One of the frustrations we experience is when we see clients doing things that could have been avoided with a little consultation in advance and with some pre planning. Since our role is helping clients to avoid issues with their critical business documents, when we see them facing problems we know could have been solved with some simple and early action, it is frustrating.
Office Document Strategies Blog
One of the things that often happens when office equipment leases come to an end, or when older equipment is being replaced, is a simplistic replacement process gets used. This can be a mistake if the time is not taken to step back and do a process review to ensure that the replacement optimizes the potential for business gains.
One of the great tools the internet provides is the ability to monitor and review others' ideas about topics which have interest to you. A LinkedIn group we regularly follow includes opinions from vendors who work in the Enterprise Content Management (ECM) field. For those who are not always looking at this topic area you might hear it called:
One of the tools that can help manage a business is to read material being produced by companies which have a stake in the small business marketplace. This is one of the primary purposes of this blog as we focus on helping business people learn about our area of expertise, Office Documents. This involves many areas of specialization and we use the resources of many of our suppliers to find ideas and to support our efforts.
The July 15th announcement by Apple and IBM that they were entering into a partnership for IT services and products for enterprise clients has many implications. The essence of the announcement is that IBM will use its services expertise to develop from the ground up an extensive series of apps specifically for use with Apple iOS based products like the iPhone and iPad.
As computer networks grow and more and more users are brought on line there is one part of the network that is often forgotten and goes unmanaged. This growth can lead to unnecessary cost and also higher volumes of help desk issues. It involves the continued growth of print connection on the network as users decide they need a new printer to do their work.
"Last year was by far the worst ever for security, with 2,164 incidents that exposed 822 million records, according to one security report."
In his recent ITWorldCanada article this is only one of many striking comments made by author Andrew Brooks. He goes on in the article to outline nine key etiquette steps which can help you protect your reputation even if a breach occurs. Some are obvious, such as disclose what has happened and what is at risk, as well as focusing on looking after your customers and any others who may be affected by the breach.
Last year AIIM the industry association made up of information specialists, sponsored an interesting paper which looked at the paper focused business processes. One of the key themes of the document is that while paper storage for internal documents has gradually grown to become electronic filing in many instances the processes needed to deal with a myriad of incoming paper still gets little focus.