EDUCATION. Information Classification: The Cornerstone to Information Management Sheila Childs, EMC

Size: px
Start display at page:

Download "EDUCATION. Information Classification: The Cornerstone to Information Management Sheila Childs, EMC"

Transcription

1 Information Classification: The Cornerstone to Information Management Sheila Childs, EMC

2 Abstract Information Classification: The Cornerstone to Information Management Anyone who is trying to get a handle on information growth, compliance-related risk mitigation and information management costs realizes that without an understanding of the information under management, these objectives are difficult to achieve. Fundamental to any ILM strategy is the practice of information classification Information classification requires that I.T. administrators work with Line-of-Business and knowledge workers to gain an understanding of the data to be managed. This sessions will explore the different types of classification methodologies and file system metadatabased classification and content/context-based classification will be discussed. Manual versus automated classification procedures will be discussed, along with the pros and cons that each approach has in its implementation. We will discuss the difference between indexing and classification, and discuss where each approach makes sense. The session will include information on various standards under development and focus on the work of the SNIA DMF ILM initiative. It will culminate with a view of the benefits to be derived through classification of information better risk mitigation, lowered management costs and a better understanding of corporate information. 2

3 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 3

4 The Issues: Management of Information Growth Information growth In 2003, 800 MB of new information was created for each man, woman and child on the earth. 92% of it stored on magnetic media Businesses users are expected to make up nearly half of the 500 million people that will be using Instant Messaging by % of all commerce conducted online ($1500 for every person on the planet) by This drives a tenfold increase in the number of transactions What s the problem? Can t reduce storage purchases (or accelerate storage purchases) Storage solutions not matched to data needs Poor understanding and/or weak definition of data security requirements Can t find what you need when you need it Can t manage what you don t know or understand Sources: IDC; Kahn/Blair 4

5 The Issues: Compliance- Related Risk Management Compliance Is a Huge Issue 2002 SEC fines five broker-dealers a total of $8.25M for failure to preserve communications (SEC Press Release 12/3/02) 2002: Federal agency admits that it s current system for collecting information is antiquated, outdated, inaccurate, and untimely after discovering that it had approved two 9/11 terrorists for student visas six months after 9/11(CNN.com, 3/12/02) Morgan Stanley must pay billionaire financier Ron Perelman more than $1.4B in damages (Forbes 5/18/2005) What s the problem? Urgency with which solutions are deployed Lack of understanding of what is important to be retained (classification) Accountability; business is at risk 5

6 The Goal: Information Management Information Management Disciplines AIIM focuses on Enterprise Content Management: content/document management, business process management, enterprise portals, knowledge management, image management, data warehousing and data mining ARMA focuses on Records Information Management : a specialized field of information management that is concerned with the systematic analysis and control of operating records associated with business activities SNIA focuses on the data center tools and technologies that enable Information Lifecycle Management 6

7 Information Lifecycle Management and Classification Information Lifecycle Management The policies, processes, practices and tools used to align the business value of information with the most appropriate and cost effective IT infrastructure from the time information is created through it s final disposition Information is aligned with business processes through management polices and service levels associated with applications, metadata, information and data Information Classification The process of assigning value to information associated with a business process, in order to produce requirements for the management of this information, within a defined scope 7

8 ILM Implementation Roadmap Instrument & manage services to ILM practices across sites Deploy ILM practices across the enterprise Automate with ILM Management tools Automate ILM-based policies & services Begin operating services to policies Set data & info polices across domains Tier storage and protection into standard Service Levels Pilot ILM-based Solution Stacks Standardize Information, Data, & Storage Services Begin collaborating on requirements Identify value, lifecycle, & classification of information for each business unit Identify information assets & infrastructure resources/ services 8

9 Why Classify? Why Now? Identifying the Value of Information Value: How much this information contributes to the business, Value of Information Plus risk assessment The loss of data or of access (business losses, downtime & productivity losses, credibility losses) The potential legal, business risk, or liability The cost to recreate the data Other measures which might include future value, ownership, value as a business record, competitive advantage, etc. Value of Information $z $y $x Mission Critical Business Vital Business Important Important Not Important Cost of Service Class of Service 9

10 Some Relevant Terms Data Data is what I.T. manages: files, volumes, bits and bytes Information Information is data with context Data Lifecycle supports the Information Lifecycle Record Recorded information, regardless of medium or characteristics, made or received by an organization that is evidence of its operations, and has value requiring its retention for a specific period of time (ARMA) Taxonomy A hierarchical structure used for categorizing a body of information or knowledge, allowing an understanding of how that body of knowledge can be broken down into parts, and how its various parts relate to each other. Taxonomies are used to organize information in systems, therefore helping users to find it. Related terms: ontology, categories, evidence structures Lexicon the vocabulary of a language, an individual speaker or group of speakers, or a subject Example: A dictionary of over 200,000 medical, pharmaceutical, biomedical & healthcare acronyms and abbreviations is a medical lexicon Related terms: thesaurus, vocabulary 10

11 Classification for Information Management Activity Kinds of Information Basic Classification Goal Records Management Business records Making sure business records are properly retained for legal, compliance and business purposes, and then properly disposed of when no longer needed Document / Content management Knowledge management Information security and privacy Disaster recovery Customer / client relationship management Storage Management Documents a wide range of digital information Operational information of all kinds All valuable information, with a focus on sensitive, confidential and proprietary information Information needed to continue business operations Information about an organizations interactions with customers/clients and prospects All stored digital business information Ensuring that there are controls in place for accessibility to business documents so that that they are easily accessible to knowledge workers and others Ensuring that the knowledge of some individuals and groups in an organization is harnessed for use by others in the organization Ensuring that valuable information is accessible only to those authorized to see it, and ensuring its trustworthiness Ensuring that the collection of and access to sensitive information is properly controlled Ensuring that vital information required to operate the business can be recovered in a timely fashion after a disaster Ensuring that the customers experience with a company is satisfactory and consistent; identifying customer patterns that can lead to more revenue Ensuring that storage resources such as disk and tape are used cost-effectively in a manner consistent with the value of the information stored Source: Information Nation, by Randy Kahn and Barclay Blair 11

12 Example: Classification for Security and Privacy Why classify for security and privacy? Ensure that valuable information is accessible only to those authorized to see it, and ensure its trustworthiness Ensure that the collection of and access to sensitive information is properly controlled Formal security classifications have existed in the U.S. for years Security practices: encryption, data retention, data sanitization But expensive and complex (ex: encrypting everything is rarely practical, so classification becomes critical) Check out SNIA Tutorial: Security Track 12

13 Classification is Difficult Stakeholders are numerous Huge amounts of Information do we need to classify it all? Determining what should be retained and what should be thrown away Scope Information is hard to find how much risk are you willing to bear? Lack of buy-in from business and senior executives But compliance is pushing execs to classify 13

14 Getting Started - Information Stakeholders Security Officer Line of Biz Application Sponsor Business Process Analyst I.T. Architect Records Manager DBA Information Management Architect I.T. Admin Legal Counsel Information Management Executive Committee 14

15 The Classification Process: Types of Classification Application-based Metadata (and extended metadata) Content 15

16 Application Classification Focused on Business Applications Drivers for Application Classification Disaster recovery and business continuity Server consolidation Application performance Application Classification is fairly simple Establishes a ranking of applications All information associated with the application is treated the same Works best when applications are segmented by server Application Classification is often good enough 16

17 Metadata-based Classification METADATA classification is largely based on file attributes and access patterns What is file named? What is the file type? Who owns the data? Where is it located? When was it created? 17

18 Metadata-based Classification Requirement Function How Classification Helps Disaster Recovery, Accessibility Information availability Lowered costs (implementation of tiers of storage) ediscovery Data placement and protection Data placement and protection Data migration Search and retrieval Identification of mission critical data required for resumption of business Frequency of access Understanding the lifecycle of applications AND user behavior (ownership, creation, access) Identifies data access patterns (Including frequency of access) Provides ownership information Information Security and Privacy Access control Address privacy concerns Identifies which departments and users have access to data 18

19 Metadata-based Classification File-level metadata offers limited input, therefore limited recognition Still useful but class of solutions limited Generally useful in optimizing HSM or archiving strategies Tends not to meet complex ILM needs (security, retention, etc.) Combined with valid ownership data (not System ), can yield incremental ILM value Ex: Legal dept {Joe, Mary, Betty, Tom, and Matt } Rule: all legal files stored in host_legal, retain = 5 yrs Pros & Cons Fast, lightweight, not invasive Doesn t address changing business value over time 19

20 Beyond Metadata Extended Metadata The Basics Name Size Date Owner Creation Date Modification Date Access Control Security Clearance Access Control List Browse Privileges Read Privileges Write Privileges Sharing Policy etc. Ownership Creator Last Updated By Department Division Application Project ID etc. Compliance Retention Policy Expunge Date Industry Regulation Flag Corp Governance Flag Attorney-Client Priv Flag etc. Identification File Format Version Related Transaction Related Content Objects Parent Object Child Objects Bar Code Tracking ID Radio Frequency ID etc. Process Control Approval Status Lifecycle Phase Workflow Routing Send To Rules Next Approver etc. 20

21 Content Classification Classification based on CONTENT makes use of indexes, lexicons and taxonomies What keywords? How is this data related to other data? How should data be retained/disposed of for compliance or otherwise used by the business? 21

22 Content Classification Requirement Function How Classification Helps Records retention Data placement Ensuring the proper retention and disposal of business records ediscovery Information Security and Privacy Complying with electronic document discovery and preservation Access control Including AND other documents Ensure distinction of relevant records from nonrelevant records Protect the corporation Reduce time required for discovery Address privacy concerns Identifies content to secure Document, content and knowledge management Knowledge use Share information to drive business goals Storage Management Data placement and protection Information protection, access, etc. Of secondary importance (?) 22

23 When Does Content Classification Make Sense? Automated Classification speeds time-to-information effectiveness Automated Content Classification make sense When multiple classification options results in confusion When there is an overwhelming volume of items to classify When some documents require time-consuming review by subject matter experts When there are a large number of non-business documents When you don t want to have idiosyncratic results The highest quality and accuracy occurs when records management is as non-intrusive as possible to the desktop end users and does not interfere with the normal work routines of professional staff in the enterprise ** ** Timothy J. Sprehe and Charles R. McClure, Lifting the Burden. Information Management Journal, Vol.39 Issue 4 (Jul/Aug 2005),

24 Content Classification Algorithms All content-based classification is based on natural language Content classification algorithms Keywords Term frequency Pattern matching Latent semantic analysis (synonymy and polysemy) Neural Networks Bayesian Rules-based 24

25 Example of Content Classification (Rules-based) Objective: Find and classify all documents at a mortgage company into category New Homes Built in Fresno Classification Rules Document has Fresno in title (metadata) Document refers to homeowner/builder Perry or Trendmaker (keyword) Document includes Fresno in the text (keyword) Document uses abbreviations or regular expressions (entity extraction) 4 bdrm, 5/2.5/3 Comprehensive rule: if Fresno is true, Perry Homes is true, the document contains a numeric string such that 2003<x<2007 and/or uses the above regular expressions, then classify as a new home being built by Perry Homes in Fresno Secondary objective: Relate and groups plot plan, land survey, deed based this classification of documents 25

26 Building Taxonomies Kingdom Taxonomies A Taxonomy is a classification scheme that makes it easy for user to find information based on familiar hierarchies Industry specific lexicons and taxonomies are available Taxonomies should maintain policies and rules as industry and business environment changes Taxonomies should leverage exiting thesauri and glossaries Phylem Class Order Family Genus Species Kingdom Kingdom 26

27 Classification: What is Good Enough? Challenges of classification various types Some human intervention always required to review results of classification Automated tools improve efficiency Documents with little text how are these classified? Power point slides, , etc. Varying document types Metadata classification might be better in this case Lack of consistency in naming, structure, format Metadata classification may be best Factors affecting accuracy Document consistency / naming consistency The strength of the taxonomy (content) Applicability of classification algorithms to specific content What is a reasonable cost per document? What is the cost of a document that is incorrectly classified? Does cost outweigh the value to the organization? 27

28 Additional Definitions Indexing = the act of preparing documents to be searched later; specifically, where in the document does a word/ phrase/ string occur Search = the act of looking for something in documents Clustering = the act of grouping related documents and using these groups to generate dynamic categories; statistical/ semantic analysis to generate vector; documents are grouped along similar vectors Classification = the act of organizing/sorting/storing documents into pre-defined categories; includes concept recognition, pattern matching, entity extraction, thesaurus, misspelling, related terms, broad/ narrow terms, etc. 28

29 Indexing versus Content Classification Index When keyword searches only are sufficient When looking to find information quickly within a particular file or document Aspects Search may return too many matches Can be security hole if indexed by system Proprietary formatting issues Not all formats can be indexed Provides objective analysis of textual information found Nothing about misspellings, query expansion, thesauri, etc. 29

30 Indexing versus Classification Classify based on content When you need to group related documents When you need to discover information that is or might be relevant When you need to associate documents with one category or another based on the meaning of a word (or phrase) Aspects Content/documents must be cracked and run through classifier/taxonomy rules engine 30

31 SNIA s Role Business Process Information Lifecycle Information Classification Industry-specific and company-specific considerations may produce unique information and/or requirements. The mapping of business requirements to data Service Level Objectives and policies for applying those SLOs to data during the information s lifecycle. Best practices defined by SNIA Data Management Forum Data Lifecycle Data Classification Common data center-wide definitions of expected behavior. The assignment of service levels to data based on its current state in its lifecycle. Standards defined by SNIA 31

32 To Achieve Alignment, I.T. Classifies Its Resources Into A Service Catalog Mission Critical Business Critical Business Important Development Requirement SLA 1 SLA 2 SLA 3 SLA 4 Availability 99.99% 99.9% 99% 97% Threshold based Automated provisioning Up to 20% of current file System allocation within 1 business Day Up to 20% of current file system allocation within 2 business days Up to 10% or current file system allocation within 4 business days Up to 20%of file system allocation within 1 business week scratch based allocation RTO 15 minutes 1 hour 8 hours 24 hours RPO 1 hour 12 hours 48 hours 96 hours Restore Requests 100 requests/ week 100 requests / week 50 requests / week 50 requests / week Backup success rates 97% 95% 90% 90% Archive Policy No access in 90 days No access in 30 days No access in 90 days No access in 180 days Archive access time Seconds Seconds Up to 4 Hours hours Forecasting Monthly Quarterly Yearly Yearly Incident classification and notification Sev. 1 < 15 minutes Sev. 2 < 30 minutes Sev. 3 < 1 day Sev. 4 < 1 day Sev. 1 < 25 minutes Sev. 2 < 40 minutes Sev. 3 < 1 day Sev. 4 < 1 day Sev. 1 < 25 minutes Sev. 2 < 40 minutes Sev. 3 < 1 day Sev. 4 < 1 day Sev. 1 < 25 minutes Sev. 2 < 40 minutes Sev. 3 < 1 day Sev.4 < 1 day Asset reporting to support chargeback Weekly Bi-weekly Monthly Monthly Compliance HIPPA SEC 17a4 Sarbanes-Oxley None Compliance categories Cost $$$$ $$$ $$ $ Check out SNIA Tutorial: ILM ILM and and Tiers Of Of Storage 32

33 What Are Your Next Steps? 1. Set project objectives it s not too soon to implement information classification Processes can be put in place; some tools are available, technologies have emerged. Use of consulting services 2. Empower a cross-discipline, responsible Information Management team Storage Architect / I.T. Line-of-Business representatives Records Manager Legal Counsel Security Officer 3. Identify Application/Information to be classified and managed Scope Application-based, METADATA-based, Content-based Indexing 4. Create standard configurations with well-defined service classifications 5. Classify Infrastructure resources 6. Correlate Information Classes with SLOs (may not be 1:1) 7. Align information with Infrastructure based on classifications 33

34 Summary Classification - Immediate Benefits Better understanding of your information Better deployment and alignment of your I.T. resources (storage/server consolidation, smart purchases, etc.) Better compliance readiness and ediscovery Classification - Longer term benefits Service Level Management improves I.T. service delivery Information management automation Cost reduction 34

35 Other Related Tutorials and Data Management Activities at SNW Data Management Tutorials Using ILM to Leverage Business Continuity and Disaster Recovery at the Acme Anvil Data Protection for Federated Environments, Application Consistency and Coherency Disk-based Restoration Technologies Disk and Tape Backup Mechanisms ILM and Tiers of Storage Archives, Backups and Disaster Recovery: Lines of Distinction Next Generation Technologies for Tiering and Compliance Maintaining Logical Readability in Long-term Archives Identifying and Eliminating Backup System Bottlenecks Data Management Solutions Center Check out SNIA Tutorial: Data Mgmt Track 35

36 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: track-datamgmt@snia.org Many thanks to the following individuals for their contributions to this tutorial. SNIA Education Committee Edgar St. Pierre Bob Rogers Eric Hibbard Matthew Coblentz Bill Pierce LeRoy Budnick 36

Implementation Practices for the Archiving and Compliance Infrastructure

Implementation Practices for the Archiving and Compliance Infrastructure Implementation Practices for the Archiving and Compliance Infrastructure Gary Zasman, Network Appliance WW Practice Director Co-chair 100 Year Archive and ILM PS SNIA Legal Notice The material contained

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

Why CIP? AIIM International's Certified Information Professional designation was designed to allow information professionals to:

Why CIP? AIIM International's Certified Information Professional designation was designed to allow information professionals to: Why CIP? Over the past decade, there has been a perfect storm of change driven by consumerization, cloud, mobile, and the Internet of Things. It has changed how we think about enterprise information and

More information

AIIM ERM Certificate Programme

AIIM ERM Certificate Programme Electronic Records Management (ERM) Managing electronic records effectively in the organisation AIIM ERM Certificate Programme ERM ERM ERM Case Study Strategy Practitioner Specialist 2 1 ERM Practitioner

More information

Document Management System Software Application

Document Management System Software Application An Introduction to Document Management System Software Application For Financial Software & Systems Pvt Ltd Introduction Today, document management systems support the life cycle management of document

More information

Information Lifecycle Management Solution from IBM

Information Lifecycle Management Solution from IBM Information Lifecycle Management Solution from IBM Cost-effectively manage information and leverage its business value throughout its lifecycle Vinod Nair Server & Storage Services IBM Asia Pacific Disclaimers

More information

Taming the Information Explosion

Taming the Information Explosion Taming the Information Explosion Bill Tolson Director of Product Marketing, Archiving Solutions Iron Mountain Inc. Accelerated information growth Proliferation of Personal Devices Growth of Email, Collaboration

More information

Data Archiving. The First Step Toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost

Data Archiving. The First Step Toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost Data Archiving The First Step Toward Managing the Information Lifecycle Best practices for SAP ILM to improve performance, compliance and cost Copyright 2018 Dolphin Enterprise Solutions Corporation (dba

More information

IBM System Storage. IBM Information Archive: The next-generation information retention solution

IBM System Storage. IBM Information Archive: The next-generation information retention solution IBM System Storage IBM Information Archive: The next-generation information retention solution Highlights Reduce cost Reduce disk capacity requirements with built-in data deduplication and compression

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The Information Lifecycle Management Imperative Sponsored by: HP Susan Feldman July 2006

More information

Data Classification Why, When and How

Data Classification Why, When and How Data Classification Why, When and How Primary Author: Steve Duplessie, Senior Analyst, Secondary Author: Heidi Biggar, Analyst, October 2005 Executive Summary Executive Summary Data classification has

More information

How to Drive Business Value with Capacity Management

How to Drive Business Value with Capacity Management How to Drive Business Value with Capacity Management 18 July 2017 Your Presenter Jim Smith The Building Blocks Executive Buy-in Benefits realization Assessment Roles and responsibilities Strategy Toolset

More information

Managing BI Volume & Complexity for Better Service

Managing BI Volume & Complexity for Better Service for Better Service Presentation Topics BI Then and Now BI Platform Management Issues & Challenges System Analysis Administration Storage Migration Considerations Best Practices Key Learnings Business Intelligence

More information

S U R V E Y I D C O P I N I O N. Cushing Anderson

S U R V E Y I D C O P I N I O N. Cushing Anderson S U R V E Y I m p a c t o f T r a i n i n g o n N e t w o r k A d m i n i s t r a t i o n : C e r t i f i c a t i o n L e a d s t o O p e r a t i o n a l P r o d u c t i v i t y Cushing Anderson I D C

More information

What's Shaping the Future of Enterprise Content. Management? JOHN O MELIA

What's Shaping the Future of Enterprise Content. Management? JOHN O MELIA What's Shaping the Future of Enterprise Content JOHN O MELIA Management? SENIOR VICE PRESIDENT, CUSTOMER SUCCESS AND SOLUTIONS, EMC ENTERPRISE CONTENT DIVISION 1 The emergence of The Digital Enterprise

More information

EMC Documentum. Insurance. Solutions for. Solutions for Life, Property & Casualty, Health and Reinsurance

EMC Documentum. Insurance. Solutions for. Solutions for Life, Property & Casualty, Health and Reinsurance Solutions for Solutions for Life, Property & Casualty, Health and Solutions For Back Office Support Life, Property & Casualty, Health, Legal & Claims Marketing & New Product Creation Underwriting & Sales

More information

Determine Where Your Apps Should Live in a Multi-cloud World GLOBAL SPONSORS

Determine Where Your Apps Should Live in a Multi-cloud World GLOBAL SPONSORS Determine Where Your Apps Should Live in a Multi-cloud World GLOBAL SPONSORS First Align Investments with Business Goals Invest in & prioritize the most relevant applications It doesn t meet my business

More information

Speed Business Performance, Lower Cost, and Simplify IT with Automated Archiving

Speed Business Performance, Lower Cost, and Simplify IT with Automated Archiving SAP Brief SAP Extensions SAP Archiving and Document Access by OpenText Speed Business Performance, Lower Cost, and Simplify IT with Automated Archiving SAP Brief Store, manage, and access data and documents

More information

Oracle Service Cloud. New Feature Summary. Release 18C ORACLE

Oracle Service Cloud. New Feature Summary. Release 18C ORACLE Oracle Service Cloud Release 18C New Feature Summary ORACLE TABLE OF CONTENTS Revision History 3 Overview 3 Agent Browser Desktop Automation 3 Workflow Enable Save Option for Workflow Elements 3 Workflow

More information

Key Considerations When Migrating Workloads to the Public Cloud

Key Considerations When Migrating Workloads to the Public Cloud Key Considerations When Migrating Workloads to the Public Cloud Overview Public cloud services have become central to IT strategy. The potential cost savings and agility are simply too compelling to ignore.

More information

Taxonomy Based Design

Taxonomy Based Design Taxonomy Based Design An overview of using controlled lists to boost adoption, support change, and create a model for compliance-by-default in SharePoint 2013 Overview Implementation of records and information

More information

1 Documentation Accessibility

1 Documentation Accessibility Oracle Records Management Administrator s Guide 10g (10.1.1) B16225-01 July 2005 This document provides conceptual information for Oracle Records Management 10g (10.1.1) Administration. This chapter contains

More information

Solutions We approach your solution from every point

Solutions We approach your solution from every point Data Storage and Management Q3 2006 The greater the storage volume, the greater the risk of data corruption, lost files, and backups and disaster recovery complication issues. Gartner (2005) 360 º The

More information

Managing Data Warehouse Growth in the New Era of Big Data

Managing Data Warehouse Growth in the New Era of Big Data Managing Data Warehouse Growth in the New Era of Big Data Colin White President, BI Research December 5, 2012 Sponsor 2 Speakers Colin White President, BI Research Vineet Goel Product Manager, IBM InfoSphere

More information

Simplify Governance, Risk, and Compliance with Enterprise Content Management

Simplify Governance, Risk, and Compliance with Enterprise Content Management Simplify Governance, Risk, and Compliance with Enterprise Content Management 2 Contents Executive Summary...2 Introduction...3 The Challenges of Managing Data & Documents...4 Key Features of ECM...7 ECM

More information

Avoiding Knowledge Management Pitfalls. Ten Common Mistakes and How to Avoid Them

Avoiding Knowledge Management Pitfalls. Ten Common Mistakes and How to Avoid Them Avoiding Knowledge Management Pitfalls Ten Common Mistakes and How to Avoid Them Table of Contents Introduction... 1 1. Failure to Set and Track Specific Goals... 1 2. Doing Too Much at Once... 2 3. Starting

More information

W H I T E P A P E R D e l l T a k e s H o l i s t i c A p p r oach to the Secondary Storage Market with Its Intelligent Data Management Solutions

W H I T E P A P E R D e l l T a k e s H o l i s t i c A p p r oach to the Secondary Storage Market with Its Intelligent Data Management Solutions W H I T E P A P E R D e l l T a k e s H o l i s t i c A p p r oach to the Secondary Storage Market with Its Intelligent Data Management Solutions Sponsored by: Dell Robert Amatruda March 2009 IN THIS IDC

More information

Rocket Solutions for IBM z Systems. System Optimization & Storage Tools. Data Protection. Mainframe Modernization. Business Intelligence

Rocket Solutions for IBM z Systems. System Optimization & Storage Tools. Data Protection. Mainframe Modernization. Business Intelligence PRODUCT CATALOG Rocket Solutions for IBM z Systems Data Protection System Optimization & Storage Tools Data Migration Access and Connectivity Mainframe Modernization Business Intelligence Rocket solutions

More information

ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists.

ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists. What is ECM? Enterprise Content Management (ECM) is the technology used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies

More information

Five Things You Need to Know Before Investing in a Copier or Multifunction System. Introduction A BUYER S GUIDE TO COPIERS & MULTIFUNCTION SYSTEMS

Five Things You Need to Know Before Investing in a Copier or Multifunction System. Introduction A BUYER S GUIDE TO COPIERS & MULTIFUNCTION SYSTEMS 1 Five Things You Need to Know Before Investing in a Copier or Multifunction System Introduction Multifunction systems (also known as Multifunction Printers (MFP) or Multifunction Devices (MFD) combine

More information

THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS Customer Experience & Beyond

THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS Customer Experience & Beyond www.sandsiv.com THE CUSTOMER EXPERIENCE MANAGEMENT REPORT & RECOMMENDATIONS TM 1 Customer Experience & Beyond www.sandsiv.com TM Customer Experience & Beyond Legal Notice: Sandsiv 2015. All Rights Reserved.

More information

COURSE 20332B: ADVANCED SOLUTIONS OF MICROSOFT SHAREPOINT SERVER 2013

COURSE 20332B: ADVANCED SOLUTIONS OF MICROSOFT SHAREPOINT SERVER 2013 ABOUT THIS COURSE This five-day course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment. Special areas of focus include implementing high availability, disaster

More information

CI Information Hub. Incorporating Text Analysis into Business and Competitive Intelligence

CI Information Hub. Incorporating Text Analysis into Business and Competitive Intelligence CI Information Hub Incorporating Text Analysis into Business and Competitive Intelligence March 12, 2008 Iknow LLC 100 Overlook Center, 2nd Floor Princeton, New Jersey 08540-7814 T: (609) 419-0500 F: (609)

More information

Deloitte Discovery Advisory Enabling an agile response to discovery, investigatory, and regulatory requests

Deloitte Discovery Advisory Enabling an agile response to discovery, investigatory, and regulatory requests Deloitte Discovery Advisory Enabling an agile response to discovery, investigatory, and regulatory requests 2018 Deloitte Discovery Advisory The Deloitte approach Deloitte Discovery Advisory The Deloitte

More information

The Case to Modernize Storage in Media and Entertainment

The Case to Modernize Storage in Media and Entertainment The Case to Modernize Storage in Media and Entertainment Contents Introduction... 3 Traditional Storage in Media and Entertainment... 3 A Modern Approach to Storage... 4 Modern Storage for Media and Entertainment...

More information

Data Warehousing provides easy access

Data Warehousing provides easy access Data Warehouse Process Data Warehousing provides easy access to the right data at the right time to the right users so that the right business decisions can be made. The Data Warehouse Process is a prescription

More information

Course 20332A Advanced Solutions of Microsoft SharePoint Server 2013 Course Duration: 5 days Course Type: Instructor-Led/Classroom

Course 20332A Advanced Solutions of Microsoft SharePoint Server 2013 Course Duration: 5 days Course Type: Instructor-Led/Classroom Course 20332A Advanced Solutions of Microsoft SharePoint Server 2013 Course Duration: 5 days Course Type: Instructor-Led/Classroom Course Overview This five-day course examines how to plan, configure,

More information

Cognitive Data Governance

Cognitive Data Governance IBM Unified Governance & Integration White Paper Powered by Machine Learning to find and use governed data Jo Ramos Distinguished Engineer & Director IBM Analytics Rakesh Ranjan Program Director & Data

More information

Managing Electronic Records: Methods, Best Practices, and Technologies

Managing Electronic Records: Methods, Best Practices, and Technologies Managing Electronic Records: Methods, Best Practices, and Technologies Smallwood, R ISBN-13: 9781118218297 Table of Contents Foreword Preface Acknowledgments Part I: E-Records Concepts Chapter 1 E-Records

More information

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F NCOVER ROI Analysis for Test Coverage Using NCover NCover P.O. Box 9298 Greenville, SC 29601 T 864.990.3717 F 864.341.8312 conversation@ncover.com www.ncover.com Table of Contents Executive Summary 2 Cost

More information

Build a Future-Ready Enterprise With NTT DATA Modernization Services

Build a Future-Ready Enterprise With NTT DATA Modernization Services NTT DATA welcomed Dell Services into the family in 2016. Together, we offer one of the industry s most comprehensive services portfolios designed to modernize business and technology to deliver the outcomes

More information

INFOBrief. EMC VisualSRM Storage Resource Management Suite. Key Points

INFOBrief. EMC VisualSRM Storage Resource Management Suite. Key Points INFOBrief EMC VisualSRM Storage Resource Management Suite Key Points EMC VisualSRM is data center-class software specifically architected to provide centralized storage resource management for mid-tier

More information

Before we begin, let s talk briefly about why GIS data quality is important.

Before we begin, let s talk briefly about why GIS data quality is important. 1 2 Before we begin, let s talk briefly about why GIS data quality is important. Regardless of whether you are producing or consuming GIS data, it is important that the data you use meets some agreed upon

More information

A guide to knowledge management in today s digital workplace

A guide to knowledge management in today s digital workplace A guide to knowledge management in today s digital workplace Knowledge management is mission critical 23% 23% of employees say it takes 5 10 minutes to access the latest version of a standard template

More information

Information Technology Services Project Management Office Operations Guide

Information Technology Services Project Management Office Operations Guide Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...

More information

Journey Up the IT Management Process Maturity Model To Assure IT Service Quality, Availability and Performance

Journey Up the IT Management Process Maturity Model To Assure IT Service Quality, Availability and Performance Journey Up the IT Management Process Maturity Model To Assure IT Service Quality, Availability and Performance Debra Curtis Research Vice President IT Operations Management Network Infrastructure Bandwidth

More information

Moving Beyond Information Life Cycle Management

Moving Beyond Information Life Cycle Management WHITE PAPER Moving Beyond Information Life Cycle Stephen Widen Product Marketing Manager June 2004 Executive Summary Information life cycle management (ILM) is one of the most widely discussed initiatives

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

IBM TRIRIGA Version 10 Release 4.0. Strategic Facility Planning User Guide

IBM TRIRIGA Version 10 Release 4.0. Strategic Facility Planning User Guide IBM TRIRIGA Version 10 Release 4.0 Strategic Facility Planning User Guide Note Before using this information and the product it supports, read the information in Notices on page 47. This edition applies

More information

Cloud Computing, How do I do that?

Cloud Computing, How do I do that? Cloud Computing, How do I do that? Christian Verstraete Chief Technologist - Cloud Every Generation has a Defining Industry 2 IT is the Defining Industry of our Generation 1970-80s Mainframe 1990s Client/Server

More information

RECORDS MANAGEMENT GOVERNANCE IN 12 EASY STEPS A GUIDE CREATED BY

RECORDS MANAGEMENT GOVERNANCE IN 12 EASY STEPS A GUIDE CREATED BY RECORDS MANAGEMENT GOVERNANCE A GUIDE CREATED BY RECORDS MANAGEMENT GOVERNANCE RECORDS MANAGEMENT GOVERNANCE Not too long ago, records management was a primary concern for many organizations. A small event

More information

Ensuring Organizational & Enterprise Resiliency with Third Parties

Ensuring Organizational & Enterprise Resiliency with Third Parties Ensuring Organizational & Enterprise Resiliency with Third Parties Geno Pandolfi Tuesday, May 17, 2016 Room 7&8 (1:30-2:15 PM) Session Review Objectives Approaches to Third Party Risk Management Core Concepts

More information

Fixed Scope Offering for Implementation of Oracle Fusion CRM in Cloud

Fixed Scope Offering for Implementation of Oracle Fusion CRM in Cloud Fixed Scope Offering for Implementation of Oracle Fusion CRM in Cloud Today s Business Challenges Adopt leading CRM practices and stream line processes Take advantage of CRM to attract new customers, develop

More information

The Secrets of Successful Knowledge Management

The Secrets of Successful Knowledge Management SESSION 408 Thursday, April 14, 10:00am - 11:00am Track: Industry Insights The Secrets of Successful Knowledge Management Peter McGarahan Senior IT Director, Infrastructure Corporate IT, First American

More information

Module: Building the Cloud Infrastructure

Module: Building the Cloud Infrastructure Upon completion of this module, you should be able to: Describe the cloud computing reference model Describe the deployment options and solutions for building a cloud infrastructure Describe various factors

More information

Communicate and Collaborate with Visual Studio Team System 2008

Communicate and Collaborate with Visual Studio Team System 2008 Communicate and Collaborate with Visual Studio Team System 2008 White Paper May 2008 For the latest information, please see www.microsoft.com/teamsystem This is a preliminary document and may be changed

More information

Advanced Solutions of Microsoft SharePoint Server 2013

Advanced Solutions of Microsoft SharePoint Server 2013 20332 - Advanced Solutions of Microsoft SharePoint Server 2013 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This five-day training course examines

More information

CERT Resilience Management Model, Version 1.2

CERT Resilience Management Model, Version 1.2 CERT Resilience Management Model, Asset Definition and Management (ADM) Richard A. Caralli Julia H. Allen David W. White Lisa R. Young Nader Mehravari Pamela D. Curtis February 2016 CERT Program Unlimited

More information

Backups Can Drive a Successful Data Management Strategy

Backups Can Drive a Successful Data Management Strategy Backups Can Drive a Successful Data Management Strategy Keeping everything forever is not a strategy, not keeping enough will get you fired! INTRODUCTION Gone are the days of managing backups just for

More information

Proactively Managing ERP Risks. January 7, 2010

Proactively Managing ERP Risks. January 7, 2010 Proactively Managing ERP Risks January 7, 2010 0 Introductions and Objectives Establish a structured model to demonstrate the variety of risks associated with an ERP environment Discuss control areas that

More information

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2015

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2015 Document version: 2.8 Issued to: Harbinger Escrow Services Issued by: Harbinger Group Pty Limited Delivered on: 18 March 2015 Harbinger Group Pty Limited, Commercial in Confidence Table of Contents 1 Introduction...

More information

Silicon Valley SharePoint Users Group 8/15/2013. Records Management and ediscovery For Business Users and IT. Rajesh Agadi Principal Consultant

Silicon Valley SharePoint Users Group 8/15/2013. Records Management and ediscovery For Business Users and IT. Rajesh Agadi Principal Consultant Silicon Valley SharePoint Users Group 8/15/2013 Records Management and ediscovery For Business Users and IT Rajesh Agadi Principal Consultant My Bio (Principal Consultant, Netwoven Inc) Over 20 years of

More information

Implementing a Service Management Architecture

Implementing a Service Management Architecture Implementing a Service Architecture Carolin Granzow GTS Middleware Services IBM Service, AP 2008 IBM Corporation Business Unit or Product Name What your business needs from IT Partner with the business

More information

Data Protection Management (DPM)

Data Protection Management (DPM) Industry Trends and Technology Perspective White Paper Data Protection Management (DPM) A look at the benefits of DPM for timely and effective data protection management By Greg Schulz Founder and Senior

More information

20332: Advanced Solutions of Microsoft SharePoint Server 2013

20332: Advanced Solutions of Microsoft SharePoint Server 2013 To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com 20332: Advanced Solutions of Microsoft SharePoint Server 2013 Duration: 5 Days Course Outline Module

More information

Striking the Balance Between Risk and Reward

Striking the Balance Between Risk and Reward Experience the commitment Striking the Balance Between Risk and Reward in payments modernization Staying competitive in financial services requires meeting everincreasing customer expectations for digital

More information

Operational Level Agreement: SQL Server Database Incidents and Requests

Operational Level Agreement: SQL Server Database Incidents and Requests Operational Level Agreement: SQL Server Database Incidents and Requests Version 0.4 02/19/2015 Contents Document Approvals Operational Level Agreement Overview Description of Services Services Included

More information

Information Management Strategy

Information Management Strategy Information Management Strategy What You Need To Know! David Pierce & Lascelles Forrester 1 Copyright 2010 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks

More information

Presentation Overview

Presentation Overview Track 1 Session 1 KM Tools -- A Technology Overview Delivering Business Value Through Innovative KM Applications Tom Beckman Division CIO, Criminal Investigation Internal Revenue Service U.S. Government

More information

Realizing the Value of Cloud

Realizing the Value of Cloud the way we do it Realizing the Value of Cloud Leveraging the value of Cloud Companies are realizing that the Cloud is an inevitable part of their future not a question of if but rather when, where, what

More information

Records Management System

Records Management System PRODUCT BROCHURE Product Brochure Records System Define and Enforce Records Classification, Retention and Disposition Policies Record System manages Physical and Electronic documents and records from their

More information

NetApp Services Viewpoint. How to Design Storage Services Like a Service Provider

NetApp Services Viewpoint. How to Design Storage Services Like a Service Provider NetApp Services Viewpoint How to Design Storage Services Like a Service Provider The Challenge for IT Innovative technologies and IT delivery modes are creating a wave of data center transformation. To

More information

Enterprise Management Frameworks & TOGAF 9

Enterprise Management Frameworks & TOGAF 9 Enterprise Management Frameworks & TOGAF 9 Presented By: Mr. Robert (Bob) Weisman MSc, PEng, PMP, CD CEO/Principal Consultant, Build The Vision Inc. Robert.weisman@buildthevision.ca www.buildthevision.ca

More information

Sydney Opera House Policy

Sydney Opera House Policy Title: Policy Number: Sydney Opera House Policy Records Management Policy SOH137 Effective Date: 5 June 2012 Next Review: June 2014 Authorisation: Chief Executive Authorisation Date: 5 June 2012 Superseded

More information

A Freshwater Partners White Paper

A Freshwater Partners White Paper C r e a t i n g B u s i n e s s C a p a b i l i t y w i t h a P M O A Freshwater Partners White Paper Whether you view the coordinated management of multiple projects as program management, or portfolio

More information

Information Architecture: Leveraging Information in an SOA Environment. David McCarty IBM Software IT Architect. IBM SOA Architect Summit

Information Architecture: Leveraging Information in an SOA Environment. David McCarty IBM Software IT Architect. IBM SOA Architect Summit Information Architecture: Leveraging Information in an SOA Environment David McCarty IBM Software IT Architect 2008 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA on current Enterprise

More information

Contents About This Guide... 5 Upgrade Overview... 5 Examining Your Upgrade Criteria... 7 Upgrade Best Practices... 8

Contents About This Guide... 5 Upgrade Overview... 5 Examining Your Upgrade Criteria... 7 Upgrade Best Practices... 8 P6 EPPM Upgrade Best Practices Guide 16 R2 September 2016 Contents About This Guide... 5 Upgrade Overview... 5 Upgrade Process... 5 Assessing the Technical Environment... 6 Preparing for the Upgrade...

More information

COURSE OUTLINE MOC 20332: ADVANCED SOLUTIONS OF MICROSOFT SHAREPOINT SERVER 2013 MODULE 1: UNDERSTANDING THE SHAREPOINT SERVER 2013 ARCHITECTURE

COURSE OUTLINE MOC 20332: ADVANCED SOLUTIONS OF MICROSOFT SHAREPOINT SERVER 2013 MODULE 1: UNDERSTANDING THE SHAREPOINT SERVER 2013 ARCHITECTURE COURSE OUTLINE MOC 20332: ADVANCED SOLUTIONS OF MICROSOFT SHAREPOINT SERVER 2013 MODULE 1: UNDERSTANDING THE SHAREPOINT SERVER 2013 ARCHITECTURE This module introduces the architectural features that underpin

More information

nexidia analytics Nexidia Analytics customer engagement analytics portfolio

nexidia analytics Nexidia Analytics customer engagement analytics portfolio Nexidia Analytics customer engagement analytics portfolio Companies today face several critical business challenges the need to increase revenue and market share, acquire new customers and retain existing

More information

nexi d i a a n a lyti c s Nexidia Analytics customer engagement analytics portfolio

nexi d i a a n a lyti c s Nexidia Analytics customer engagement analytics portfolio nexi d i a a n a lyti c s Nexidia Analytics customer engagement analytics portfolio Companies today face several critical business challenges the need to increase revenue and market share, acquire new

More information

Ensuring a Sustainable Architecture for Data Analytics

Ensuring a Sustainable Architecture for Data Analytics October 2015 Ensuring a Sustainable Architecture for Data Analytics Claudia Imhoff, Ph.D. 1 Table of Contents Introduction... 2 The Extended Data Warehouse Architecture... 3 Integration of Three Analytic

More information

The Basics of ITIL Help Desk for SMB s

The Basics of ITIL Help Desk for SMB s The Basics of ITIL Help Desk for SMB s This three-step process will provide you the information necessary to understand ITIL, help you write your strategic IT plan and develop the implementation plan for

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of

More information

Customer-Centric Default Management

Customer-Centric Default Management Experience the commitment It s time to move forward with Customer-Centric Default Management CGI study reveals companies are moving toward customer-centric default management to improve the customer experience

More information

Collaboration with Business Associates on Compliance

Collaboration with Business Associates on Compliance Collaboration with Business Associates on Compliance HCCA Compliance Institute April 19, 2016 Balancing risk management, compliance responsibility and business growth Responsibility of entities as they

More information

Verint Engagement Management Solution Brief. Overview of the Applications and Benefits of

Verint Engagement Management Solution Brief. Overview of the Applications and Benefits of Verint Engagement Management Solution Brief Overview of the Applications and Benefits of Verint Engagement Management November 2015 Table of Contents Introduction... 2 Verint Engagement Management Advantages...

More information

10/18/2018. London Governance, Risk, and Compliance

10/18/2018. London Governance, Risk, and Compliance 10/18/2018 Governance, Risk, and Compliance Contents Contents... 4 Applications and integrations supporting GRC workflow... 6 GRC terminology... 7 Domain separation in... 9 Policy and Compliance Management...11

More information

EBOOK. BUILD VS. BUY: Calculate the TCO of BDR

EBOOK. BUILD VS. BUY: Calculate the TCO of BDR EBOOK BUILD VS. BUY: Calculate the TCO of BDR Table of Contents Start with Up-Front Costs Factor in operating Expenses Additional Considerations Conclusion TCO Checklist Upfront Costs Ongoing Costs Value

More information

Transform records management

Transform records management Brochure Transform records management HP Records Manager for information governance and global compliance Information is the new currency of business Many organizations recognize that corporate information

More information

GDPR: Centralize Unstructured Data Governance Across On-premises and Cloud

GDPR: Centralize Unstructured Data Governance Across On-premises and Cloud GDPR: Centralize Unstructured Data Governance Across On-premises and Cloud YOU HAVE UNTIL MAY 2018 i TO CENTRALISE UNSTRUCTURED DATA GOVERNANCE ACROSS ON-PREMISES AND CLOUD The EU s General Data Protection

More information

zdata Solutions BI / Advanced Analytic Platform and Pilot Programs

zdata Solutions BI / Advanced Analytic Platform and Pilot Programs zdata Solutions BI / Advanced Analytic Platform and Pilot Programs BI & Analytics Platform Store Gather, integrate, load and manage your data in the cloud or on premise Collaborate Validate and dimensionalize

More information

Key Benefits. Overview. Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity.

Key Benefits. Overview. Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity. Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity. Microsoft delivers advanced scheduling, resource optimization and mobile enablement capabilities

More information

REPORT 2014/115 INTERNAL AUDIT DIVISION. Audit of information and communications technology management at the United Nations Office at Geneva

REPORT 2014/115 INTERNAL AUDIT DIVISION. Audit of information and communications technology management at the United Nations Office at Geneva INTERNAL AUDIT DIVISION REPORT 2014/115 Audit of information and communications technology management at the United Nations Office at Geneva Overall results relating to the effective and efficient management

More information

IBM TRIRIGA Version 10 Release 3.1. Strategic Facility Planning User Guide

IBM TRIRIGA Version 10 Release 3.1. Strategic Facility Planning User Guide IBM TRIRIGA Version 10 Release 3.1 Strategic Facility Planning User Guide Note Before using this information and the product it supports, read the information in Notices on page 67. This edition applies

More information

Overview: Nexidia Analytics. Using this powerful toolset, you will be able to answer questions such as:

Overview: Nexidia Analytics. Using this powerful toolset, you will be able to answer questions such as: Overview: Nexidia Analytics Companies today face several critical business challenges the need to increase revenue and market share, acquire new customers and retain existing ones, drive operational efficiencies,

More information

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements SAP Database and Data Management Portfolio/SAP GRC Solutions Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

More information

Reduce Production Incidents with Oracle Enterprise Manager 12c and give yourself a break! Roland Evers

Reduce Production Incidents with Oracle Enterprise Manager 12c and give yourself a break! Roland Evers Reduce Production Incidents with Oracle Enterprise Manager 12c and give yourself a break! Roland Evers About us Roland Evers 34 years old Living in The Netherlands 9 years at Accenture > 5 years Oracle

More information

George Lawrie Vice President & Principal Analyst at Forrester Research Ltd

George Lawrie Vice President & Principal Analyst at Forrester Research Ltd George Lawrie Vice President & Principal Analyst at Forrester Research Ltd Opening Keynote Session: Forrester Research Ltd ERP as a driver for digital transformation" ERP AS A DRIVER FOR DIGITAL TRANSFORMATION

More information

Business Analyst and Product Owner Where do they meet & conflict? Cherifa Mansoura

Business Analyst and Product Owner Where do they meet & conflict? Cherifa Mansoura Business Analyst and Product Owner Where do they meet & conflict? Cherifa Mansoura www.linkedin.com/in/linkedincherifamansoura Introduction BA responsibilities in an agile environment PO Responsibilities

More information

Knowledge Management within ITSM

Knowledge Management within ITSM The first in a series of white papers from CIH Solutions that discuss topical issues in IT Service Management Abstract This white paper discusses how Knowledge Management (KM) can be used to manage risk

More information