BLOG
ECM | Never Waste Time Looking For The Right Document Again
Are you tired of wasting time looking for documents you need?
Never Waste Time Looking For The Right Document By Using The Best Information Management Tool: M-Files
Are you tired of wasting time looking for documents you need?
Your business moves quickly. When you need a document you don’t want to spend hours searching through content silos to find the information you need-especially if you need multiple documents.
Tell me if this sounds familiar.
You start a project and realise you need some documents. You look in the folders scattered on your desktop, in email, the network drive and cloud storage and end up losing hours searching for the documents you need.
Or worse.
You find the document but it’s behind an access wall, and the person with the clearance you need isn’t available. What do you do?
If you are using traditional information management systems, this is more of a problem than you like to admit.
So why haven’t you switched to a new system?
When asked this, most companies explain they:
Didn’t know solutions were available
Didn’t know the available solutions were affordable
Didn’t realise there was one solution so easy to use they could instantly integrate it into their day-to-day
Thankfully, there is a solution-one that is so easy to use you can instantly implement it and start seeing results right away. What is it?
What Is M-Files
On the surface, M-Files is an ECM.
What is an ECM? It is an Enterprise Content Management system. They are the more robust grown-up cousins to traditional systems.
What sets them apart is that they are built to be tailored to an enterprise’s specific needs. That means instead of getting a system you plug your content into, the ECM adapts to your document needs and erects a system around it.
M-Files is a metadata based, repository neutral, intelligent acting solution companies can enlist to quickly and safely find the content they want-right away.
How does it work?
Simple.
M-Files manages information by "what" it is versus "where" it's stored. No more guessing where to store a document, just tag it and relate it to other important business objects, such as customer, project, case and so on.
The Missing Keys Example
M-files searches for content you need based on what the data you are searching for is in place of where it’s stored.
To understand how it works, imagine you lost your keys in your house.
Your house has ten rooms. Traditional content management systems would require you to go room to room to search for your keys.
The old system could tell you if the keys were in the room you searched, but not what room had your keys. Worse still, the old system does not help you with managing duplicates or old redundant keys laying around causing clutter.
This is where you waste your time. If you have multiple silos of content, you could waste hours searching through each one before finally landing on the right one.
If you need multiple documents and search in a random order, you can waste even more time.
Using M-files you would immediately know both:
The exact room your keys are in
Where in the room the keys are
So how does this help you?
How M-Files Information Management Helps Your Business
Your company is larger than most businesses.
This places unique demand for specific needs on your business-like content management.
For your company to get and keep the edge-both over your rivals and startups-you need your team to respond in real time. Traditional content management systems keep you from doing that.
Every hour you waste looking for documents is another hour your competitor looks better.
Take back the edge, succeed at the speed of demand, and get ahead of the competition by using M-Files.
Discover 3 Key Reasons M-Files Is The Best ECM Tool Available
You want to know why M-Files is the best option available on the market today?
Then you are going to want to check out our next article. In it we share the top three things our clients rave about when they switch over to M-Files.
By - Matthew Heinrich - Senior ECM Consultant at Advance
M-Files 2018 – New Features and Enhancements Summary
Intelligent Metadata Layer
This is the latest enhancement from M-Files where it doesn’t matter where a document is stored or what system manages it, M-Files will provide easy access to it through their user interfaces and allow metadata to be edited and added. This is done with the aid of intelligence services that add a layer of artificial intelligence to M-Files.
Note that a license and setup is required (it doesn’t just happen out of the box)
IML External Connectors
Allows end users to use any M-Files interface to search, browse, edit, and add metadata to content located in repositories other than vaults by means of special vault applications known as connectors.
The image on the right shows install files stored in a file share being accessed via the M-Files interface. Video
Introducing KPI Pulse
Just over a year ago, I experienced a couple of light-bulb moments...
- Not everyone is, nor do they want to be, a data analyst – it might sound obvious, but the way that everyone accesses and consumes data can vary dramatically, even if they perform similar roles. I found that some people would like to view data in table form, like a big spreadsheet; these are generally financial, accountant types. Sales and entrepreneurial types liked big numbers and graphs.
- More work is being done away from our desks; at coffee shops or at client meetings. Therefore, having easy access to important metrics and data isn’t always possible.
- Many operational staff regularly like an emailed report, only to open it up and search for an issue or a value that needs their attention.
I thought, how can I take QlikView (or Qlik Sense, Excel and more, for that matter) and make it easily available to anyone, so that they can consume the information the way they want to?
The idea of KPI Pulse was created!
The concept was to have a locally installed publishing application which would automate the reloading of data into QlikView and then allow the designer to create a series of snapshots (they could be images like a graph, a complete dashboard, a data file or even a PDF report). These snapshots would then be available within a mobile app, a website, via email, a desktop app or even within Excel.
KPI Pulse was born!
We can now take QlikView metrics, personalise them for each user and push them up to your own secure cloud server. From there, these metrics are available on our mobile app, email, online Head Up Display, desktop app, Slack and Excel. We can schedule the distribution of key metrics any way you like and get everyone on the same page – aligned with your business performance goals.
Executives and managers can instantly see their own metrics on their phone, without needing to log in. If they then need to share that metric, they easily can with Slack, email or a text message.
You don’t need any extra QlikView licenses, allowing you to easily push metrics to all staff who require them, and even provide metrics within a website to your customers, clients or other stakeholders.
KPI Pulse is easy!
Right from the start, my goal for KPI Pulse was to make it easy to distribute the great work that a QlikView Designer has done, getting relevant metrics to the right people, easily.
One of the great things about QlikView (and Qlik Sense) is that it’s like the Swiss Army Knife; it’s the one package that you need to learn, allowing you to do so much. When looking at other BI solutions, there’s always a stack of tools that you need to learn and use.
Now, with this one easy to use application, the reach and effectiveness of QlikView has become even more powerful.
Watch our quick video!
Contact us today to find out more about KPI Pulse, and what it can do for your organisation.
Or visit our website at www.kpipulse.com
What Is Enterprise Content Management?
Enterprise Content Management (ECM) can be defined as “a formalised means of organising and storing an organisation's documents, and other content, that relate to the organisation's processes…”
Enterprise Content Management (ECM) can be defined as “a formalised means of organising and storing an organisation's documents, and other content, that relate to the organisation's processes…”
This definition does not do justice to what ECMs can really achieve!
What can a modern Enterprise Content Management system do?
In the 90s, ECM was largely around digitising documents and going ‘paperless’. ECM in 2018 now encompasses:
- The capture and storage of information in an electronic format. This can now include emails, PDF and a multitude of other filetypes, all possible with a simple drag and drop.
- The ability to be able to tag documents and files with metadata, or otherwise identify or group the document with a view for easy retrieval. Capabilities to search on those metadata tags or within the document itself, based on user’s specific criteria.
- The ability to manage each document in a variety of ways including editing that documents properties within the library, checking it in or checking it out for modification (along with the ability to roll-back to certain versions)
- Mobile access to documents, as well as the ability to keep them secure inside and outside of the organisation. For example, e-signing allows for documents to be signed and then stored immediately).
- Workflows for documents to pass through for approval or collaborative processes, as well as templates to help create a standard within your organisation.
ECM has come along in leaps and bounds to give an organisation what it needs – information at its fingertips, easily stored, easily found and easily managed. This gives employees in the digital age even more resources to perform their role effectively within the organisation.
The future of Enterprise Content management systems?
With increasing amounts of data entering an organisation, security and privacy is more important than ever. This has seen a trend of movement to cloud computing as major ECM providers try to outperform each other to become the Microsoft or Apple of ECM.
Finally, and this is already happening, providers will need to look at more than just the storage of this information. Areas like obsolescence of data and optimisation will start to come to the fore as the sheer magnitude of the data stored continues to grow.
The Association for Information and Image Management (AIIM), an international community that provides education, research and best practices on information management, are coining the next evolution as ‘Intelligent Information Management’, as ECMs move outside the transaction and records management circles. Artificial intelligence and analytics are on the roadmap and we will see the ability to ‘Create, Capture, Automate, Deliver, Secure and Analyse’ typify the Intelligent Information Management experience.
ECM Providers will tailor their systems to integrate and centralise not only access to the wide variety of data silos in organisations, but will provide a layer of intelligence that will enrich the user experience relevant content through a single system on any platform.
M-Files refers to their 2018 release as evolving from ECM to ‘Enterprise Information Management’ or EIM that includes an ‘Intelligent Metadata Layer’ to provide not only integration to organisations data silos but artificial intelligence that leverages access to the data to simplify the end user experience.
To learn more about ECM get in touch with one of our highly trained team members today!
Our Guide To Building Your First Mobile App
Did you ever dream of being the entrepreneur who created ‘that’ app? Here are a few loose guidelines to help you along that process.
Did you ever dream of being the entrepreneur who created ‘that’ app?
Here are a few loose guidelines to help you along that process:
Come up with the ‘million-dollar idea’
All great ideas address a specific problem – one that can be, and needs to be solved. Successful entrepreneurs solve problems in a way that we cannot imagine, through using innovative methods or processes that make it, in retrospect, look easy!
Look around you; every product and service you use now was created to solve a problem. Start by looking at problems in your daily life and keep a list of them. Once you have the list review it and see which ones can potentially be solved with an app.
Refinement and research
Once you’ve identified several needs which could be targeted, reach out to others and see if they are having similar problems. It is important to remember that not everyone may have the same problems as you, but they may have in the future – the tricky part is gauging the problem against it’s need.
Write down every idea
Once you have identified a need and decided to address it, you can start to elaborate on the details. When you are noting your ideas down, be as detailed as possible and make sure to note down everything that comes to mind – even things that might not seem helpful now, or may seem like a terrible idea.
Once you have finished noting down all you can, cherry pick these to construct a layout and the main, necessary features of the application – this gives you a base to work from.
Remove non-core features
From the previous notes, look closely at features that you can put aside and ignore for the immediate future - do not start out offering the world. You want the initial costs of the app to be as small as possible in the first release. The sooner you can get a basic app out there to market (to test the waters and gain feedback/interest) the better. There will always be room for additional features down the line.
Put user experience first
Even the greatest ideas fail if the user experience isn’t satisfying. If the user doesn’t ‘get’ the app, then it will never take off, regardless of how great the features are. Features are important, but how users perceive and use the app initially is crucial for longevity and uptake.
Hire a developer
You need to find a developer that suits your needs and fits the scale you are looking for. You can look for a freelance developer, directly approach a development company, or even do it yourself. This can prove to be the most difficult part of the process, as often you need to be able to work with other people to define your vision and have them buy into it, whilst meeting your budget.
Keep the updates coming
You should have released the first version with only a limited feature set. Now you can continue to evaluate the feedback over time, and look to tailor your development schedule around this. It is then a cycle of looking at your analytics and feedback, whilst continuing to update.
It’s important to note the steps above are not set in stone but are a simple guideline for moving yourself along the exciting journey of creating your first mobile application.
For more information on Application Development click here or contact us!
Is Public Wi-Fi Worth The Risk?
Around the world today you can rarely find a café, hotel or airport without access to a public Wi-Fi network. More than ever we have internet access whenever and wherever we need it. Unfortunately, public Wi-Fi does come with a catch.
Around the world today you can rarely find a café, hotel or airport without access to a public Wi-Fi network. More than ever we have internet access whenever and wherever we need it.
Unfortunately, public Wi-Fi does come with a catch – data sent over a public Wi-Fi connection provides an easy way for individuals with malicious intent to capture the data you send and track everything you do. Using specialised software whilst connected to the same networks allows access to the information you send, like someone eavesdropping on a conversation in a public place.
Surveys have shown that 83% of Australians have taken risks on-line when using Public Wi-Fi and an astounding 30% of Australians have used on-line banking over a Public Wi-Fi connection.
You should also be extra vigilant when connecting to these public hotspots, ensuring they are legitimate for the café or hotel you are in. It is not uncommon for an attacker to have a phishing hotspot setup with a similar or identical name.
Things to consider if you intend to utilise public hotspots
Use a VPN (Virtual Private Network) - to connect and secure your data. A VPN allows you to create a secure connection to another network over the internet and can shield your browsing activity and transferred data (usernames and passwords) from any malicious monitoring.
Refrain from visiting any sites which require a login with username and password, especially banking, email accounts and social media. Accessing these types of sites over a public network opens you up to potential issues which may only surface months later.
When setting up your laptop or workstation in a public area, take note to face your laptop screen away from any potential prying eyes, and monitor your surroundings over time to ensure you are the only one watching what you’re doing.
For more information on Public Wifi's and web VPN's, get in touch with one of our highly experienced staff today.
Trash or Treasure With Network Shares
In my youth, it was always exciting to visit the trash and treasure markets at local drive-in theatres on a weekend. Endless hours spent wandering through the hundreds of car boots, make-shift stalls and pop-up stands whilst we scrutinised boxes and fold-out tables covered with people’s unwanted items, occasionally discovering something of value.
In my youth, it was always exciting to visit the trash and treasure markets at local drive-in theatres on a weekend. Endless hours spent wandering through the hundreds of car boots, make-shift stalls and pop-up stands whilst we scrutinised boxes and fold-out tables covered with people’s unwanted items, occasionally discovering something of value. It was a lot of work to sift through the trash to find my treasure.
These days my kids use their phones to pinpoint almost anything they desire and within minutes they negotiate, order, pay and arrange delivery… all while relaxing on the couch during a Netflix binging session.
Their generation have significantly improved the efficiency of finding treasure amongst the trash, through use of well-designed technology.
It’s alarming how many organisations still mirror my childhood experience at the trash and treasure market when attempting to locate valuable information on their network shares. Sadly, there’s a similarity between the boxes of junk at the trash and treasure market and the muddled and disordered state most network shares end up in, even with people’s best intentions to ‘sort them out’ by adding their own ideas of sub-folder structures.
Fortunately, the way out of this mess no longer involves a steep investment of sifting through your network shares and ‘re-organising’ them into new folder structures or importing and classifying into an ECM. Instead, implementation is fast and simple, and access is more in-line with how we can pin-point information though the power of indexed searches.
Using the M-Files External Connectors to connect to external repositories like network folders, the information can be indexed and accessed through your platform of choice. The files remain on the network share and can continue to be accessed that way using your legacy systems.
Everyone else can use the beautifully designed modern interfaces of the M-Files clients available for Windows desktops, web browsers, and mobile phones. Yes, that’s right, you can lounge on the couch with your kids and use your phone to find whatever you’re after on your network share using the gorgeous M-Files App – search for files, check them out, make edits, add metadata and check them back in.
Adding metadata to these files enriches them as version history is maintained and the metadata makes them show up in metadata based searches and any common views you may have. Changes made to the files on the external system are synchronised with the M-Files system.
With the technology available in the M-Files External Connectors there’s no reason to be a dinosaur stuck at your desktop, plodding aimlessly through the mess that your network shares have deteriorated into. Instead you can get instant access to the treasure you need from all your technology devices whenever you desire.
M-Files have External Connectors planned for SharePoint Online, Exchange, OneDrive, Dropbox, Google Drive and Box just to name a few. Powerful instant searches across everything in your organisation is within reach using M-Files External Connectors.
If you want to know more about M-Files and the External Connectors please contact us.
Security Considerations When Employees Leave
With an increase in the use of external websites which store data, personal mobile devices being used for work and the rising trend of employees performing their duties outside the traditional workplace model – you need to ask yourself, are you doing enough to ensure the security and confidentiality of yours and your customer’s information?
With an increase in the use of external websites which store data, personal mobile devices being used for work and the rising trend of employees performing their duties outside the traditional workplace model – you need to ask yourself, are you doing enough to ensure the security and confidentiality of yours and your customer’s information?
When an employee leaves a business, it is imperative that a process is followed to de-provision access to systems they may have used. Here a problem arises – it is likely that the Company has not kept sufficient records of what information the now ex-employee could access, and as such will likely miss one or more areas that the employee can access.
As an example, have a look at some access rights that an employee may begin with and gain over their tenure with your business:
- Internet Access
- Internal WiFi Access
- Domain Access
- Security/Alarm access codes
- Website Passwords
- Social Media Passwords
- Credit Card Details
- Car Keys
- WiFi access
- Stored login information on personal devices
- Cloud Account login information
- USB backups held offsite by that employee
- VPN Details to connect to the internal server
- Knowledge of other employee’s usernames and passwords
More information given in confidence to an employee results in more work that needs to be done to remove that employee, leaving the whole termination process liable to human error. It is vital to ensure that employee access to systems and data is de-provisioned completely and on-time to protect your business.
Simple Steps: Begin with provisioning and recording
Once a decision has been made to hire an employee for a certain role; access rights, hardware requirements and external access should be determined prior to their start date. This information needs to be recorded consistently, and an approval process needs to be in place for any security related process or device.
Using a hardware or software solution, you should enable enough security to prevent users from using their own file sync solutions (e.g DropBox, Box etc). The same applies with USB devices, implement hardware or software restrictions to ensure that USB’s can only be used with the right approval.
If users have private work information or data on a mobile phone, implement a device management system that supports the remote wiping of data on mobile devices – this includes tablets. An extra measure would be to encrypt laptops and hard drives to ensure that no sensitive information is lost when a device is lost or misplaced.
Simple Steps: Employee leaving
Once an end-date has been determined for an employee, they should be put into a process to have their rights and access removed – starting with a review of your documentation on their current access. Once their end date is reached, the removal should begin almost as soon as they are out the door.
Retrieve any hardware and mobile devices that belong to the business, change passwords for accounts that didn’t have unique logins for each user (e.g social media), remove the users security access to the building (change the pin code if necessary) and if the office WiFi uses a single password, have this changed. If the employee had a credit card, ensure it is cancelled completely and they are removed from the account.
Simple Steps full stop
To reduce the impact of an employee’s departure, it is beneficial to implement policies and access methods that reduce the need for hands-on changes which can affect other staff (password reset’s, access code changes, etc)
Our tips:
- Ensure that each user has their own personal login where possible, including domain access, systems that are used and websites.
- Ensure that important financial information is never given out to employees. If they do have a credit card, it should be on the business account but under their details, with its own limit.
- Limit access to USB ports and other ports that can transfer information, ensuring that employees do not have installation rights.
- All employees to understand the importance of not sharing usernames and passwords
- Rather than using a WiFi password to authenticate wireless users, this should be done by MAC address with approval, keeping record of who devices belong to.
- Do not give any employee access to social media sites. This should be controlled by one person only and when that person leaves then all passwords should be changed immediately.
What can’t be helped
Even with the best security and processes in place, there will always be ways that your security could be compromised. However, with effective internal processes, good documentation, follow ups and reviews of your procedures you can drastically minimise the effect of an employee leaving.
Why not start looking at your systems now?
For more information on strengthening your IT security please contact us.
Minimising a Ransomware Attack
Ransomware is a piece of software that has been installed or downloaded to a computer, that once activated it will block access to that computer system until a sum of money has been paid.
What is Ransomware?
Ransomware is a piece of software that has been installed or downloaded to a computer, that once activated it will block access to that computer system until a sum of money has been paid. Typically, the sum of money demanded is not a large amount compared to the cost of time and effort it might take to restore or otherwise resurrect the files.
For example, your work computer containing important documents has been held ‘hostage’ and you are required to pay USD$500 to regain access to your files – when calculating the time and effort required to restore the computer back to the original state, even with good backups, you are likely to exceed that figure.
Two well-known ransomware threats that have received considerable press coverage recently for their widespread nature are the WannaCry and Petya attacks. These aren’t the only Ransomware threats out there, there are hundreds and they won’t stop circulating.
How do I minimise my risk of getting ransomware or having to pay for my files to be decrypted?
This is truly a case of being vigilant and taking precautions so as not to be caught out and taken advantage of by a Ransomware attacker.
On your computer
Make sure important data is not only stored on the computer! Backing up important files to an external hard drive (not attached permanently to the computer) is a good idea. It is important to note that cloud backups with an automatic sync (such as DropBox, Google Drive, OneDrive etc) may also be infected due to the infected files syncing. It poses the question; do you always need to have these turned on by default?
Ensure that your operating system and antivirus is up to date (including latest security updates and virus definitions) and that you use some form of ad-block to avoid the threat of malicious ads. To go even further, refrain from using an administrative account on your computer and disable macros in Office products by default.
Keep your browsers updated and remove outdated plugins and add-ons from your browsers. Remove Adobe Flash, Adobe Reader, Java and Silverlight from your browser plugins - if they are needed then set the browser to prompt for activation when these plugins are required to run.
General Behaviour
Learn the typical signs of a spam message and don’t open any suspected spam message from an unknown sender.
Be very cautious of any attachment within an email that you are not expecting. Sometimes a contact could be caught out and a virus distributed from their email account, which may look totally innocent. If in doubt you can ask the user whether they intentionally sent the attachment to you, over the phone or IM.
Be extra cautious of all links in emails, as links can be made to look valid but take you to malicious sites instead.
Conclusion
The best form of protection against a virus or ransomware is prevention. By changing your mindset around emails, links, attachments and computer updates you can drastically increase your chances of avoiding these threats. Stay vigilant!
For more information on minimising a ransomware attack in your business, speak to a member of the Advance team today!
Is Your Disaster Recovery Up To Date?
An all too common trend in the IT industry is to give ex-production hardware a new lease of life running the disaster recovery site. Tight budgets often restrict capital expenditure to areas where real value is visible, and the impacts and results are noticed throughout the organisation.
What should I do with my old hardware?
An all too common trend in the IT industry is to give ex-production hardware a new lease of life running the disaster recovery site. Tight budgets often restrict capital expenditure to areas where real value is visible, and the impacts and results are noticed throughout the organisation.
These initial savings can be quickly forgotten when an unplanned incident forces the switch over to your disaster recover site. Previous testing may have been successful on the DR equipment during your routine maintenance and test restores, but when a major incident occurs, are you confident that your DR is up to the task?
These are the questions you should ask yourself:
Will the dated hardware run our complete production workload?
How big is the impact on our users?
How long can we operate utilising the DR site before losing business?
How big is the impact on our customers?
It is not unusual for companies to consider that having high-end hardware offsite, doing nothing 98% of the time to be a waste of resources…
The key is to justify the initial expense, leveraging the DR site to provide an additional return on investment. An effective strategy is to live boot a complete clone of the production environment on a separate virtual segment, presenting a fast and accurate test development system.
Utilising Veeam combined with HPE Nimble Secondary Flash Array technology and your favourite hypervisor, you achieve a fast, production ready DR solution. Accompanied with the additional benefit of a fully functional test or development system at your fingertips that can be spun up in minutes.
If you want to learn more about disaster recovery solutions, please contact the team at Advance today.
Are Your Business Processes a Target For Scammers?
Cyber criminals are tricking CEOs out of millions of dollars by exploiting their organisations poor business processes and fooling unsuspecting employees into transferring money.
Cyber criminals are tricking CEOs out of millions of dollars by exploiting their organisations poor business processes and fooling unsuspecting employees into transferring money. The growing trend, known as ‘CEO Whaling’, involves plain text e-mails being sent to employees’ responsible financial transactions, masquerading as their boss requesting them to urgently pay invoices. Those falling victim have no way to recover the money with insurance generally not covering international fraud.
These highly organised con artists are not just spamming companies at random, instead they’re using social media to research potential victims, taking advantage when they’re most vulnerable. For example they may identify through social media that the boss or the person responsible for financial transfers is on a holiday and that’s when they strike, sending an e-mail saying they’re about to get on a flight and need an invoice paid urgently. They use a fake e-mail address and include some personal details uncovered via social media to give the e-mail just enough validity to trick the employee into believing it needs to be done and that requesting confirmation will probably make their boss angry due to the delay caused by being on a flight and unable to respond.
Organisations with business processes that rely on an e-mail from the boss for financial approvals are at high risk of falling victim to this scam as the process doesn’t include any validation that the invoice hasn’t been modified or that the approval has come from the person with authority to approving it. Busy people find the use of e-mail in a process like this convenient as they can be sent at will from virtually anywhere, on any device, at any time, putting them at risk of being exploited. Processes that involve printing, stamping, signing and shuffling paper around for approval stall when the approver is not in the same location as the document. Allowing e-mails to be used in place of an actual signature on the document makes the process susceptible to scammers. This issue was recently reported on in The Advertiser, read that article here http://www.adelaidenow.com.au/technology/how-australian-bosses-are-being-tricked-out-of-millions-of-dollars-by-cyber-criminals/news-story/57318e06c02a8215b8d67d521a219aea.
The solution to avoid being tricked by the scammers is to implement a flexible solution like M-Files where the business process is migrated into the system with secure access provided via desktop, web and mobile app. M-Files stores a single electronic version of the invoice with security that restricts access to only the people involved. This avoids copies of the invoice being e-mailed, instead those involved all refer to the same version stored in M-Files. With the approval process managed via workflow, the approver is notified of an invoice to approve and is required to authenticate themselves to view and approve, which can be done quickly a simply via the mobile app using fingerprint authentication. The people responsible for payment are then notified and required to authenticate to access the approved invoice. M-Files keeps a detailed version history of every change the document goes through, so if the person responsible for payment wants validation that the boss approved the invoice for payment, they can review the documents history to confirm it was actually approved by the boss’s user account. The version history can be used to identify changes to the original document and can potentially identify fraud attempts where bank details for payment have been changed on an invoice. Aside from not falling victim to fraud, the benefits of keeping the records electronically rather than physically include incredibly fast retrieval of information and increased office space when you recycle the filing cabinets for scrap metal.
If you’re still using a manual process that involves printing, stamping, signing and shuffling paper around your organisation for approval that can be short circuited by e-mails, you are at risk of being scammed. If you think it won’t happen to you, think again as the Federal Government have been briefed on the severity of this trend because the losses are increasing into the millions. If you want to know more about how M-Files can help your business, please contact us.
Consolidate Your Data and Make It Easier To Access
As organisations grow over the years, so does the assortment of tools that are employed for various projects and departments. This often causes a headache for employees and business owners while information can become scattered amongst several disparate systems and locations.
As organisations grow over the years, so does the assortment of tools that are employed for various projects and departments. This often causes a headache for employees and business owners while information can become scattered amongst several disparate systems and locations.
Generally there are different products on different platforms with different security and data requirements. Together they assist a user do their job, but they are on different servers and possibly even different locations with different access and user rights.
This is a problem that affects many organisations today, and the problem will only get worse as more data is made available to employees.
By using an Enterprise Portal organisations can optimise their information management and empower their staff with personalised information in one place, sometimes with just one click.
An Enterprise Portal can be designed to merge this disparate information into one place, ready for the user to click on a button to access as well as interact with the program. An example might be where information is gathered from the:
ERP system
Production planning and control system
Employee timekeeping system
Inventory management
to be made available to the user with a simple mouse click. An extra benefit here is that users don’t need to log into each individual system separately which saves time.
The security level is placed on the user’s login to the Enterprise Portal as to how much they see and what rights they then have within each produce. Effectively you now have one secure system that accesses all of the information relevant to that particular employee’s function.
Further, if an employee enters the number of a certain product component, all information on this component is displayed immediately on the portal page, including:
How this product is selling
What revenue the company achieves with this component
Whether there have been any complaints
An image of the component
How much time has been estimated for producing this product
How much time is actually needed to manufacture this product
The data for this comprehensive information page is compiled from different systems, and provides the validated employee with the right information just when and where they need it.
It’s a holistic view which allows employees to serve their customers and managers quickly with relevant information. When a customer calls to enquire about an orders ETA, customer service staff can access relevant information, quickly and with accuracy as it is linked to inventory and manufacturing systems.
Contact us to learn more about how the Advance team can assist with your technology needs.
5 Things to Consider When Preparing for a Repository Neutral ECM
Establish the business requirements as a clear goal for your project and speak to all the departments across all locations and facilities in the organisation to get an indication on how many employees need access.
1. Business Requirements
Establish the business requirements as a clear goal for your project and speak to all the departments across all locations and facilities in the organisation to get an indication on how many employees need access. One of my early projects during business requirements discovery the number of employees needing access increased to 115 from an initial 15 and fortunately the architecture scaled easily for the multi-site distribution of employees.
Be very clear about what you are trying to solve with each requirement and ensure that each stakeholder has had a chance to provide their list of requirements. At a recent project, it became apparent one of the biggest issues a majority of employees were having was needing information locked in a system they had no access to. This led to either using inaccurate or out of date information, or using inefficient methods to access the information through someone with a license. Management hadn’t provided access because the licenses were considered expensive and weren’t aware of the impact the work around methods were having on the organisation.
Prioritise the requirements with your project team and base the order on importance, technical complexity, risk and cost to implement. At a project where we were asked to provide a solution to standardise the handling of proprietary formulas within an organisation, several steps leading up to the conception of these formulas needed to be in place prior to work starting on the actual formulas themselves.
2. Current Information Locations
Identify all existing locations where information is stored including documents in file shares and file syncing services like Dropbox and OneDrive, databases including financial, service & CRM information and portals. A quick way to get a concise list is to ask finance for details on the software subscriptions and maintenance they pay or have paid in the past.
Establish the current and annual volume increase as well as types of information stored e.g Proposals, Invoices, Drawings, Customer Service Tickets etc… Modern ECMs like M-Files utilise compression and binary delta algorithms to efficiently store versions of documents, so your annual volume increase for migrated repositories will be considerably less. The site admin at one of my projects stated that after moving to M-Files where the chance of duplication and multiple versions of files was essentially wiped out, they went from network share storage increasing by 1TB per year to the M-Files vault only increasing by 50GB per year.
Determine which of these repositories need to remain in operation and which could be migrated into your ECM and be retired. We usually migrate things like legacy access databases that perform simple tasks like providing unique identifiers (e.g. batch numbers) to the ECM so it then provides the batch number as part of a workflow. You may have situations where it’s critical to preserve a legacy repository like a customer portal that allows service tickets to be raised. Its content can still be made available in the ECM for search capabilities and other purposes while its original functionality is preserved.
3. Security Requirements
Review the current levels of security within each repository that that will be accessed via the ECM and map them to one of the scenarios in the table below. The credentials used to access the external repository will be determined by the type of access specified for the connection. As an example, providing public access to Supplier and Customer lists may be necessary for all users in the ECM as this information is useful as metadata for other objects, whereas you may want to limit access to project related data to only the people in the project team. We often provide ‘metadata-driven’ permissions on project based data by including ‘project team’ metadata with the project so security access can be easily managed by the client.
The scenarios to consider when providing access to a repository via an ECM can be split into several categories:
Public
A common authentication is used to connect to the external repository, the ECM then controls access to the content via its internal security e.g Public Network Share
Public with Varying Permissions
Users and groups in the ECM are mapped to users and groups in the external repository to control access to specific content e.g Network Share with ACL restrictions to certain groups
User-Specific
The external repository dictates access rights requiring the ECM users to log into the repository with their own credentials e.g. SharePoint
4. Hosting Requirements
Determine if the system will be hosted on-premise, in the cloud or a hybrid to enable planning for hardware, review of service agreements with cloud providers or both. We’ve found to avoid delay in starting projects, development can be done on cloud servers during the process of hardware procurement and deployment, and then transferred once the on-premise environment is ready. It’s also quick and very easy to change cloud server specs to increase performance if needed.
Use the current volume plus expected annual volume increase values (from step 2) to determine what sort of backend the ECM requires as well as to establish storage and backup requirements. M-Files recommend using the embedded database option (Firebird) up to 50,000 objects and Microsoft SQL Server once that has been exceeded. If using Microsoft SQL Server, you also have the option of storing the file data within the database or as separate files. There are pros and cons that I’ll go through in another blog.
Size the hardware based on the number of employees and volume of data to be stored (from step 2), use the business requirements (from step 1) to help. Identify how connection will be made to each external repository (local or cloud) so connectivity can be determined either directly or whether a VPN is required. Where connectivity is difficult, it may be feasible to maintain a local copy that’s refreshed periodically or use technology that provides these capabilities.
5. Access Requirements
Establish the landscape for how employees will access the ECM keeping in mind it will become the central point to reference the connected external repositories. Most ECMs support access through Windows Desktop clients, Web Access and Mobile clients. If the ECM will be available externally, securing access via SSL or VPN is critical. On most of our M-Files deployments, our clients not only want access to M-Files via their mobile phone, but also on their laptops from anywhere! We use their SSL certificate (required for mobile access) and setup what’s called ‘HTTP over RPC’ so their M-Files Desktop Client connects securely whenever an internet connection is present. If you want to know more about setting up HTTP over RPC for M-Files, contact us.
Some ECMs support replication strategies where servers can be hosted in multiple locations and cache or replicate from a central location to provide efficient access to information. We’ve delivered successful projects where M-Files outperformed SharePoint when deployed to a customer’s remote locations as ‘cache’ servers that connect back to the main M-Files server via hardware based VPNs over 3G links. Consideration needs to be given to the technologies available to help meet access requirements.
For more information on M-Files contact us
5 Challenges Faced On Small Data Reporting
Big data is often touted as imperative to businesses, however in recent years perhaps we have been so blinded by Big Data that we are ignoring its poorer cousin, Small Data?
Five challenges faced on Small Data reporting
Big data is often touted as imperative to businesses, however in recent years perhaps we have been so blinded by Big Data that we are ignoring its poorer cousin, Small Data?
Big Data simply put looks at trends, information and patterns that can be utilised to forecast as well as give an overview of how your business is tracking. Big data takes high volumes of different sets of data and displays this information in a way that management can make decisions quickly and efficiently. Usually Big Data is generally generated outside of the business to assist the business make decisions moving forward.
Small Data on the other hand allows for the business to extract transactional information from data sources that end users can make use of immediately. Its focus is on providing information to the end user, so they can take action right now. It allows users to be able to determine why things happen, analyse this in real time and then take corrective action. Small Data can be generated as a sub set of Big Data or from other non-traditional data sources. The main thing to remember here is that it helps the end user achieve a result.
Big Data and Small Data each have their place in the business aiming to make inroads into improving decision making ability and resolve problems.
Formulating a plan to extract Small Data that suits each need within the company is paramount. If you ignore Small Data over Big Data then you are robbing yourself of some analytical tools that can help your company develop and improve.
Challenges facing managers looking at developing tools that allow Small Data reporting is:
- what type of data is required?
- where will it be obtained?
- who requires it?
- what format is it required?
- how will you extract the data?
The best methodology is to look at the problem you have and work backwards from that point.
As an example let’s look at the problem statement “Average Days Debtors take to pay have increased”. If we look at our challenge we can see that want to interrogate each customer and determine what the payments days are for each invoice payment has been made against (What). We check with accounts and find that this data can be retrieved from their SAP Accounts database (Where). It has been determined that Accounts Staff and Sales Account Managers will use the data (Who), accounts to chase up overdue accounts, and sales to check credit terms prior to selling. The decision then needs to be made as to what format they want to see the data in (What). An example may be a program that can run real time analysis of the accounting data and display that to screen. Selecting the right tool to extract and display this information is paramount to ensuring that the tool gets used (How). There are many good Business Intelligence tools that will allow quick extraction, analysis and display of the results the user requires.
As they say “look after the pennies and the pounds will look after themselves”. In other words Small Data can and will affect Big Data if looked after properly.
5 Public Cloud Myths Exposed
The public cloud is a hot topic in IT today. Even though it has been around for about ten years, cloud offerings from AWS, Azure and Google cloud have made the public cloud more mainstream and easier to get onto.
The public cloud is a hot topic in IT today. Even though it has been around for about ten years, cloud offerings from AWS, Azure and Google cloud have made the public cloud more mainstream and easier to get onto. In some instances though companies are jumping on board without really understanding it. So in an effort to debunk some myths here are five myths to consider if you are contemplating moving to the public cloud:
1. Public Cloud is Cheaper
The AWS/Azure public cloud “pay by use” methodology was a huge game changer for companies jumping onto the pubic cloud, but there is an assumption that “pay by use” will automatically make the subscription cheaper.
It can in some instances, but it should be noted that in many cases High Availability environments will usually come out cheaper with a hosting provider rather than a public cloud option. Data out transfer costs and dedicated resource costs both come into play in a big way in a High Availability environment, and things can get very expensive, very quickly. Many companies have tried out the public cloud and have gone back to dedicated resources in a managed cloud where the investment is more reasonable and consistent.
2. Everything should go to the Public Cloud
Due to the time it can take to tailor your application to the public cloud (not all applications are really built for the cloud/virtualization, much less the public cloud), not all companies environments are sitting in the public cloud. You really need to have an in-depth discussion with your IT Provider to determine what can be in the public cloud and what should be in the public cloud.
3. Full Security/Compliance Comes with Cloud Infrastructure
Security is much better in the cloud today than it has been in years past. Even though public cloud offerings like AWS and Azure offer HIPPA or PCI compliant solutions, it does not mean that will automatically make you compliant on moving to the public cloud. The infrastructure they provide to you is compliant, but once you configure your application on top of it, it becomes a completely different story.
4. Moving to Public Cloud is Simple
Some applications can be moved to the cloud simply, however putting a full environment that has not been configured and is technical within itself is a different story. Use your IT Provider or someone with the right expertise and experience to migrate the environment as it can get complicated quickly and without a good foundation getting your application to work on top of it may end up being expensive.
5. Managing the Public Cloud is Simple
Once someone has designed, built and migrated your application to the public cloud, it should be simple to manage from there – surely? You would think so but it is not the case! You really need to have your IT Provider work on maintaining, tweaking and scaling the configurations to keep your cloud “humming” along.
The simple suggestion here is to let the experts build, migrate and manage it for you. Cutting corners in the public cloud will come back to bite you.
For more information on Cloud & IT Services click here
M-Files Artificial Intelligence now makes Metadata Suggestions
M-File’s next release will include some powerful artificial intelligence services to help end users with metadata suggestions.
I mentioned in another article that the power behind IML’s ‘Intelligence Components’ comes from the integration of Abbyy’s Artificial Intelligence (AI) technologies into M-Files. Based on textual content capture and OCR these AI technologies interpret text using algorithms that analyse the meaning of the words and the relationships between them allowing real time classification of complex and unstructured data.
Even though it sounds complex, it couldn’t be simpler for the end user. Drag a document into the vault and you’re presented with ‘tags’ or ‘suggestions’ that you can click on to populate the metadata fields. The ‘tags’ are based on information in the document that matches metadata already in the vault. For example, your vault may have a list of suppliers stored as metadata to use when adding invoices. When AI reads the invoice, because it matches the supplier name with the one stored as metadata in your vault, a tag is created as a suggestion for you. All you need to do is click on it to add it as metadata, much faster, easier and more accurate than clicking in the field and typing the name to select it.
It doesn’t stop there either; AI based metadata tags can be invoked on existing documents when a property is changed. This is especially useful for business processes where metadata is added or changed along the way in a workflow. Going back to our invoice example, the initial metadata suggested when added didn’t include a description as this is to be populated by the person approving it.
If you want to know more about how to setup M-Files Intelligence Service to make suggestions when adding documents or when a property is changed, please contact us.
Which Backup Media Is Right For You?
Twenty years ago, backup media was easy to get your head around. Floppy Disk, Iomega, CD and Tape Drives, nothing to it.
Nowadays there’s so much more – what method of backup to use, where the backups are stored, how the backups are taken, when they are taken and how the backups are tested to ensure they are restorable.
Floppy disks and Iomega have gone the way of the dodo, but let’s look at current backup media still in use
USB Stick
Internal Hard Drive (via RAID)
External Hard Drive
NAS
CD / DVD (some people still use it!)
High Speed Tape Drives
Remote Backup Services
Syncing over internet (OneDrive, Google Drive etc.)
Cloud Backup
Each of these methods has its place depending on many factors, but don’t fool yourself thinking that a cheaper version will be ‘OK’ - It rarely is.
Considerations when deciding on a backup media type
Type of backup
Whether you are backing up hourly or daily and what sort of files you are backing up should help determine what backup media to use. For example, if you have a large amount of data requiring a nightly backup, then you could not use DVDs.
Backup Media Cost
It is important to factor in the cost of backup media, as well as the number of devices you require to ensure a consistent and effective backup process.
Backup data security
Identifying what is backed-up and how sensitive that data is can help you decide the most appropriate backup media. If your data is integral to your business, don’t sacrifice quality for savings.
Restorability
You need to weigh the risk of your selected media - how often will a restore fail per 1000 times it is tried? Each type of backup media has its own pros and cons and you need to investigate them properly to make an informed decision.
Hardware Redundancy
Ensuring that your hardware is not going to become redundant over time is extremely important when choosing a media type. Five years down the line, you may need to restore data which seems recent today, and the hardware may be considered obsolete with the restore devices hard to find. Restoring from a 3.5” floppy disk today would not be the easiest task.
Restore speed and time
Depending on the data, whether it is ‘mission critical’ or whether you can do without for a day or more, all plays a part on which backup media to use and what processes to put in place. Consider putting your crucial servers on a quicker restoring media where possible.
These are only a few considerations when looking at backup media. You need to see the complete picture and envision where your organisation might be in five to ten years’ time. If you think back on how things have changed since the 1990s, you can appreciate that being open to new ideas and processes could not only save you time, but also money.
For more information on back-up software and processes, get in touch with one of our highly experienced staff today.
Digital Transformation in a B2B Example
Click the link below to find out how this business implemented a successful Digital Transformation.
Digital Transformation in B2B Example
For more information on Digital Transformation, get in touch with one of our experienced team members today.
Dimensions & Cost Centres With SAP B1
SAP Business One allows users to allocate cost centres to transactions with up to five dimensions. The purpose is to be able to allocate a cost centre to a transaction for transactional reporting, as opposed to general ledger account reporting. This provides users a more in-depth view of what is taking place in each area of the business.
Let’s take an example of this where dimensions come into play; say you have a general ledger account number and the accounting team does not require multiple segments for reporting (this would create too many accounts to monitor). Instead they enable cost accounting within SAP B1 by going to System Initialisation – General Settings – Cost Accounting and enable ‘Use Dimensions’. Generally, the option to display distribution rules ‘In Separate Columns’ is selected.
Once saved, the dimensions can then be setup for cost centres to be created per each dimension. A cost centre is a company, unit or division that performs a specific business function. Users define the various cost centres and can then assign revenue and expense accounts to those cost centres.
The cost accounting feature, and the ability to assign dimensions and distribution rules, is a very versatile function. Once setup correctly, cost centres can be allocated to transactions at the time of posting, providing users a complete view of the costs related to running each department. In addition, it allows you to generate reports that reflect the distribution of costs across selected dimensions.
This provides management ability to better understand its operations and can assist with future planning and deciding what areas require improvement. Through utilising this function, SAP Business One can help businesses better manage their operations and provide them with access to necessary data and information across all business lines or departments.
Note that any changes to your system should be discussed with your consultant prior to proceeding. Ensuring that workflows are not affected, that reporting requirements are achieved and that other areas are correctly setup to allow for cost centres to be allocated correctly is integral to achieving the desired result.
If you are looking to implement cost centre accounting within your organisation, please don't hesitate to contact our team today!
Mobile Device Management
What is it?
Mobile device management (MDM) software allows IT staff to manage, secure and monitor mobile phones provided to employees. MDM software can be implemented and used to manage devices across multiple different Service Providers and all major phone operating systems.
Why is MDM important?
MDM allows IT staff to have a centralised management portal covering all the devices provisioned with the MDM software. This allows IT to have quick access to device data and statistics, apply security profiles and give mobile device support.
The security profiles can be used to implement secure emailing, secure web browsing and the lock down of the app catalogue, ensuring only certain whitelisted apps are available.
An MDM platform can be utilised to setup and configure a VPN for use by those mobiles which have the VPN policy applied, allowing for centralised management for any updates needed.
MDMs can perform remote locking and remote wiping of data in an event where this could be necessary, if the device is lost or stolen and contains sensitive information.
For organisations using a corporate network, implementing an MDM profile on a mobile device can ensure that whenever that device is in range of a pre-defined WiFi network that it is granted access.
Other Benefits?
A major benefit of implementing an MDM is that it gives IT the ability to let staff utilise their already existing mobile devices for the work place and permit connectivity to the corporate environment. Due to the sheer number of people who have personal computing devices (smart phones, tablets, laptops), this gives a major advantage and saves costs for those organisations who do allow BYOD (bring your own device) with their MDM platform.
Advance and MDM
Advance work with the AirWatch platform, which is VMware’s MDM solution. Offering compatibility with Android, Chrome OS, iOS, macOS, Windows 10 and more, AirWatch is a leader in the MDM space.
If you are interested in more information, or wish to try out AirWatch contact Advance Business Consulting below.