#InfoGov Links of The Day 01-12-2017

3 Lessons from Japanese Trains – Information Management and the Internet of Things

LESSON 1 — THE ORGANIZATION OF INFORMATION MATTERS. The only way for an organization to sort through the vast volumes of information confronting it is to realize that the organization of information matters. Metadata matters. Elegance of presentation and design matter. The design point for the interfaces we use to navigate and find and utilize information in our organization can’t be the expert or the person who has been there 10 years, but rather modelled around the visitor trying to get from Kannai to Asakusa. And most importantly, the people who have the skills to help with this problem are probably already in our organizations and are called Information Professionals. We just need practioners to think bigger and the c-level folks to realize what and who they aready have….

LESSON 2 – DATA MATTERS. I think this radical alignment between the virtual world of information and the physical world tells us something ultimately about the connection between Content Management, Information Management, and the Internet of Things. The days when we could cavalierly draw a line between content and data are gone. It’s all data. And we in the content world better learn a lot more about the data side of the house, because that’s where the action is right now in terms of investment….

LESSON 3 — CUSTOMER EXPERIENCES MATTER. The next set of automation challenges involve processes and customer journeys that are much less monolithic and linear and whose resolution requires content management capabilities PLUS analytics PLUS data management PLUS business intelligence PLUS PLUS PLUS. The future of content management as a set of consumable content services means that “ECM” isn’t the process “dog” anymore. It isn’t even the tail. It’s one of a number of tails.

Will There Ever Be a 100 Percent Paperless Student?

In  a recent survey by Harris Poll on behalf of Ricoh, two in three Americans said college students couldn’t function without using paper daily. On the other hand, the same survey found that 48 percent of respondents expect universities to go paperless within a few years.

How much is a data breach going to cost you?

A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015.

GDPR and Data Governance

It is imperative that the privacy needs of EU residents must be harnessed through GDPR by 25 May 2018. Moreover, GDPR necessitates coverage of private information that is processed by any organisation, across the globe. This means every organisation with global presence must embrace these privacy requirements. Regulatory landscape is fast evolving while also requiring firms with global operations to adopt the highest regulatory requirements from a region that can be leveraged as preparedness in other regions.

Privacy is not only a requirement from GDPR, but is also a major driver from an organisation’s perspective of risk. Most of the personal information collected for years now is vulnerable to threats and events of malicious theft, accidental disclosure, failure in appropriate design and usage. Today, protecting an organization’s reputation is the most significant risk management challenge. Negative publicity to a firm, will cause a decline in the customer base, reduce revenue and lead to costly litigation.

 

#InfoGov Links of the Day 01-11-2017

 

Predicting the Future of Documentum and EMC’s ECD

Future predictions includes three things:

  1. Documentum and AX will not go away
  2. Buying a single ECM solution from OpenText will be confusing
  3. Not All Future Technologies will become reality

The Challenge of Effectively Managing Legacy Tapes

To manage legacy or less frequently used tape solutions it can cost up $10,000 annually according to a Baseline Briefing survey.

Are You Ready for These Big Data Trends?

CMS Wire predicts that in 2017 major changes will come to the big data ecosystem because of Hadoop’s staying power and data prep becoming a feature in more products.

4 Ways Data First Companies Are Killing You

All companies have data, of course, but not all of them are using it with the same level of mastery. More organizations are using analytics, but for many of them it can be difficult to operationalize their data, particularly when “business as usual” is getting in the way.

2017 Ediscovery Case Law: Ready for a New Year?

In 2017, it is critical that litigators realize that the rules have changed, and adapt their discovery strategies accordingly…There will be a steady stream of cases in 2017 addressing reasonable steps to preserve, intent to deprive another party of relevant data and the inherent power of the court to administer sanctions when data is lost.

Vendor Risk Management Better But Still Needs Improvement, Says Study

Many organizations have improved their vendor risk management programs. But they still have a long way to go in optimizing these efforts, according to the annual Vendor Risk Management Benchmark Study released by the Shared Assessments Program, a collaborative consortium, and Protiviti, a global consulting firm.

The study found that organizations across all industries, and in particular financial services, are increasing their focus on managing vendor and third-party risks. The maturity levels associated with different vendor risk management program areas have improved noticeably, the report said, yet awareness levels and compliance measures aren’t where they need to be.

 

#InfoGov Links of the Day 1/10/2017

Using Glyphs to Deconstruct, Classify, & Attribute Files

Glyphs can be used to consistently deconstruct, classify, and attribute large volumes of files permitting effective management of them. Deconstruction breaks files into their smallest visual elements, classification uses data visualization at the page level, and attribution selects specified glyphs or their text values from within classifications.

(Webinar) 5 Hot Trends for Data and Analytics in 2017

  1. Building the new digital enterprise using automation
  2. Analytics in the digital culture revolution: democratizing BI for fact-based decision-making
  3. Report consolidation: saving costs, improving BI adoption, and moving from report to InfoApps
  4. The rise of customer-facing analytics: monetizing data and consumerizing analytics
  5. Data Management in the digital enterprise: master data management, data quality and governance

This accompanying article has more information on the trends

Why Big Data and Algorithms Won’t Improve Business Strategy

n the game of Chess above, yes you can use large scale data analytics, AI and algorithms to discover new patterns in the sequences of presses and certainly this will help you against equally blind competitors. Such techniques will also help you in business improve your supply chain or understand user behaviour or marketing or loyalty programmes or operational performance or any number of areas in which we have some understanding of the environment.

But this won’t help you in strategy against the player with better situational awareness. Most business strategy itself operates in a near vacuum of situational awareness. For the vast majority then I’ve yet to see any real evidence to suggest that big data is going to improve this. There are a few and rare exceptions but in general, the key is first to understand the landscape and that a landscape exists.

From Big Data To Unique Customer Insights: New Use Case

Big Data and advanced analytics can give us insight into almost anything, but one of the top use cases today focuses on better understanding customers in order to identify new opportunities as well as potential problems.

What’s the Case for Data Governance

It’s best if the business intelligence (BI) and analytics solutions you deploy ensure that people get the information they need without opening up the information valve so wide that anything and everything can happen.

Congress to step up its own Cybersecurity Protections

In the wake of charges that Russian hackers tried to destabilize the U.S. election, Congress will step up efforts to protect itself from cybersecurity attacks, including better training for lawmakers and staffers, said the head of the committee that oversees operations in the House.

Senate Dems ObamaCare repeal protest hits 4-hour mark

As a testament to the power of social media, democrats us Snapchat and Facebook Live to rally voters outside of the beltway to support Obamacare.

#InfoGov Links of the Day – 01/09/2017

Promoting Cloud in a Risk Averse Organization

Until a year or so ago, every single IT system in FAO (Food and Agricultural Organization) was run in-house and everyone seemed content to leave it that way. The IT Division was the first to see the obvious benefits that cloud-based services could bring, especially for a highly decentralized organization (present in more than 100 countries) where building and maintaining a Wide Area Network and localized services such as email was expensive. The cost angle alone was reason enough to explore cloud options.

To move forward we had to analyze everything from efficiency promises to technical capabilities, costs and internal controls to confirm that the gains outweighed the potential risks, and taking into account our special status.

While FAO does not have the financial risks that commercial organizations need to consider, the reputational risk of exposing potentially sensitive or confidential data relating to our member countries is a major concern. In addition, we were aware that FAO’s reputation as an impartial intergovernmental forum for addressing issues of global concern must be upheld.

We were also very conscious of our duty – like that of any other organization – to protect the personal data provided to us by our personnel and others…

Ransomware Expected to Dominate in 2017

Ransomware or malware that locks up data and demands payment for its release is set to evolve and make up the majority of cyber attacks in 2017, according to most predictions by security commentators.

Cyber attacks that exploit weaknesses in mobile devices and devices that make up the internet of things (IoT), including distributed denial of service (DDoS) attacks, are also expected to continue from 2016.

However, in 2017, experts predict an increase in professional, advanced attacks – including attacks on cloud infrastructure – and the rise of data manipulation attacks, further underlining the need for a fresh approach to data security.

Perhaps the most disturbing prediction is that as defenders look to artificial intelligence (AI) to bolster security, this will be mirrored in the cyber criminal world by AI-driven attacks.

Overall, the pace and variation of exploits driven by technically astute adversaries will only gain momentum if not managed effectively, said Mike East, vice-president of sales in Europe at CrowdStrike.

What will not change, he said, is that all businesses will be vulnerable as attack targets, whether they are a Fortune 500 company, a family-run business or a utility company.

Digital Is Making Government Redundant

Digital is increasingly exposing government incompetence and how remote from the real life of people so many in government are (particularly at a senior level)

Will Your Data Help or Hurt Your Business

Data is your most valuable asset, but depending on how you treat it, its potential can either be fully realized or it can become toxic.

Five Features Your Content Management System Must Have

  1. Flexible Content Repositories
  2. Open API’s
  3. Content Personalization
  4. Permission Control
  5. Multilingual Support

#InfoGov Links of The Day For 1/06/2017

7 Top CRM Trends for 2017: A Look Ahead

  1. More AI Based Bots
  2. Contextual CRM will take center stage
  3. Omnichannel CRM will take over
  4. Social CRM Will Thrive
  5. Predictive Analytics Will Come Into Its Own
  6. Verticalized CRM will set in
  7. The Suite/Best of Breed Seesaw will keep swinging

Big Data Gets Bigger: 5 Ways to Employ Legal Analytics

  1. Early Case Assessment
  2. Internet of Things Challenges
  3. Business Intelligence
  4. Cyber Security
  5. Compliance

The Death of ECM and the Birth of Content Services

ECM is now dead (kaput, finite, an ex-market name), at least in how Gartner defines the market. It’s been replaced by the term Content Services, a strategic concept that covers three aspects, namely Content Services Applications, Platforms and Components.

What Does Your Information Security Data Map Reveal?

The volume of an organization’s intellectual property, technical knowledge, competitive intelligence information (knowledge assets), and the information systems that store these critical knowledge assets is growing substantially year over year.

As a result, the nature, location, and stewardship of critical information is not well-known, and this introduces risks to the organization in terms of the information’s security and the ability of the enterprise to protect its records and data while making it available to those who need it. Tackling these risks head on reinforces a company’s commitment to developing a strong information governance framework that will secure its knowledge assets and systems.

Analytics: Like a Mosquito in a Nudist Colony

We are now in the Internet of Things (IoT) era. With the acceleration of analytics and big data, at this point in time if you can imagine a use for data it will likely become a reality.

#InfoGov Links of The Day 01-05-2017

6 Trends To Expect From Big Data In 2017

  1. Artificial Intelligence Is Back In Vogue
  2. Big Data For Governance or Competitive Intelligence
  3. Companies Focus on Business Driven Applications to Avoid Data Lakes From Becoming Swamps
  4. Data Agility Separates Winners from Losers
  5. Blockchain Transforms Select Financial Service Applications
  6. Machine Learning Maximizes Microservices Impact

Is It Time for an Electronic Document Management System Audit?

An audit of your system will help you and your users to better understand if your EDM system is working as planned or if it needs some work. EDM systems are “live” systems that should evolve and change over the years as users find new ways to work with it and vendors add new functionality to an existing system. Document management is a journey, not a destination.

Retention Schedules – To Purge Or Not To Purge And When?

We certainly do not want records to be kept forever just in case of litigation, and many companies are indeed rethinking the consequences of keeping records too long. It is important to state that when litigation or government investigation is pending or imminent, records should not, and cannot be destroyed. But this aside, a thoughtful analysis of keeping records for the full statute of limitations period, some of which can be very lengthy, as opposed to the disposal of records as soon as legal requirements of met, should be weighed carefully. It is a balancing act, for sure. There are no easy answers here, or blanket solutions, and every company will come to their own subjective conclusions based on their risk factors and litigation strategy. It comes down to the advantages of destroying records as soon as they are able, and what is too soon, or what is long enough.

The new face of big data: AI, IoT and blockchain

The advent of big data was arguably the defining moment of the contemporary data management landscape, simply because its deployment and use cases have largely become synonymous with data itself. Each new foray into sentiment analytics, mobile technologies and additional integration efforts of unstructured data with structured data further blurs the lines between big data and traditional data.

Governance: a mandate for the data-driven enterprise

Organizations are increasingly recognizing the value of corporate data as a resource and consequently are focusing more on governance of that data. Governance includes keeping track of who owns which data, deciding what needs to be retained and for how long, and ensuring that it is protected. In that context, governance is a component of risk management; in addition, knowing certain things about management of the data is essential to compliance. Governance can also cover processes to ensure they meet the needs of the organization, do not create risks and comply with internal guidelines and external regulations.

#InfoGov links of the day

2017 for me is about self-care.  That involves getting back to physically (working out) and intellectually (being on top of  InfoGov news and finishing the CRM process).  Part of self-care includes getting back to semi-regular blog posts which includes (near) daily roundup of some of my favorite InfoGov links around the web.  Without further adieu:

Beating Back The Creeping Tyranny of Big Data

“There is obviously huge potential for the big-data revolution to achieve good things. But technology can be used for good or bad; there’s always a moral side to its use. We need to push for more technology that protects privacy, and makes data work for individuals as well as private companies.”

Digital Workplace Starts With Culture

“A digital workplace is a reflection of more than just an organization’s technical choices, it’s deeply reflective of the culture of that organization. In order to drive change, it is necessary to leverage culture, take strategic choices and plan. ”

Informaton Professionals: Where We Came From and Where We Are Going

“We have moved into a world in which usability is EVERYTHING. Even individual users can implement their own enterprise-like solutions, and if we try to get in their way they will do it anyway.”

The Presidential Records Management Directive, M-12-18 and the DoD 5015.2 Standard

“Simply put, no agency is going to be able to implement an enterprise-wide records management solution that is DoD 5015.2 compliant and effectively manages permanent records from their creation to their final transfer to the National Archives.”

4 Cybersecurity Conversations Professional Services Firms Need To Have Right Now

“ACCORDING TO MCAFEE, THERE ARE 316 NEW THREATS EVERY MINUTE, OR MORE THAN 5 EVERY SECOND.”