SlideShare uma empresa Scribd logo
1 de 21
Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
WAIT
? What  is Enterprise 2.0
? What  is ECM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object]
IMPORTANCE
Understanding
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source:  AIIM Content Security Market IQ, 2007
What Content Types Are You Targeting With Content Security? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
How Well Does Your Organization Understand Content Security? Source:  AIIM Content Security Market IQ, 2007
Who Owns The Content Security Initiative in Your Organization? Source:  AIIM Content Security Market IQ, 2007
Do You Have a Specific Group Within Your Organization to Address Content Security?  Source:  AIIM Content Security Market IQ, 2007
[object Object]

Mais conteúdo relacionado

Mais procurados

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskCarl Frappaolo
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contactsjbasney
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For EmailSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber SecurityDatix Consulting
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsScott Griffith
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theftDataGravity
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 

Mais procurados (20)

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber Security
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small Firms
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theft
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 

Semelhante a ECM's Role in Enterprise 2.0

KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefingmartingarland
 
Filenet test
Filenet testFilenet test
Filenet testkflana26
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management StrategiesSteve Kessler
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementBrian Huff
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxjeanettehully
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Nadine Burnett
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)Brian Huff
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkinsguiabusinessmedia
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information ManagementJesse Wilkins
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceCheryl McKinnon
 

Semelhante a ECM's Role in Enterprise 2.0 (20)

Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefing
 
Filenet test
Filenet testFilenet test
Filenet test
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management Strategies
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content Management
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open Source
 
Document repositories-and-metadata
Document repositories-and-metadataDocument repositories-and-metadata
Document repositories-and-metadata
 

Mais de Carl Frappaolo

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCarl Frappaolo
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy DevelopmentCarl Frappaolo
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationCarl Frappaolo
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Carl Frappaolo
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxCarl Frappaolo
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and FictionCarl Frappaolo
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Carl Frappaolo
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Carl Frappaolo
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability WebinarCarl Frappaolo
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market StudyCarl Frappaolo
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to CompeteCarl Frappaolo
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinarCarl Frappaolo
 

Mais de Carl Frappaolo (16)

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural Barrier
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy Development
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the Box
 
Measuring Knowledge
Measuring KnowledgeMeasuring Knowledge
Measuring Knowledge
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and Fiction
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0
 
BPM Market IQ
BPM Market IQBPM Market IQ
BPM Market IQ
 
Findability Market IQ
Findability Market IQFindability Market IQ
Findability Market IQ
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability Webinar
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market Study
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to Compete
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinar
 
IRM and E-discovery
IRM and E-discoveryIRM and E-discovery
IRM and E-discovery
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

ECM's Role in Enterprise 2.0

  • 1. Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
  • 3. ? What is Enterprise 2.0
  • 4. ? What is ECM
  • 5. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 6. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 7.
  • 8. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 9.
  • 12.
  • 13.
  • 14. Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source: AIIM Content Security Market IQ, 2007
  • 15. What Content Types Are You Targeting With Content Security? Source: AIIM Content Security Market IQ, 2007
  • 16. Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 17. Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 18. How Well Does Your Organization Understand Content Security? Source: AIIM Content Security Market IQ, 2007
  • 19. Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
  • 20. Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
  • 21.

Notas do Editor

  1. Old Buzzword - New Buzzword But before we jump In I thought