ET = IT + Enterprise Social Software [ET is NOT Extra Terrestrial. It is Enterprise Technology]

Size: px
Start display at page:

Download "ET = IT + Enterprise Social Software [ET is NOT Extra Terrestrial. It is Enterprise Technology]"

Transcription

1 07 May 2013: Discussion Note ET = IT + Enterprise Social Software [ET is NOT Extra Terrestrial. It is Enterprise Technology] Author Dr. T V Gopal Professor & Chairman, Division II [Software] Department of Computer Science and Engineering Anna University Chennai , India Home Page: A distinct and validated paradigm shift is taking place in the way technology and business leaders interact. This paradigm is transforming Information Technology (IT) to Enterprise Technology (ET). Prior to 2010, the transformation that took place focused heavily on moving from MIS to IT from enabling back-office workers with mainframes in MIS to knowledge workers with distributed systems in IT. Since 2012, the movement to ET has focused on enabling all workers and machines using embedded systems, mobile devices, and wireless technologies. Figure 1: The ET Transformation ET makes technology relevant to everyone and everything in a company. ET requires a transformation in how the internal staff thinks, reacts, and creates, along with a stronger reliance on technology partners.

2 Table 1: Some Characteristics of ET There is reason to believe that nearly 80% of the IT Leaders are deploying non traditional initiatives in their business. This trend is likely to happen in the near future with increased emphasis on non traditional initiatives. Figure 2: Some Prominent Non Traditional IT Initiatives

3 ET leaders must identify staff members who will manage the relationship with the vendor partner. Figure 3: Spectrum of Vendor Relationships Enterprise social software (also known as or regarded as a major component of Enterprise 2.0), comprises social software as used in "enterprise" (business/commercial) contexts. It includes social and networked modifications to corporate intranets and other classic software platforms used by large companies to organize their communication. Carl Frappaolo and Dan Keldsen defined Enterprise 2.0 in a report written for Association for Information and Image Management (AIIM) as "a system of web-based technologies that provide rapid and agile collaboration, information sharing, emergence and integration capabilities in the extended enterprise". Figure 4: Categories of Social Software

4 Figure 5: The Structure of Enterprise Social Software Figure 6: Social Tools for Web 2.0

5 Instant messaging An instant messaging application or client allows one to communicate with another person over a network in real time, in relative privacy. Text chat Internet Relay Chat (IRC) and other online chat technologies allow users to join and communicate with many people at once, publicly. Users may join a pre-existing chat room or create a new one about any topic. Collaborative software The goal of collaborative software, also known as groupware, such as Moodle, Landing pages, Enterprise Architecture, and Sharepoint, is to allow subjects to share data such as files, photos, text, etc. for the purpose of project work or school work. Internet forums Originally modeled after the real-world paradigm of electronic bulletin boards of the world before internet was born, internet forums allow users to post a "topic" for others to review. Other users can view the topic and post their own comments in a linear fashion, one after the other. Wikis A wiki is a web page whose content can be edited by its visitors. Blogs Blogs, short for web logs, are like online journals for a particular person. The owner will post a message periodically, allowing others to comment. Topics often include the owner's daily life, views on politics or a particular subject important to them. Blogs mean many things to different people, ranging from "online journal" to "easily updated personal website." Collaborative real-time editors Simultaneous editing of a text or media file by different participants on a network is called Collaborative real-time editing.

6 Social network services allow people to come together online around shared interests, hobbies or causes. Social network search engines are a class of search engines that use social networks to organize, prioritize or filter search results. Social guides A social guide recommending places to visit or contains information about places in the real world such as coffee shops, restaurants and wifi hotspots and so on. Social viewing Social viewing allows multiple users to aggregate from multiple sources and view online videos together in a synchronized viewing experience. Social cataloging In social cataloging much like social bookmarking, this software is aimed towards academics. Enterprise bookmarking is a method of tagging and linking any information using an expanded set of tags to capture knowledge about data. It collects and indexes these tags in a webinfrastructure server residing behind the firewall. Users can share knowledge tags with specified people or groups, shared only inside specific networks, typically within an organization. Social libraries This applications allows visitors to keep track of their collectibles, books, records and DVDs. Users can share their collections. Recommendations can be generated based on user ratings, using statistical computation and network theory. Social online storage Social online storage applications allow their users to collaboratively create file archives containing files of any type. Files can either be edited online or from a local computer which has access to the storage system. Virtual worlds Virtual Worlds are services where it is possible to meet and interact with other people in a virtual environment reminiscent of the real world. Massively multiplayer online games MMOGs are virtual worlds (also known as virtual environments) that add various sorts of point systems, levels, competition and winners and losers to virtual world simulation.

7 Social software may be better understood as a set of debates or design choices, rather than any particular list of tools. Broadly conceived, there are many older media such as mailing lists and Usenet fora that qualify as "social". However, most users of this term restrict its meaning to more recent software genres such as blogs and wikis. Others suggest that the term social software is best used not to refer to a single type of software, but rather to the use of two or more modes of computer-mediated communication that result in "community formation. Most definers of social software agree that they seem to facilitate "bottom-up" community development. The system is classless and promotes those with abilities. Membership is voluntary, reputations are earned by winning the trust of other members and the community s missions and governance are defined by the members themselves. Communities formed by "bottom-up" processes are often contrasted to the less vibrant collectivities formed by "top-down" software, in which users' roles are determined by an external authority and circumscribed by rigidly conceived software mechanisms (such as access rights). Given small differences in policies, the same type of software can produce radically different social outcomes. Methods and tools for the development of social software are sometimes summarized under the term Social Software Engineering. However, this term is also used to describe lightweight and community-oriented development practices. In philosophy and the social sciences, social software is an interdisciplinary research program that borrows mathematical tools and techniques from game theory and computer science in order to analyze and design social procedures. The goals of research in this field are modeling social situations, developing theories of correctness, and designing social procedures. Current research in the area of social software includes the analysis of social procedures and examination of them for fairness, appropriateness, correctness and efficiency. The growth in social networking is huge and is now matched by the adoption of enterprise social software (ESS). Organizations are deploying ESS for their employees, partners, and customers to accelerate business process through improved collaboration and expertise discovery.

8 The risks that ESS tools pose are very similar to those of other electronic communications like non-compliance with government and industry regulations and substantial litigation and ediscovery costs. Virtually all company data is subject to discovery should legal action be taken, including communications traffic over blogs, wikis, discussion forums, bookmarks, social media, and unified communications. At the end of the day, these are all simply forms of electronic communications. The process of archiving, storing, and making these conversations and posts easily retrievable for not just regulatory compliance, but also for legal holds and ediscovery purposes, is made complex by the multi-dimensional nature of these conversations. In January 2010, the Financial Industry Regulatory Authority (FINRA) issued the Regulatory Notice on electronic communications specifically related to social media websites. Nine steps to ESS happiness as stipulated by FINRA are given below. 1. Gain visibility into all communications tools 2. Develop policies taking into account FINRA guidelines 3. Implement monitoring technology 4. Ensure granular access or access controls and restrictions 5. Apply policy management and control 6. Enable content filtering 7. Send alerts 8. Capture edits and deletes 9. Archive A sampling of regulations and statutes outside of FINRA guidelines that relate to the governance of ESS content are listed here: Table 2: Regulations outside Financial Industry Regulatory Authority (FINRA)

9 References: 1. Robin Gareiss, Shift to Enterprise Technology Relies Upon Vendor Partners for Managed, Cloud Services, Issue Paper, Nemertes Research Actiance White Paper, 9 Keys to FINRA Blessing Enterprise Social Software Use

Enterprise 2.0 and SharePoint 2010

Enterprise 2.0 and SharePoint 2010 Enterprise 2.0 and SharePoint 2010 Doculabs has many clients that are investigating their options for deploying Enterprise 2.0 or social computing capabilities for their organizations. From a technology

More information

Purpose. Introduction to the Guidelines. Social Media Definition. http://www.ohioerc.org

Purpose. Introduction to the Guidelines. Social Media Definition. http://www.ohioerc.org http://www.ohioerc.org Purpose SOCIAL MEDIA: THE RECORDS MANAGEMENT CHALLENGE As society shifts from traditional methods of recordkeeping to electronic recordkeeping, the issues surrounding the management

More information

How Cisco IT Evolved Enterprise Social Software and Collaboration

How Cisco IT Evolved Enterprise Social Software and Collaboration December 2011 How Cisco IT Evolved Enterprise Social Software and Collaboration Cisco gains more business value by migrating Web 2.0 tools to Cisco WebEx Social Cisco IT Case Study/Collaboration/Enterprise

More information

IT Academy Lesson Plan

IT Academy Lesson Plan 10 IT Academy Lesson Plan Microsoft Sharepoint Turn potential into success Microsoft Office SharePoint 2010: Lesson Plans Introduction Preparing to teach courses on Microsoft SharePoint 2010 for the first

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Enterprise & Personal Knowledge Management: Local Case Studies & the roles of the information professionals

Enterprise & Personal Knowledge Management: Local Case Studies & the roles of the information professionals An appropriate balance of people, process & technology is the key to success in KM Enterprise & Personal Knowledge Management: Local Case Studies & the roles of the information professionals Department

More information

Collaboration. Michael McCabe Information Architect mmccabe@gig-werks.com. black and white solutions for a grey world

Collaboration. Michael McCabe Information Architect mmccabe@gig-werks.com. black and white solutions for a grey world Collaboration Michael McCabe Information Architect mmccabe@gig-werks.com black and white solutions for a grey world Slide Deck & Webcast Recording links Questions and Answers We will answer questions at

More information

Information Governance, Risk, Compliance

Information Governance, Risk, Compliance Information Governance, Risk, Compliance April White Paper By Galaxy Consulting A At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract May 2014 Information is the lifeblood

More information

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

Case study: IBM s Journey to Becoming a Social Business

Case study: IBM s Journey to Becoming a Social Business Case study: IBM s Journey to Becoming a Social Business Rowan Hetherington, IBM, September 2012 Introduction The corporate world is in the midst of an important transformation: it is witnessing a significant

More information

Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach

Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach Patricia C. Franks, PhD, IGP, CA, CRM International Symposium October 17, 2014 to mitigate risk Not all information

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email.

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email. Meet compliance needs with Microsoft Exchange As the volume and importance of digital information grows, regulatory compliance schemas are broadening to encompass an ever-larger share of data that companies

More information

1 The Environment. Communication. Education. Entertainment and News. Business. Web Design, 4 th Edition 1/11/2014. Chapter Objectives.

1 The Environment. Communication. Education. Entertainment and News. Business. Web Design, 4 th Edition 1/11/2014. Chapter Objectives. 1 The Environment and the Tools Web Design, 4 th Edition Chapter Objectives Describe the Internet and the World Wide Web Discuss ways to access the Internet and the Web Categorize types of Web sites Identify

More information

GLOBALIZATION, COLLABORATION, AND SOCIAL NETWORKING: AN EXPLORATORY STUDY

GLOBALIZATION, COLLABORATION, AND SOCIAL NETWORKING: AN EXPLORATORY STUDY GLOBALIZATION, COLLABORATION, AND SOCIAL NETWORKING: AN EXPLORATORY STUDY Robert L. Totterdale, Robert Morris University, rtotterdale@tbconsulting.biz ABSTRACT Individuals utilize a variety of tools to

More information

Hybrid for SharePoint Server Yammer Reference Architecture

Hybrid for SharePoint Server Yammer Reference Architecture Hybrid for SharePoint Server 2013 Yammer Reference Architecture Contents About this white paper... 3 Who this white paper is for... 3 Overview... 4 SharePoint Newsfeed... 5 SharePoint Community Sites...

More information

InterAction: A Different Perspective Using Your Firm s Portal

InterAction: A Different Perspective Using Your Firm s Portal : A Different Perspective Using Your Firm s Portal Presented by: Ayelette Robinson, Practice Resources Attorney Morrison & Foerster LLP Tim Jones, Web Developer Bracewell & Giuliani LLP Matt Dixon, Webmaster

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :owliams@gmail.com, Website :

More information

April 7, 2010 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES, AND INDEPENDENT REGULATORY AGENCIES

April 7, 2010 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES, AND INDEPENDENT REGULATORY AGENCIES EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 ADMINISTRATOR OFFICE OF INFORMATION AND REGULATORY AFFAIRS April 7, 2010 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS

More information

Hosted Archiving & Compliance Solutions. Today, Tomorrow & Beyond.

Hosted Archiving & Compliance Solutions. Today, Tomorrow & Beyond. Hosted Archiving & Compliance Solutions Today, Tomorrow & Beyond. ARCHIVING AND COMPLIANCE SOLUTIONS ENTERPRISE READY Robust search and supervision features. Lower overall total cost of ownership. Fast

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Benefits of upgrading to Enterprise Vault 11

Benefits of upgrading to Enterprise Vault 11 Benefits of upgrading to Vault 11 This document describes the new s and benefits that are available to existing customers who upgrade to Vault 11. Upgrading to the latest version can provide benefits in

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

Social in the Enterprise

Social in the Enterprise Social in the Enterprise TEPEE AGENDA - Social in the Enterprise Definition Value Proposition Implementation Change Management Governance TEPEE 2 Definition Social Media Defined the use of web-based and

More information

Appendix A Current Scope of Government Public Cloud Services and Government Public Cloud Related Services

Appendix A Current Scope of Government Public Cloud Services and Government Public Cloud Related Services 1. Scope Appendix A The current scope of the Government Public Cloud Services covers four (4) service categories, namely Productivity Applications (Productivity Apps), Business Applications (Business Apps),

More information

NEXT GENERATION ARCHIVE MIGRATION TOOLS

NEXT GENERATION ARCHIVE MIGRATION TOOLS NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform

More information

FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS

FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE INTRODUCTION Any organization using Salesforce for customer relationship management

More information

BROCHURE. Swash Digital Marketing Services. Brochure- Digital Marketing Services. Swash Convergence Technologies Limited

BROCHURE. Swash Digital Marketing Services. Brochure- Digital Marketing Services. Swash Convergence Technologies Limited BROCHURE Swash Digital Marketing Services Swash Convergence Technologies Limited 1 DIGITAL MARKETING SERVICES We make your business visible The advertising pattern has been totally changed in the last

More information

How Cisco IT Uses SAN to Automate the Legal Discovery Process

How Cisco IT Uses SAN to Automate the Legal Discovery Process How Cisco IT Uses SAN to Automate the Legal Discovery Process Cisco dramatically reduces the cost of legal discovery through better data management. Cisco IT Case Study / Storage Networking / : This case

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

SharePoint 2013 Level 1 Computer Training Solutions Student Guide Version Revision Date Course Length

SharePoint 2013 Level 1 Computer Training Solutions Student Guide Version Revision Date Course Length SharePoint 2013 Level 1 Computer Training Solutions Version 1.1 Revision Date Course Length 2013-Nov-07 3 hours SharePoint 2013 Level 1 Table of Contents Quick Reference... 4 Introduction to SharePoint...

More information

How Cloud Services Benefit from Cloud-Based Delivery. With a Look at Solutions from Akamai

How Cloud Services Benefit from Cloud-Based Delivery. With a Look at Solutions from Akamai How Cloud Services Benefit from Cloud-Based Delivery With a Look at Solutions from Akamai Perspective 2012 Neovise, LLC. All Rights Reserved. Report Published April 22, 2014 The Growing Role of the Internet

More information

WHITE PAPER. FINRA Compliance Guide: Enterprise Social Networks

WHITE PAPER. FINRA Compliance Guide: Enterprise Social Networks WHITE PAPER FINRA Compliance Guide: Enterprise Social Networks WHITE PAPER FINRA Compliance Guide: Enterprise Social Networks 2 Table of Contents Executive Summary...3 Social Networking Does Not Occur

More information

Proofpoint Enterprise Archive for SEC and FINRA Compliance

Proofpoint Enterprise Archive for SEC and FINRA Compliance Proofpoint Enterprise Archive for SEC and FINRA Compliance The Leading Cloud Solution Designed for Broker-Dealers and Investment Advisors Proofpoint provides the most powerful, cost-effective solution

More information

Microsoft Live@edu. The next generation platform for student collaboration and communication

Microsoft Live@edu. The next generation platform for student collaboration and communication Microsoft Live@edu The next generation platform for student collaboration and communication Introducing Microsoft Live@edu. It s free, familiar, reliable Windows Live Hotmail with your organization s name

More information

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING

More information

Contents of This Paper

Contents of This Paper Contents of This Paper Overview Key Functional Areas of SharePoint Where Varonis Helps And How A Project Plan for SharePoint with Varonis Overview The purpose of this document is to explain the complementary

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and

More information

Why your own server space? Why should you set it up?

Why your own server space? Why should you set it up? Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art

More information

5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE

5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE 5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE Decommission Applications, Manage Data Growth & Ensure Compliance with Enterprise IT Infrastructure 1 5 Ways Structured Archiving Delivers Enterprise

More information

Time Management Automation, Integrated with Invoices and Payroll

Time Management Automation, Integrated with Invoices and Payroll Time Management Automation, Integrated with Invoices and Payroll If your business is not using the latest in integrated time management software utilizing mobile technology, chances are, Your overhead

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

Better protection for customers, and recurring revenue for you!

Better protection for customers, and recurring revenue for you! AVG AntiVirus Better protection for customers, and recurring revenue for you! Offer your customers the latest protection without draining your resources. A single, central management platform alerts when

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

An Introduction to E-Discovery. Gary Robinson, Director Washington State Department of Information Services September 30, 2008

An Introduction to E-Discovery. Gary Robinson, Director Washington State Department of Information Services September 30, 2008 An Introduction to E-Discovery Gary Robinson, Director Washington State Department of Information Services September 30, 2008 Data Governance/Organization of E-Records Stakeholders Legal Records Officials,

More information

9. Technology in KM. ETL525 Knowledge Management Tutorial Four. 16 January 2009. K.T. Lam lblkt@ust.hk

9. Technology in KM. ETL525 Knowledge Management Tutorial Four. 16 January 2009. K.T. Lam lblkt@ust.hk 9. Technology in KM ETL525 Knowledge Management Tutorial Four 16 January 2009 K.T. Lam lblkt@ust.hk Last updated: 15 January 2009 Technology is KM Enabler Technology is one of the Four Pillars of KM, which

More information

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services A guide to HP enterprise mobility solutions Expanding the potential of your business with advanced mobility services Going mobile, staying ahead These days, hardworking enterprise IT and technology managers

More information

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Capstone Compliance Using Symantec Archiving and ediscovery Solutions WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,

More information

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group Todd Heythaler Information Governance & ediscovery Trends & Landscapes State & Local Government Challenges Approach to ediscovery & FOIL requests Getting Started Trends & Landscape Requests for Information

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Instant Messaging. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz

Instant Messaging. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz Instant Messaging 1 Outline Goals and Objectives Topics Headlines Introduction Text-only Web Chatting Instant Messaging AIM Yahoo Messenger MSN Messenger Opera Instant Messaging Web Casting Wireless Instant

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex

More information

INFO1400. 1. What are business processes? How are they related to information systems?

INFO1400. 1. What are business processes? How are they related to information systems? Chapter 2 INFO1400 Review Questions 1. What are business processes? How are they related to information systems? Define business processes and describe the role they play in organizations. A business process

More information

Information Lifecycle Governance. Surabhi Kapoor & Jan Lambrechts

Information Lifecycle Governance. Surabhi Kapoor & Jan Lambrechts Information Lifecycle Governance Surabhi Kapoor & Jan Lambrechts Information Lifecycle Governance Executive Overview 1 Introduction to Information Lifecycle Governance 2 It s no longer about one thing

More information

CRM as a Service. For Customers in the Cloud

CRM as a Service. For Customers in the Cloud CRM as a Service For Customers in the Cloud Customer Relationship Management Our mission: to help our customer identify, define, design and deliver the best CRM strategy, in terms of For our Customer with

More information

Virtual Team Collaboration Glossary

Virtual Team Collaboration Glossary Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

Achieve more with less

Achieve more with less Energy reduction Enterprise Fax Servers Solutions Integrations: SharePoint case Whitepaper Achieve more with less SharePoint 2010 Benefits and Migration Costs Why Fax Server Integration Receive faxes to

More information

Actiance Alcatraz: Archivable compliance and ediscovery for Social Media

Actiance Alcatraz: Archivable compliance and ediscovery for Social Media Actiance Alcatraz: Archivable compliance and ediscovery for Social Media By Earl Follis, Senior Analyst and Validation Engineer SSG-NOW May 2015 C omplying with federal corporate financial regulations

More information

In this age of heightened awareness of information security issues...

In this age of heightened awareness of information security issues... Secure Messaging Business Buyer Information In this age of heightened awareness of information security issues... Businesses of every size, in every industry - both regulated and non regulated - are recognizing

More information

S O L U T I O N P R O F I L E. StoredIQ s Flagship ediscovery for SharePoint

S O L U T I O N P R O F I L E. StoredIQ s Flagship ediscovery for SharePoint StoredIQ s Flagship ediscovery for SharePoint February 2011 Many ediscovery companies announced integration with Microsoft SharePoint last year. Frankly, our usual response was a resounding yawn. These

More information

National Examination Risk Alert

National Examination Risk Alert National Examination Risk Alert By the Office of Compliance Inspections and Examinations 1 In this Alert: Topic: Observations related to the use of social media by registered investment advisers. Key Takeaways:

More information

Enterprise Video Hosting: Introducing the Intel Video Portal

Enterprise Video Hosting: Introducing the Intel Video Portal Enterprise Video Hosting: Introducing the Intel Video Portal August 2013 Sara Browning, Social Collaboration Service Owner, Intel IT Chandan Sardeshmukh, Product Manager, Intel IT Legal Notices This presentation

More information

Improving Legal KM Through a Social Intranet. Heather Colman April 4, 2011

Improving Legal KM Through a Social Intranet. Heather Colman April 4, 2011 Improving Legal KM Through a Social Intranet Heather Colman April 4, 2011 Evolution to a Social Intranet Wikis 2007 Wiki Style Intranet 2008 Blogs, Discuss Capture 2009 Social Intranet 2010 Pre-wiki state

More information

2007 to 2010 SharePoint Migration - Take Time to Reorganize

2007 to 2010 SharePoint Migration - Take Time to Reorganize 2007 to 2010 SharePoint Migration - Take Time to Reorganize by Mark Klinchin CTO, MetaVis Technologies May 2010 Phone: (610)-717-0413 Email: info@metavistech.com Website: www.metavistech.com Introduction

More information

Novell Collaboration Vibe OnPrem

Novell Collaboration Vibe OnPrem Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager trsmith@novell.com Collaboration Solutions Collaboration solutions from Novell help enterprise

More information

... ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION THE RADICATI GROUP, INC. A whitepaper by The Radicati Group, Inc.

... ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION THE RADICATI GROUP, INC. A whitepaper by The Radicati Group, Inc. . THE RADICATI GROUP, INC. The Radicati Group, Inc. 595 Lytton Avenue Palo Alto, CA 94301 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION

More information

WHITE PAPER. Deficiencies in Traditional Information Management

WHITE PAPER. Deficiencies in Traditional Information Management WHITE PAPER Deficiencies in Traditional Information Management Table of Contents 3 Abstract 3 Information Management Defined 7 Problems with Traditional Approaches 8 Conclusion Table of Figures 5 Figure

More information

SharePoint Governance: Planning, Strategy and Adoption

SharePoint Governance: Planning, Strategy and Adoption Thinking SharePoint? Think Jornata. SharePoint Governance: Planning, Strategy and Adoption Scott Jamison Managing Partner & CEO Jornata LLC scott.jamison@jornata.com About Scott Jamison CEO of Jornata,

More information

FireScope + ServiceNow: CMDB Integration Use Cases

FireScope + ServiceNow: CMDB Integration Use Cases FireScope + ServiceNow: CMDB Integration Use Cases While virtualization, cloud technologies and automation have slashed the time it takes to plan and implement new IT services, enterprises are still struggling

More information

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Access: It is the ability to see what you are trying to view (e.g. you can see a friend

More information

Network Management In. Challenges and Opportunities for Enterprises

Network Management In. Challenges and Opportunities for Enterprises Network Management In Distributed Environments Challenges and Opportunities for Enterprises I. Introduction As networks have grown in size and capabilities, they also have grown in terms of their importance

More information

Questionnaire on Electronically Stored Information (March 17, 2011)

Questionnaire on Electronically Stored Information (March 17, 2011) Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.

More information

Secure Wireless LAN. Michigan Department of Information Technology

Secure Wireless LAN. Michigan Department of Information Technology Secure Wireless LAN Michigan Department of Information Technology Contact Info: Jack Harris Director of Telecommunications Michigan Department of Information Technology 608 West Allegan 1st floor - MDIT

More information

Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices

Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices - Secure Email, Calendar, Contacts, Tasks, File sharing and Notes across devices Parla Spamina Parla is a cloud-based Email platform with up to 30Gb of mailbox space providing enterprise-class email, calendar,

More information

Use Your Contact Center to Build a Better Customer Experience

Use Your Contact Center to Build a Better Customer Experience SAP Brief SAP Customer Relationship Management SAP Contact Center Objectives Use Your Contact Center to Build a Better Customer Experience Engage your customers across all points of contact Engage your

More information

SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp

SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp SMART ARCHIVING The need for a strategy around archiving Peter Van Camp I.R.I.S. mission I.R.I.S. mission : Increase our customers productivity and knowledge through helping them better manage their documents,

More information

1 Executive Summary... 3. 2 Document Structure... 4. 3 Business Context... 5

1 Executive Summary... 3. 2 Document Structure... 4. 3 Business Context... 5 Contents 1 Executive Summary... 3 2 Document Structure... 4 3 Business Context... 5 4 Strategic Response... 6 4.1 Exploiting SharePoint... 6 4.2 Improving Business Effectiveness... 7 4.3 Improving Governance...

More information

Request for Information No. 15-200-ACCO. Litigation Hold & ediscovery Tool

Request for Information No. 15-200-ACCO. Litigation Hold & ediscovery Tool Request for Information No. 15-200-ACCO Litigation Hold & ediscovery Tool Posting Date: November 14, 2014 Event Timeline: This Request for Information (RFI) is issued by Washington State Department of

More information

Solutions to Trust. NEXThink V5 What is New?

Solutions to Trust. NEXThink V5 What is New? Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product

More information

Server Based Desktop Virtualization with Mobile Thin Clients

Server Based Desktop Virtualization with Mobile Thin Clients Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: sangita123sp@rediffmail.com Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: amod.narvekar@rediffmail.com

More information

Start Now with Information Governance

Start Now with Information Governance Start Now with Information Governance Applying Information Governance to Unstructured Content 1 Information by 2020: The Big Picture There will be lots of it 35 ZB Generated by individuals >70% Digital

More information

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Big Data Driven Knowledge Discovery for Autonomic Future Internet Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

Cisco and IBM: Enhancing the Way People Work Through Unified Communications

Cisco and IBM: Enhancing the Way People Work Through Unified Communications Cisco and IBM: Enhancing the Way People Work Through Unified Communications WHITEPAPER August 2007 Cisco and IBM Strategic Alliance: Whitepaper Table of Contents Executive Summary... 1 A Winning Approach...

More information

email management solutions

email management solutions Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations

More information

Check Point 3D Security

Check Point 3D Security Check Point 3D Security Combining Policies, People and Enforcement for Unbeatable Protection John Vecchi Head of WW Product Marketing 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

More information

Email Archiving Market, 2011-2015 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki

Email Archiving Market, 2011-2015 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. PALO ALTO, CA 94303 TEL. 650 322-8059 FAX 650 322-8061 Email Archiving Market, 2011-2015 Editor: Sara Radicati,

More information

Why Data Management Matters Right Now

Why Data Management Matters Right Now Why Data Management Matters Right Now Why Data Management Matters Right Now Chapter 1: The Exponential Growth of Data Chapter 2: Data Retention Policies and Compliance Chapter 3: Accessing your Data Chapter

More information

07 Web 2.0 (part 2) Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication.

07 Web 2.0 (part 2) Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication Davide Eynard nternet Technology 07 Web 2.0 (part 2) 2 Social Systems Results of an attempt to classify existing social

More information

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Managing the Cloud as an Incremental Step Forward

Managing the Cloud as an Incremental Step Forward WP Managing the Cloud as an Incremental Step Forward How brings cloud services into your IT infrastructure in a natural, manageable way white paper INFO@SERVICE-NOW.COM Table of Contents Accepting the

More information

Meaning Based Computing: Managing the Avalanche of Unstructured Data

Meaning Based Computing: Managing the Avalanche of Unstructured Data Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information

More information

Miguel Ortiz, Sr. Systems Engineer. Globanet

Miguel Ortiz, Sr. Systems Engineer. Globanet Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely

More information