism  Phase 1 deliverables must be completed before phase 2 can be completed  Specifically, phase 2 requires the following from phase 1 before a full infrastructure can be prescribed:  Business vision  High-level business case  High-level information processes  Scope of key systems © AIIM | All rights reserved 19
  • 20. How to produce requirements: Overview  5 main stages  1. Plan Plan  2. Gather  3. Analyse  4. Document Agree Gather  5. Agree  Some stages are iterative and parts of entire process Document Analyse can be iterative © AIIM | All rights reserved 20
  • 21. Conduct gap analysis of current-state and future-state  Identify key gaps between current-state architecture and future-state  Where will new capabilities be needed?  What are those requirements?  Becomes basis for RFP and vendor selection © AIIM | All rights reserved 21
  • 22. MIKE2 Governance model Improved Governance and Operating Model Source: http://mike2.openmethodology.org © AIIM | All rights reserved 22
  • 23. Why information governance?  Accountability for organisation‟s information assets  Good governance  Ensures compliance with regulations and legislation  Enables productivity improvements  Enables organisation to respond to change and new opportunities  Helps information exchange with customers, partners and providers  Sustains good information management practices © AIIM | All rights reserved 23
  • 24. An information governance framework (IGF)  A sound IGF includes Policies Processes Standards Tools & People Audit technology © AIIM | All rights reserved 24
  • 25. The role of ECM in information governance  ECM environment is  Key tool for Information Governance  Repository for corporate memory  ECM systems depend on creation and maintenance of „Content Management Instruments‟, including:  Reference data (taxonomy, thesaurus, etc.)  Metadata standard for information, including documents, records, and websites etc.  Security and access classification scheme  Disposition schedules © AIIM | All rights reserved 25
  • 26. Continuous improvement Compliance Framework Detect Respond Detect Respond • Audit • Investigation • Ombudsperson • Communication • Monitoring • Improvements Prevent • Employee discipline Prevent • Risk assessments • Training • Policies & procedures • Executive commitment © AIIM | All rights reserved 26
  • 27. MIKE2 Phase 3 Roadmap • Roadmap © AIIM | All rights reserved 27
  • 28. Project roadmap overview  Project roadmap is the guide for the entire project  In each iteration of phase 3-5 however, it is the restricted guide for the requirements and level of detail involved in a SINGLE iteration  Tasks  Define overall release functionality  Identify and prioritise project risks  Identify infrastructure dependencies  Identify design dependencies  Define acceptance procedures  Define detailed project plan © AIIM | All rights reserved 28
  • 29. Identify and prioritise project risks With each iteration, re-examine risks for iteration and project as a whole Risk Likelihood Severity Mitigation There is a risk to Medium Severe Have two key developers undergo schedule and training. quality as Have a third party specialising in this developers are technology review high level designs unfamiliar with before coding starts. proposed Prototype first two function points technology for the before the remainder of the code is project developed. © AIIM | All rights reserved 29
  • 30. MIKE2 Phase 3 Foundation activities  Software development readiness  Enterprise information architecture  Taxonomy design  Metadata development  Solution architecture definition/revision  Prototype the solution architecture © AIIM | All rights reserved 30
  • 31. Foundation activities (1)  Focused on ensuring that the environment is ready and that basic solution decisions have been made  Important to establish at the beginning of each design, develop, deploy increment  Primarily focused on understanding information issues, resolving these problems and defining target content models  If not conducted first, other subsequent implementation work is likely to fail Source: http://mike2.openmethodology.org © AIIM | All rights reserved 31
  • 32. Foundation activities (2)  Technical and design foundations  Iterative  Risk assessment and management © AIIM | All rights reserved 32
  • 33. Taxonomic needs assessment Cynefin framework Source: Dave Snowden © AIIM | All rights reserved 33
  • 34. Developing a taxonomy Identify stakeholders Gather Define feedback purpose Deploy Determine scheme approach Collect Pilot scheme information Develop scheme © AIIM | All rights reserved 34
  • 35. MIKE2 Phase 4 You are here Source: http://mike2.openmethodology.org © AIIM | All rights reserved 35
  • 36. Identify training and administration guide requirements  Used to estimate training needs  Varies depending on complexity of the system, amount of change to the organisation required and ability of users to absorb the material  Questions answered  What is the nature of the audience and the contexts they will be using the ECM environment?  Who will need the documentation, at what level, when and why?  Typical targets for training  Departmental users  System operators  Management © AIIM | All rights reserved 36
  • 37. Develop outlines for operational manuals  There will be multiple operational manuals, targeted at the specific audiences identified  Typical examples  User procedures manual – for specific business functions  Operations procedures manual – for technical operations  Desk procedures – how to do specific business jobs using the system  Tasks 1.Examine existing operational manuals for corporate standards 2.Determine satisfaction with existing manuals 3.Based on identified requirements, build outline, vet with audience © AIIM | All rights reserved 37
  • 38. Design backup and recovery procedures  If your solution is based on a single provider, single repository - in a word, simple - fairly straightforward  Distributed, federated, integrated solutions exponentially more complex  Dirty secret of the ECM industry that backup and recovery is exceedingly difficult  Multiple repositories, integration paths, databases, indices, linkages between documents and repositories  Best approach  Closely work with solution provider and/or integrators to design and verify backup and recovery will actually work © AIIM | All rights reserved 38
  • 39. Business value of prototyping uncertainty uncertainty decreases over time time business value Cumulative Source (top): Barry Boehm Source (bottom): Jeff Patton, www.agileproductdesign.com 39 © AIIM | All rights reserved
  • 40. All users have raised expectations Source: NetFlix Source: Apple iTunes Music Store 40 © AIIM | All rights reserved
  • 41. MIKE2 Phase 5  Develop  Testing  Training  Deploy  Operate  Ongoing improvement  Closeout © AIIM | All rights reserved 41
  • 42. Develop user support documentation  Created to provide step-by-step documentation, with appropriate screenshots, to illustrate an entire process or task  Supplements any automated processes implemented within the system  Keep in mind how documentation is intended to be used in YOUR environment  Stand-alone reference manual  Basis for live or on-demand training  Develop at level of detail necessary for final use © AIIM | All rights reserved 42
  • 43. Develop operations support guides  Introduction  Job scheduling  Document distribution list  Monitoring & logging  Document change process  Load balancing  Problem management  Application overview  Change management  Production environment  Vendor management  Production architecture overview  Backup/restore procedures for application  Production environment components components  Application servers  System maintenance  Web servers, etc.  Print services  Security  Failure  Server security configurations  Appendix A - User account setup process &  Security log reviews access rights  Guidelines for access  Appendix B - Service level agreements  Account administration  Appendix C - Contact matrix  Data centre procedures  Appendix D - Software versions list  Startup/shutdown Source: http://mike2.openmethodology.org/wiki/Operations_Procedure_Outline_Deliverable_Template © AIIM | All rights reserved 43
  • 44. Technology backplane development  Making this available as soon as possible is critical for the development of ECM system  Provides “developer ready” environment to build and test system based on work done in foundation activities and design  Acquisition and training of developers was covered in phase 4  Tasks  Implement target repository  Develop content interface components  Develop process/automation components  Develop metadata management integration  Develop infrastructure management processes © AIIM | All rights reserved 44
  • 45. User testing  Pilots and model offices are popular approaches  Refine design and implementation of new ecm-enabled environment by directly involving users  Pilot approach  Trial of „draft‟ proposed environment  Uses a small subset of users  Usually in their normal working environment  Model office approach  More of a „laboratory‟ environment - somewhat rare  Typically used to „get it right‟, before moving to a pilot © AIIM | All rights reserved 45
  • 46. Model offices & pilot: Benefits  Technical evaluation  Finalise environment  Ensure all aspects of 1. Functional testing environment are defined 2. System integration testing  Establish and „freeze‟ a (SIT) configuration for roll-out 3. End-to-end testing (E2E)  Training development 4. Stress and volume testing (SVT)  Develop and assess training  Functionality evaluation materials and methods  Train the trainers, help desk staff,  Does it do all that is specified floor-walkers and required? etc. © AIIM | All rights reserved 46
  • 47. Production deployment  Post-pilot and/or model office work, the environment finally reaches a deployment-ready state  Final steps for deployment involved finalising how the solution will be deployed technically for production use  Tasks 1. Define distribution and installation method 2. Deploy baseline production environment 3. Deploy software to production © AIIM | All rights reserved 47
  • 48. Deploy software to production  Solution is ready to be released into production, with final evaluation and launch of the solution to the target communities  Production and operation procedures should be up and running alongside the infrastructure itself © AIIM | All rights reserved 48
  • 49. Evaluation and launch  Post technical deployment is the final evaluation, scheduled launch and post-launch verification and support  Transfers operations and support from the development/project team to operations personnel for solution moving forward  Contingency plans for any issues in final testing and launch should be in place and ready to activate, should any severe issues be identified  Validates that system is truly ready for rollout © AIIM | All rights reserved 49
  • 50. Training feedback loop  Collect feedback  At the time  And later Improve Review  Review, learn and improve Learn © AIIM | All rights reserved 50
  • 51. Importance of change readiness assessment  Organisational change will always appear threatening  People think of job security  Some enterprises more freely disseminate information regarding change and strategy than others  You need to assess your enterprise‟s readiness to change  Readiness of management and the workers affected by the change  How technology is used (or not) within the organisation  QuickScans and early assessments of Phase 1 provide diagnostic tools, while this module is focused on enabling necessary change © AIIM | All rights reserved 51
  • 52. Best practices for implementing change  Change needs to be managed, but there are many different methods for this  However, these methods share common themes  Most important theme: change occurs in the context of the enterprise‟s natural and recognised capabilities  All successful models  Address all elements of change  Provide a process for introducing change  Address critical success factors © AIIM | All rights reserved 52
  • 53. Creating user “wins”  Early wins create a “Yes” environment  Wins should be promoted widely  Leverage existing and new “super users”  Wins should be clear cut  Not open to interpretation  Wins should bring benefits to all  Wins should appear to come easily  Even a big bang approach can be delivered via a series of smaller wins… © AIIM | All rights reserved 53
  • 54. AIIM ECM Specialist and Master Program - learn how to impl. ECM www.aiim.org/training © AIIM | All rights reserved 54