Why are your staff still manually capturing and classifying electronic documents and emails?

by Frank 15. June 2017 06:00

For many years we have promoted the totally automatic paradigm for low cost, high productivity content management.

We haven’t just articulated this cost-effective approach, we have also invested in products to help our customers not just meet compliance targets but also become more efficient while doing so.

Specifically, we have invented and produced two products that totally automate the content management process for electronic documents and emails. These two products automate the capture, classification and work processes required for electronic documents and emails.

These two products sit on top of a super-fast, scalable and secure content management database with all the functionality required to manage your rich content. Find any eDoc in seconds, produce any report, audit every transaction.

These two products are GEM and RecCapture, innovations 10 years ago and leading the field today after being comprehensively updated and redeveloped over the years. The content management database is RecFind 6. All products in the RecFind 6 Product Suite are totally compatible with all the latest Microsoft software including Office 365, Windows 10, Windows Server 2016, MS SQL Server 2016 and SharePoint 2016.

Better still, these are low cost products available under a number of licensing options including installed onsite on your server, hosted, Perpetual License, Subscription License and Annual License.

If you would like further information, a demonstration, webinar, meeting, online presentation or quotation please contact us at your convenience at marketing@knowledgeonecorp.com

We look forward to being of service.

Moving your Records to the Cloud, a Checklist

by Frank 15. February 2017 06:00

You or your boss have decided to move your records management processing to the Cloud, that is, to a Cloud based records management solution.

Typical Scenario

Currently, you run a legacy records management system on old servers somewhere in the computer room. You are aware that the records management software you are running is old and out of date and no longer supported. You also suspect that the server and operating system and databases software are similarly old and out of date. You also have no confidence in the backups and don’t think your server is included in any Disaster Recovery Plan.

The boss recently attended a risk management seminar and came back full of enthusiasm and focussed on minimizing processing risks. Yours records management system was identified as a big risk because you are responsible for 1.5TB of company data, documents and emails going back 20 years. The boss delegated to you and said, “Get it done!” Where do you start?

You could just call up a selection of records management software vendors and ask them to provide quotations but without prior research and preparation on your part, what you receive back will not be apples to apples. Each vendor will see the problem differently and you will spend a lot of time trying to answer a plethora of often confusing questions. There will be no clear conclusions and it will be difficult to make a selection of vendor or even know what you will end up with.

Take Advantage of the Opportunity

Alternatively, as you have already decided that a new software solution is required, it is a great time to re-evaluate everything you hold and everything you do. This is the time to cull and to modernize and improve all of your business processes. Please don’t, under any circumstances, be convinced by anyone to try to transfer your in-house mess to the Cloud, that would-be anathema.

Instead, plan on instructing the vendors on how you want to go forward, not on how you process now. Do your research and culling and modernizing and produce a report before you call in the vendors.

Cull and Simplify

The first job is to research exactly what you have in your database and associated physical files both in-house and at offsite record centres. You are going to need help from someone who is still an expert in your legacy system and you are going to need help from IT when trying to analyse the contents of your database. Nevertheless, get the help you need and then produce a list of all holdings, both physical and electronic. Do your best to find out exactly what is being held by offsite storage companies.

This isn’t thankless work because if you do your job well there is the very real potential of saving your company a lot of money in both floor space and offsite storage costs. Let’s be a hero.

Use your retention schedule and obtain management decisions to cull as much as possible, both electronic and physical. If in doubt, lean towards “throw it out” rather than “let’s hold on to it just in case.” If you haven’t had cause to reference something in 7 plus years, it is extremely unlikely that you ever will so, as you walk around the filing areas, repeat this mantra under your breath, “If in doubt, throw it out!”

Now look at your business processes, how old and manual and inefficient are they? For example, do end users have to fill in forms and submit them to records when trying to find something or can they just login and find it in seconds?

Please avoid the “we do it this way because we have always done it this way” syndrome. Be brave, be innovative, think outside the square; this is your time to shine! Sit down with users and ask them how they would like the new system to work. There are three magic questions you can always use to solicit the answers you need.

1       “What are we doing now that you think we shouldn’t be doing?”

2       “What aren’t we doing now that you think we should be doing?”

3       “What are we doing now that you think we can do better?”

Document your new business processes.

Produce a report

We aren’t talking about a magnum opus, all we need is a short, concise report that lists all the holdings after culling as well as your ‘new’ required business processes also suitably culled and modernized.

As we are going to provide this report to vendors to begin the quoting process we also need to include information on your operational and security requirements. You will need help here but it doesn’t really matter if your report isn’t 100% accurate, at least for now. What you are primarily interested in is getting an apples to apples response from your chosen vendors. If it later turns out that you need 60 users not 50 users or 3TB of storage rather than 2TB of storage or an average half second response time as opposed to a 1 second response you can easily get the vendors to adjust their quotes.

In other words, don’t agonize over whether or not your report is perfect (it can never be anyway) just make sure it is logical and makes sense and reflects your needs at a point in time.  You are guessing about what future usage and processing needs will be anyway because lots of things will change when the new records system is rolled out.

What to look out for

The following is a guideline, not an exhaustive or complete list. It should be a subset of your requirements.

  • Make sure the vendors understand that your data needs to be stored in the country you nominate.
  • Make sure that the records management software includes the functionality you require. Try not to be too prescriptive, leave room for the vendor to tell you how they would solve your problem with its unique solution. Be cautious about ‘optional’ features that may or may not be in your implementation.
  • Make sure the contract includes the vendor capturing and importing all your data and documents in agreed formats.
  • Make sure your system is fully redundant. Obviously, the safer it is and the more redundancy you have the higher the cost. It’s a trade-off, argue with your masters for the highest possible level of redundancy.
  • Get commitments of support that meet your needs.
  • Get commitments on planned and unplanned downtime that meet your needs.
  • Get commitments on backups that meet your needs.
  • Get commitments on bandwidth and response time that meet your needs. Remember that there are two connections to worry about; your company’s connection to the Internet and the data centre’s connection to the Internet. Be aware of possible bottlenecks.
  • Get commitments on data centre redundancy. What happens if their internet connection fails or their power fails?
  • Make sure that your data is as secure as possible. Ask them what international and government standards they meet on data security.
  • Make sure that you are able to dynamically grow or shrink your requirements; it is a foolish person who thinks he/she can accurately predict the future.
  • Make sure that there is an out clause in your contract; look carefully at any termination clauses. You want an ongoing assurance of service but you do not want to be locked in and you do not want to have to pay unfair or unreasonable penalties if you terminate.
  • Make sure that there are sensible clauses to handle disputation.
  • Make sure that your data always remains your property. Don’t allow the vendor to exercise any lien on your data in the future. Your data should always be your property and you should always have access to it no matter the circumstances.
  • Make sure that you clearly understand and agree with the billing algorithm; if it appears too complex then it is too complex. Please don’t give your accountant anything that will be a nightmare to reconcile every month. Don’t sign until you know exactly what your monthly subscription cost is going to be.

References

And finally, as always, ask for references. Other people have been down this road and it behoves you to learn from their experiences. Don’t just call them, go and visit them and spend time asking for their opinion. Use your 3 magic questions again.

1       “What did you do (moving to the Cloud) that you now think you should have done differently?”

2       “What did you do that you now think you shouldn’t have done?”

3       “What didn’t you do that you now know you should have done?”

Then it should just be a matter of selecting a vendor, agreeing a project plan and making it happen. If you have done your homework, it will be far easier than expected.

 Good luck.

Totally Automatic, Rules-Driven Email Management & Archiving

by Frank 15. December 2015 06:00

 

More than thirty years after the advent of email as a convenient and fast means of business to business communication most organizations still don’t have an effective way to analyze, monitor, select, capture and classify emails. If your organization does, then you are the exception.

This means most businesses don’t come even close to meeting the requirements of any compliance legislation that applies to their business. Nor do they even come close to managing real corporate risk.

It also means that most businesses don’t effectively guard against sexism, racism, obscenity, theft and bullying in their email system.

Is this a case of ‘heads in the sand’ or is the problem seen as just too hard? Maybe, senior management doesn’t really see unmanaged and unmonitored emails as a problem. Well, at least until the first court case.

In my experience, many organizations think they have a solution but in reality, they don’t; at least not a one hundred-percent solution. In the case of email management, ‘good enough’ is certainly not good enough. It only takes one bad email to slip through the cracks to bring the whole house down.

In many examples, organizations rely on end users to monitor, manage and police email. The problem with this model is that end users are human and typically exhibit all the strengths and weaknesses of humans. In this case, we are more concerned with the failings. As humans we are not always on top of our game; we have good days and we have bad days. We get distracted, we are prejudiced, we are sometimes lazy, we are sometimes careless and for a small number, we are sometimes outright dishonest.

Human beings will never produce a one-hundred-percent consistent result; that is not in our nature. Maybe when AI gets to the stage that we can all be ‘upgraded’ to cyborgs this will change, but I seriously doubt it. As long as there is any trace of humanity we will still be lovingly unreliable and inconsistent entities.

You don’t have a one hundred-percent reliable system if you don’t control and standardize all the inputs. Instead, you have a form of ‘managed chaos’ and inconsistent and unreliable results. You will also probably have a false sense of security, “Sure, we are managing all emails (well, kind of).”

I have been a proponent of the fully-automatic, server-centric paradigm for email management for many years and still promote it as the only one hundred-percent reliable way to effectively and consistently manage all incoming and outgoing emails. It is also the only way to manage risk effectively.

To be one hundred-percent sure you must have a one hundred-percent consistent paradigm. That is, a common set of rules that all emails are judged against plus a common set of processes to apply after an email has been ‘judged’.

Following are some example of what our fully-automatic, rules-driven email management system should be doing 24/7:

  • Is the email of a personal nature and harmless? If so, it can be ignored, there is no reason to capture and classify it.
  • Is the email all about business? If so, it needs to be captured and correctly classified within our corporate store.
  • Does the email contain expletives or sexual references? If so, it needs to be captured, quarantined by our security system and referred to a responsible officer for further examination and possible action.
  • Does the email contain references to corporate IP or classified material? If so, it needs to be captured, quarantined by our security system and referred to a responsible officer for further examination and possible action.
  • Is the email about business and does it require some action or response? If so, it needs to be captured, correctly classified within our corporate store and appropriate workflow initiated.
  • Is the email from a senior executive, about business and does it require some action or response with appropriate access controls applied? If so, it needs to be captured, correctly classified within our corporate store with appropriate security and access rights assigned and appropriate workflow initiated.

We produced our first fully-automatic, rules-driven email managements system in 1994. By today’s standards the technology was primitive but it worked and we used it within our business to demonstrate to our customers and partners how it could function in the real world. We called that product GEM for ‘GMB’s Email Management’ system. 

GEM has been redesigned and rewritten multiple times since so as to utilize the latest technology and tools. We still call it GEM even though our company is now called Knowledgeone Corporation, not GMB; the name works for us and our customers and we see no need to change it. It is after all, a ‘gem’ of a product.

We have used each and every version of GEM since 1994 within our company (we are the primary Beta test site) to automatically analyze all incoming and outgoing emails and to store and classify captured emails in our corporate store based on the RecFind 6 relational database. I can’t imagine running my business without GEM and I don’t understand how other organizations can exist without GEM, but they do albeit, taking huge risks.

The latest version of GEM, 2.7.1, is a major upgrade and involves a significant change in the way we connect to email servers of any type (e.g., Exchange, Office 365, GroupWise, Notes, etc.). We have standardized and simplified the interface to the email server using IMAP and converted our Agents to Windows Services to make the installation and management of GEM as easy as possible for your IT staff.

We have also improved the Rules engine to make it as easy as possible to define all the rules you need to manage your emails.

Because we have 21 years’ experience installing, configuring and using GEM in a real-world production example we also have the world’s most experienced GEM consultants to assist our customers.

How GEM integrates with any other EDRMS

GEM is designed to use the RecFind 6 relational database as its image & data repository. However, we provide several options for integrating to any other EDRMS such that the other EDRMS can search for and access emails (and the associated Metadata) captured by GEM. The four main methods, in order of ease-of-use are:

  1. Capturing encapsulated XML records produced by GEM;
  2. Using the RecFind 6 Mini API;
  3. Using the RecFind 6 SharePoint Integration Module (for customers using SharePoint as their EDRMS); and
  4. Using the RecFind 6 SDK

Please contact Support at Knowledgeone Corp for more information on the above methods.

How to clean up your shared drives, Frank’s approach

by Frank 22. August 2014 06:00

In my time in this business (enterprise content management, records management, document management, etc.) I have been asked to help with a ‘shared drive problem’ more times than I can remember. This particular issue is analogous with the paperless office problem. Thirty years ago when I started my company I naively thought that both problems would be long gone by now but they are not.

I still get requests for purely physical records management solutions and I still get requests to assist customers in sorting out their shared drives problems.

The tools and procedures to solve both problems have been around for a long time but for whatever reason (I suspect lack of management focus) the problems still persist and could be described as systemic across most industry segments.

Yes, I know that you can implement an electronic document and records management system (we have one called RecFind 6) and take away the need for shared drives and physical records management systems completely but most organizations don’t and most organizations still struggle with shared drives and physical records. This post addresses the reality.

Unfortunately, the most important ingredient in any solution is ‘ownership’ and that is as hard to find as it ever was. Someone with authority, or someone who is prepared to assume authority, needs to take ownership of the problem in a benevolent dictator way and just steam-roll a solution through the enterprise. It isn’t solvable by committees and it requires a committed, driven person to make it happen. These kind of people are in short supply so if you don’t have one, bring one in.

In a nutshell there are three basic problems apart from ownership of the problem.

1.     How to delete all redundant information;

2.     How to structure the ‘new’ shared drives; and

3.     How to make the new system work to most people’s satisfaction.

Deleting redundant Information

Rule number one is don’t ever ask staff to delete the information they regard as redundant. It will never happen. Instead, tell staff that you will delete all documents in your shared drives with a created or last updated date greater than a nominated date (say one-year into the past) unless they tell you specifically which ‘older’ documents they need to retain. Just saying “all of them” is not an acceptable response. Give staff advance notice of a month and then delete everything that has not been nominated as important enough to retain.  Of course, take a backup of everything before you delete, just in case. This is tough love, not stupidity.

Structuring the new shared drives

If your records manager insists on using your already overly complex, hierarchical corporate classification scheme or taxonomy as the model for the new shared drive structure politely ask them to look for another job. Do you want this to work or not?

Records managers and archivists and librarians (and scientists) understand and love complex classification systems. However, end users don’t understand them, don’t like them and won’t use them. End users have no wish to become part-time records managers, they have their own work to do thank you.

By all means make the new structure a subset of the classification system, major headings only and no more than two levels if possible. If it takes longer than a few seconds to decide where to save something or to find something then it is too complex. If three people save the same document in three different places then it is too complex. If a senior manager can’t find something instantly then it is too complex. The staff aren’t to blame, you are.

I have written about this issue previously and you can reference a white paper at this link, “Do you really need a Taxonomy?”

The shared drives aren’t where we classify documents, it is where we make it as easy and as fast as possible to save, retrieve and work on documents; no more, no less. Proper classification (if I can use that term) happens later when you use intelligent software to automatically capture, analyse and store documents in your document management system.

Please note, shared drives are not a document management system and a document management system should never just be a copy of your shared drives. They have different jobs to do.

Making the new system work

Let’s fall back on one of the oldest acronyms in business, KISS, “Keep It Simple Stupid!” Simple is good and elegant, complex is bad and unfathomable.

Testing is a good example of where the KISS principle must be applied. Asking all staff to participate in the testing process may be diplomatic but it is also suicidal. You need to select your testers. You need to pick a small number of smart people from all levels of your organization. Don’t ask for volunteers, you will get the wrong people applying. Do you want participants who are committed to the system working, or those who are committed to it failing? Do you want this to succeed or not?

If I am pressed for time I use what I call the straight-line-method. Imagine all staff in a straight line from the most junior to the most senior. Select from both ends, the most junior and the most senior. Chances are that if the system works for this subset that it will also work for all the staff in between.

Make it clear to all that the shared drives are not your document management system. The shared drives are there for ease of access and to work on documents. The document management system has business rules to ensure that you have inviolate copies of important documents plus all relevant contextual information. The document management system is where you apply business rules and workflow. The document management system is all about business process management and compliance. The shared drives and the document management system are related and integrated but they have different jobs to do.

We have shared drives so staff don’t work on documents on ‘private’ drives, inaccessible and invisible to others. We provide a shared drive resource so staff can collaborate and share information and easily work on documents. We have shared drives so that when someone leaves we still have all their documents and work-in-process.

Please do all the complex processes required in your document management system using intelligent software, automate as much as possible. Productivity gains come about when you take work off staff, not when you load them up with more work. Give your staff as much time as possible so they can use their expertise to do the core job they were hired for.

If you don’t force extra work on your staff and if you make it as easy and as fast as possible to use the shared drives then your system will work. Do the opposite and I guarantee it will not work.

Why product training is so important

by Frank 23. June 2013 06:00

I run a company called the Knowledgeone Corporation that produces a software application called RecFind 6 that is used to provide records management, document management, workflow, document imaging, email management and general business process management functionality. Every installation is different because we configure RecFind 6 to the exact requirements of each customer. All installations include some form of business process management and many include a reasonable degree of complexity, especially, when integrating to other systems.

We are always proposing to new and existing customers and negotiating contracts and the one item in the pricing summary that is always under attack is training. As well as questioning the need for face to face training, many customers also try to reduce the cost by just training a core group that will then train the rest of the staff who will use the new system.

I try to explain that effective and complete training is fundamental to the success of the project; that training isn’t a cost, it is an investment in success. I rarely win.

I also try to convince my customers of the importance of ongoing training for new releases and new employees but I am rarely successful.

I try to explain that cutting costs on training is a sure fire way to ensure that the project will never be as successful as it could be. I rarely win this argument either.

And finally, I always recommend that an IT person attends the training course because his/her services will be need by the application administrator throughout the year. This rarely happens.

Yet, time after time and in example after example, projects (not just ours) are significantly less successful than they should be because someone in management decided to cut costs by skimping on training; by not training operational staff in how to use the product in the most cost effectively and productive way possible.

If you skimp on training you are almost certainly dooming your project to failure.

Lack of knowledge on how to best use a product is an insidious cancer. The project may begin with a big bang and lots of congratulations but deep within your organization the cancer has already started to grow. “I don’t like this product.” “This product is too hard to use.” “I can’t find anything with this product.” “My staff don’t understand this product.”

By year two, many people and departments simply don’t use the product any more. By year three there is a concerted push to find a replacement for this product that “is too hard to use. No one understands it.” The replacement project manager or application owner, who hasn’t been trained, is unable to address the complaints and soon also decides that the problem is with the product. It would be a bad career move to decide anything else.

In year four the organization begins looking for a replacement product. In year five, at great expense they select a replacement product and then lower costs by skimping on training. The cycle starts again.

If you skimp on training and re-training your project is doomed to failure.

How many expensive failures does it take before we learn the lesson?

Training is an investment in productivity, not a cost.

A lifetime of maintenance and support?

by Frank 31. March 2013 06:00

I run a software company manufacturing enterprise content management products that has been offering maintenance on its products for nearly 30 years and that has never failed to produce at least one major update per year during that time. We have also always offered multiple year options for our software maintenance. We call it the ASU, Automatic Software Upgrade. We currently offer 1, 2, 3, 4 and 5 year terms; the longer the term, the lower the cost per year.

I got the idea for a new software maintenance offering from Garmin, the satellite navigation company. Essentially, I bought a Garmin because the manufacturer of a car I bought in 2008 stopped issuing updates to its integrated satellite navigation system and it is now pretty useless as it doesn’t know about all the new and changed road systems.

An attraction of the Garmin was that they offered a ‘lifetime’ supply of updated maps for a single fee that I could download up to four times a year. The end result is that my Garmin is always up to date with all new and changed roads and is one hundred-percent useful while the satellite navigation system in my car is now useless because it is so out of date.

As well as the advantage of always being up to date the Garmin deal was great because it was a single transaction; I don’t have to worry about renewing it every year and I don’t have to worry about future cost increases.

I thought why not offer a similar deal to RecFind 6 customers? They too have to keep up to date and they too don’t want to worry about having to budget and renew the ASU every year and future cost increases.

In our case we chose to re-name the five year ASU option to the ‘Lifetime’ option. If you choose the Lifetime option you automatically receive all updates for as long as you use RecFind 6 and you also receive free support via email and our web form for as long as you use RecFind 6.

The fee is one-time and the price is therefore fixed for life. You no longer have to worry about budgeting and contracting for renewals every year and your RecFind 6 software will continue to be relevant, fully supported and improved with new and enhanced functionality.

If at any time in the future a customer purchases new software from us or additional licences they can be added to its Lifetime ASU for a single one-time fee.

Frank’s perspective:

For the record, I buy a lot of software for our development team and none offer lifetime maintenance; all only offer annual maintenance and it is very expensive (up to 25% of the value of the software) and the price seems to go up every year. If I could convince my software vendors to offer a lifetime deal I would jump at the offer.”

Frank McKenna | Knowledgeone Corporation
CEO & Sales & Marketing Director
f.mckenna@knowledgeonecorp.com

Why aren’t more software vendors offering this same maintenance option?

I am willing to bet that you are still not managing your emails effectively

by Frank 25. November 2012 06:00

According to various industry surveys, 65% to 75% of companies still have no systems in place to manage email records. Based on my own observations and dialog with Knowledgeone Corporation’s customers and prospects, I would say the percentage is far higher; say 85% or more. My guess is that the industry surveys inadvertently included a number of email ‘cleaning’ systems as email management systems; thereby skewing the figures.

 

Given that there is now a variety of proven email management systems (like Knowledgeone Corporation’s GEM) available for most email servers (e.g., Exchange, GroupWise and Notes) and given the enormous danger of unmanaged email it is, on the surface, difficult to explain the apparent reluctance of organizations to implement email management policies and systems.

 

My own experience leads me to believe that the following are the major reasons organizations do not take this critical step:

1. Lack of ownership and leadership

Email management transects all of the traditional vertical organizational boundaries. There may well be an IT person in charge of the email servers but there is rarely a senior management person in charge of email organization-wide. That is, no one person actually ‘owns’ the problem and no one person has the authority to implement an organization-wide solution.

2. Lack of an understanding of the problem and of the solution

Most of the people who are senior enough in an organization to be aware of this problem do not comprehend the complexities of the problem. They have dialogs with IT people who explain the issues in technical terms, not in business or risk-management terms. Email management should come under an organization’s risk management regime because that is where a great deal of risk lies.

3. Lack of desire to solve the problem plus active opposition to a solution

There are a large number of IT people and others in every organization who simply do not want their emails managed, analysed, scrutinized, indexed and saved. This fact is never going to change and must always be addressed at a senior level by the person responsible for risk management policies and practice. Uncooperative and/or recalcitrant employees should not be allowed to put an organization at risk no matter what their position in the management hierarchy.

4. Confusion over what is involved in complying with a plethora of laws and regulations

One hundred percent of what well-meaning bureaucrats and politicians have done to ‘solve’ what they see as email privacy issues has been badly thought out, badly drafted and counterproductive; simply ill-informed, knee-jerk reactions. As you can see, I am no fan of politicians and bureaucrats who pass knee-jerk laws without understanding or caring about the full implications.

 

As far as I am concerned the privacy issue is secondary to the fact that every employer has to right to determine how its resources are used. Every employer has the right to protect itself. Every employer has the right to tell its employees if private emails are allowed or not. Every employer has the right to tell its employees what is acceptable and what is not acceptable in an email.

 

Solving the so called privacy policy is dead easy; herewith is the McKenna solution.

 

Tell employees that:

1. Private emails are not allowed and all emails will be scrutinized for inappropriate content; or

2. Private emails are allowed (in moderation) but that all emails, including private emails, will be scrutinized for inappropriate content; or

3. Private emails are allowed (in moderation) but that they MUST be identified by the keyword “Private” (or a word or phrase of your choice) in the subject line. All emails without the keyword “Private” in the subject line will be scrutinized for inappropriate content.

5. Confusing and misleading claims by companies marketing email management systems

It is a complex problem (have you ever tried to set up a multi-server email system in a large organization?) often poorly understood and poorly explained by the sales person. Add to this the fact that the sales person is usually speaking to the IT person (who lives in a different universe) who then has to ‘translate’ what he thinks the sales person said to senior management. Too often, the harried sales person, under intense pressure from the IT interrogator, will simply say “Yes” without really understanding the question or its implications.

 

My best advice to senior management is that if they don’t fully understand, keep asking questions until they do or, seek assistance from an independent authority. It is just plain dumb and dangerous to sign something off you don’t really understand.

6. Multiple and conflicting objectives

Is your objective to simply be aware of everything that is in your email store or is it to also meet a plethora of complex and competing regulations and certification standards?

 

Have you inadvertently set the goal post too high? Have you made the problem many times more complex than it should be? Has it become a “Wish List” instead of a requirement? Is the selection of a suitable product always held up by someone demanding that it has to also do something else? Has your horse now morphed into a camel?

 

My best advice? Why don’t you try ‘Getting wet slowly’ and review your needs again when the basic but critical email management problem is solved?

 

In the end it is about ownership, understanding and will. If just one senior person with the necessary authority understands the problem and commits to a solution then it will happen. The solutions are out there; they are just waiting for a committed purchaser with a clear and simple view of what needs to be achieved.

 

You must be aware of what is in your email store and you must be alerted to infringements before they grow into expensive problems. You can’t do this without an email management system in place.

 

Are you also confused by the term Enterprise Content Management?

by Frank 16. September 2012 06:00

I may be wrong but I think it was AIIM that first coined the phrase Enterprise Content Management to describe both our industry and our application solutions.

Whereas the term isn’t as nebulous as Knowledge Management it is nevertheless about as useful when trying to understand what organizations in this space actually do. At its simplest level it is a collective term for a number of related business applications like records management, document management, imaging, workflow, business process management, email management and archiving, digital asset management, web site content management, etc.

To simple people like me the more appropriate term or label would be Information Management but as I have already covered this in a previous Blog I won’t beleaguer the point in this one.

When trying to define what enterprise content management actually means or stands for we can discard the words ‘enterprise’ and ‘management’ as superfluous to our needs and just concentrate on the key word ‘content’. That is, we are talking about systems that in some way create and manage content.

So, what exactly is meant by the term ‘content’?

In the early days of content management discussions we classified content into two broad categories, structured and unstructured. Basically, structured content had named sections or labels and unstructured content did not. Generalising even further we can say that an email is an example of structured content because it has commonly named, standardised and accessible sections or labels like ‘Sender’, ‘Recipient’, ‘Subject’ etc., that we can interrogate and rely on to carry a particular class or type of information. The same general approach would regard a Word document as unstructured because the content of a Word document does not have commonly named and standardised sections or labels. Basically a Word document is an irregular collection of characters that you have to parse and examine to determine content.

Like Newtonian physics, the above generalisations do not apply to everything and can be argued until the cows come home. In truth, every document has an accessible structure of some kind. For example, a Word document has an author, a size, a date written, etc. It is just that it is far easier to find out who the recipient of an email was than the recipient of a Word document. This is because there is a common and standard ‘Tag’ that tells us who the recipient is of an email and there is no such common and standard tag for a Word document.

In our business we call ‘information about information’ (e.g., the recipient and date fields on an email) Metadata. If an object has recognizable Metadata then it is far easier to process than an object without recognizable Metadata. We may then say that adding Metadata to an object is the same as adding structure.

Adding structure is what we do when we create a Word document using a template or when we add tags to a Word document. We are normalizing the standard information we require in our business processes so the objects we deal with have the structure we require to easily and accurately identify and process them.

This is of course one of the long-standing problems in our industry, we spend far too much time and money trying to parse and interpret unstructured objects when we should be going back to the coal face and adding structure when the object is first created. This is of course relatively easy to do if we are creating the objects (e.g., a Word document) but not easy to achieve if we are receiving documents from foreign sources like our customers, our suppliers or the government. Unless you are the eight-hundred pound gorilla (like Walmart) it is very difficult to force your partners to add the structure you require to make processing as fast and as easy and as accurate as possible.

There have been attempts in the past to come up with common ‘standards’ that would have regulated document structure but none have been successful. The last one was when XML was the bright new kid on the block and the XML industry rushed headlong into defining XML standards for every conceivable industry to facilitate common structures and to make data transfer between different organizations as easy and as standard as possible. The various XML standardisation projects sucked up millions or even billions of dollars but did not produce the desired results; we are still spending billions of dollars each year parsing unstructured documents trying to determine content.

So, back to the original question, what exactly is Enterprise Content Management? The simple answer is that it is the business or process of extracting useful information from objects such as emails and PDFs and Word documents and then using that information in a business process. It is all about the process of capturing Metadata and content in the most accurate and expeditious manner possible so we can automate business processes as much as possible.

If done properly, it makes your job more pleasant and saves your organization money and it makes your customers and suppliers happier. As such it sounds a lot like motherhood (who is going to argue against it?) but it certainly isn’t like manna from heaven. There is always a cost and it is usually significant. As always, you reap what you sow and effort and cost produces rewards.

Is content management something you should consider? The answer is definitely yes with one proviso; please make sure that the benefits are greater than the cost.

 

Are you addressing the symptoms or the problem?

by Frank 19. August 2012 06:00

We are a software company building, selling and supporting our product RecFind 6 as an information management system and enterprise content management system. We have an in-house support department (we don’t outsource anything) and thousands of customers that contact it with questions and reports of problems they are having.

However, like I suspect happens at most software vendors, it is often very difficult for my support people to initially diagnose the real problem. Obviously, if there is an error message then it is easier to resolve but in most cases there is no error message, just an explanation of what a user thinks is the product not working properly.

If we can connect in to the user’s workstation using GoToAssist then we can usually ‘see’ firsthand what the problem is and then help the customer. However, this is not always possible and in a lot of cases my people are working ‘blind’ via phone or email and the only recourse is a question and answer dialog until we get to the point where we can define what the user thinks is going wrong and we can get the history of the problem. That is “When did it start to happen? What changed? Does it happen with everyone or just some users?” Etc., etc.

My people are pretty good at this process but even they get caught occasionally when the customer describes what he/she thinks the solution is rather than what the problem is. This usually takes the form of the customers telling us the ‘fix’ we need to make to the product to solve his/her ‘problem’. The wise support person will always ask, “What were you trying to do?” Once you can determine what the customer was trying to do, you then understand why they are asking for the particular ‘fix’. In most cases, the real problem is that the customer isn’t using the right functionality and once shown how to use the right functionality the need for a ‘fix’ goes away.

Problems also arise when my support people start mistakenly addressing the symptoms instead of the problem. In all fairness, it is often hard to differentiate the two but you can’t fix a problem by addressing the symptoms; you have to go back further and first define and then fix the root problem. Once the root problem is fixed the symptoms magically disappear.

For example, a customer reports multiple documents being created with the same auto number (i.e., duplicate numbers) as a problem. This isn’t really the problem though that is how the customer sees it. It is in fact a symptom and a clue to the identification of the real problem. In the above example, the root problem will be either an auto-number algorithm not working properly or an auto-number configuration with a flawed design. The former is what we call a ‘bug’ and the latter is what we call ‘finger trouble’; the configured auto number configuration was working precisely as designed but not as the customer intended.

Bugs we fix in code but finger trouble we fix by first clearly understanding what the customer wants to achieve and then by helping them to configure the functionality so its works as expected.

All experienced support people get to know the difference between:

What the customer thinks is the solution versus the problem; and

The symptoms versus the problem.

In my experience these are the two most common challenges faced when handling support calls. Recognizing both as early as possible is critical to achieving a speedy resolution and minimizing frustration. Not recognizing both as early as possible leads to longer resolution times and unhappy customers.

If we extend our support experience to real life we realize that these same two challenges face us in everyday life and in all of our social interactions. It why we often argue at cross-purposes; each party seeing the problem differently because of different perceptions of what the real problem is.

The challenges of misunderstanding are also often harder to overcome in real life because unlike a support call which has form and structure, our social interactions are mostly unstructured and opportunistic. We don’t start with a problem, we start with a casual dialog and don’t realize we are about to enter a conflict zone until it sneaks up upon us.

So if you find yourself in an argument please take pause and take the time to ask yourself and the other party, “Just what is it exactly we are arguing about?”  Which upon reflection, is exactly how we should handle each and every support call.

If we take the time to properly define the real problem we would spend far less time arguing and making people unhappy and far more time enjoying the company of our customers and friends. It is a no-brainer really, who wants to go through life in constant conflict?

For my part, I will just continue to ask to ask, “Before I address your request for a change would you mind please explaining what you were you actually trying to achieve; can you please show me?” And “What were you doing when you first saw that problem? Please start from the beginning and walk me through the process.” These two questions have worked for me for a very long time and I certainly hope that they work for you.

 

Is Information Management now back in focus?

by Frank 12. August 2012 06:00

When we were all learning about what used to be called Data Processing we also learned about the hierarchy or transformation of information. That is, “data to information to knowledge to wisdom.”

Unfortunately, as information management is part of what we call the Information Technology industry (IT) we as a group are never satisfied with simple self-explanatory terms. Because of this age-old flaw we continue to invent and hype new terms like Knowledge Management and Enterprise Content Management most of which are so vague and ill-defined as to be virtually meaningless but nevertheless, provide great scope for marketing hype and consultants’ income.

Because of the ongoing creation of new terminology and the accompanying acronyms we have managed to confuse almost everyone. Personally I have always favoured the term ‘information management’ because it tells it like it is and it needs little further explanation. In the parlance of the common man it is an “old un, but a good un.”

The thing I most disliked about the muddy knowledge management term was the claim that computers and software could produce knowledge. That may well come in the age of cyborgs and true artificial intelligence but I haven’t seen it yet. At best, computers and software produce information which human beings can convert to knowledge via a unique human cognitive process.

I am fortunate in that I have been designing and programming information management solutions for a very long time so I have witnessed first-hand the enormous improvements in technology and tools that have occurred over time. Basically this means I am able to design and build an infinitely better information management solution today that I could have twenty-nine years ago when I started this business.  For example, the current product RecFind 6 is a much better, more flexible, more feature rich and more scalable product than the previous K1 product and it in turn was an infinitely better product than the previous one called RecFind 5.

One of the main factors in them being better products than their predecessors is that each time we started afresh with the latest technology; we didn’t build on the old product, we discarded it completely and started anew. As a general rule of thumb I believe that software developers need to do this around a five year cycle. Going past the five year life cycle inevitably means you end up compromising the design because of the need to support old technology. You are carrying ‘baggage’ and it is synonymous with trying to run the marathon with a hundred pound (45 Kg) backpack.

I recently re-read an old 1995 white paper I wrote on the future of information management software which I titled “Document Management, Records Management, Image Management Workflow Management...What? – The I.D.E.A”. I realised after reading this old paper that it is only now that I am getting close to achieving my lofty ambitions as espoused in the early paper. It is only now that I have access to the technology required to achieve my design ambitions. In fact I now believe that despite its 1995 heritage this is a paper every aspiring information management solution creator should reference because we are all still trying to achieve the ideal ‘It Does Everything Application’ (but remember that it was my I.D.E.A. first).

Of course, if you are involved in software development then you realise that your job is never done. There are always new features to add and there are always new releases of products like Windows and SQL server to test and certify against and there are always new releases of development tools like Visual Studio and HTML5 to learn and start using.

You also realise that software development is probably the dumbest business in the world to be part of with the exception of drug development, the only other business I can think of which has a longer timeframe between beginning R&D and earning a dollar. We typically spend millions of dollars and two to three years to bring a brand new product to market. Luckily, we still have the existing product to sell and fund the R&D. Start-ups however, don’t have this option and must rely on mortgaging the house or generous friends and relatives or venture capital companies to fund the initial development cycle.

Whatever the source of funding, from my experience it takes a brave man or woman to enter into a process where the first few years are all cost and no revenue. You have to believe in your vision, your dream and you have to be prepared for hard times and compromises and failed partnerships. Software development is not for the faint hearted.

When I wrote that white paper on the I.D.E.A. (the It Does Every Thing Application or, my ‘idea’ or vision at that time) I really thought that I was going to build it in the next few years, I didn’t think it would take another fifteen years. Of course, I am now working on the next release of RecFind so it is actually more than fifteen years.

Happily, I now market RecFind 6 as an information management solution because information management is definitely back in vogue. Hopefully, everyone understands what it means. If they don’t, I guess that I will just have to write more white papers and Blogs.

Month List