Case in Point I

Today’s Post By: Mohammed Attar, IBM Director, Case Management and ECM Solutions Product and Strategy

A 238% return on investment. Approximately $7M a year in savings. Daily case operations decreased from hours to minutes. Just how was all of this accomplished?

In this new blog series, Case in Point, we’ll take a closer look into how companies are using IBM Case Manager (ICM) and the benefits they receive from it. In this case study, we’ll see how a particular financial services institution used IBM Case Manager to bring content in context to deliver value to their enterprise.

This ICM customer is a Fortune 100 financial services institution—one that offers a wide range of products and services, including pensions, IRAs, brokerage, insurance, mutual funds, and much more. The company processes an average of 6,000 to 7,000 cases a day. However, managing such a diversified portfolio requires a great deal of precision, synergy, and collaboration within and across the company’s business lines. Many departments in this organization were still using manual business processes that either delayed the services or caused unnecessary human errors—or worse sometimes both.

The customer needed an end-to-end case management solution to help make case processes consistent across all divisions; they chose IBM Case Manager. Prior to deploying ICM, the biggest bottleneck hindering the customer was the reliance on middle-office workers to gather data for its services from multiple systems – which would take one to four hours. More importantly, there was no intelligent and automated method for checking errors.

By leveraging the full IBM Case Manager Suite (Case Builder, Case Client, Case Foundation, Watson Content Analytics, Sametime, Content Navigator, and Daeja VieONE Professional), the customer was able to consolidate its multiple data systems into a single platform – solving its biggest issue of multiple, disparate systems. This also enabled correspondence from all channels to be stored within a case folder available to all stakeholders. With the ability to see each case linked to a single account record from a 360-degree view, the customer was able to improve its cross-sell, upsell, and customer experience activities. In addition, the customer now has the power of ICM’s advanced analytics capabilities, which make it possible to provide adaptive and dynamic work queue management, improved case visibility to all stakeholders, and increased productivity for optimized case outcomes.

By leveraging ICM’s ability to create an audit trail of process activities, the company also satisfies regulatory compliance, auditable consistency, and mandated reporting—a crucial factor in the financial services industry.

So, what were the actual results of employing IBM Case manager for this particular customer? Take a look:

  • Faster speed to market driven by a simplified, shortened effort cycle.
  • Reduced costs due to ICM’s shared services platform, resulting in incremental cost savings of 80%.
  • Increased customer satisfaction as a result of shorter and error-free client servicing cycles. For example, data validation, which took 3 to 4 hours in the past, now takes approximately 3 minutes—a 98% efficiency gain.

This is just one example of how IBM Case Manager helped improve a specific financial institution’s business. If you’d like to read more about this compelling story, check out this joint report from IBM and Forrester Research, “The Total Economic Impact™ of IBM Case Manager.” It’s a great resource that really highlights the real-world benefits of implementing IBM Case Manager in an enterprise.

Share your thoughts and let’s continue the conversation. Tweet to: @MAttarECM

Biography:

mattarMohammed Attar joined IBM in 2006 as part of the FileNet acquisition. Mohammed has over 15 years of experience in the ECM space, and is currently serving as Director of Case Management & ECM Solutions. Mohammed has extensive experience both in product development and management. Mohammed started his career as a Software Engineer focused Performance & Systems Analysis. He later spent time serving as a Product Manager over the IBM ECM Platform. In 2008, Mohammed led his first development team, and since then has continued to serve in a leadership capacity in the business. Mohammed was one of the original development managers responsible for the design, development, and delivery of IBM Case Manager. Mohammed holds a Bachelor of Science in Computer Science from California State University, Fullerton. You can follow him on Twitter @MAttarECM.

Preventing the Digital Landfill With Smarter Business Practices Using Enterprise Content Management (ECM)

Today’s Guest Post by: Christopher Kissel, Analyst, Frost & Sullivan

The television network A&E had a long-running series called Hoarders. Admittedly, I like most watch with morbid curiosity to see what items a person would keep in their houses, or carry with them in pocketbooks and wallets. In fact, hoarding is not a laughing matter; the Anxiety and Depression Association of America, ADAA considers hoarding to be an indicator of Obsessive-Compulsive Disorder. Hoarding is still a great metaphor what is occurring in many organizations with digital assets and the digital landfills that result.

A digital landfill occurs when a company stores so much content that records are hard to locate and access, often to a point the records might as well be lost. Toby Bell, the Marketing and Offering Strategy Lead of IBM Enterprise Content Management (ECM), described the mismanagement of content as “information anarchy.” In a recent eBroadcast that I moderated, Generation Now – Pervasive Content Collaboration: Leveraging Cloud with ECM, Frost & Sullivan learned:

  • In a typical enterprise, 80% of what is stored is content.
  • In a study conducted by IBM, 68% of that content is legacy content. Legacy content should be archived or purged (if allowable) as this content is not instrumental to everyday operations.
  • According to the Association for Information and Image Management (AIIM), fully 38% of all organizations have not optimized their internal search tools. Consequently, inability to easily locate obsolete content is counter to the effort to rein in the digital landfill. Conversely, antiquated search engines also contribute to ineffective searches for content of value.

Content, to be clear, is any file that is being stored by an organization. Using the broader sense of content, without context, files become indistinguishable and difficult to manage with an eye toward cost efficiency and data handling. Without proper consideration, the personal files of an individual worker are treated the same as the files of the Chief Financial Officer. Calamity ensues when the file Awesome Mix Tape #6 receive equal treatment as the file titled 1Q 2015 Financial Statements: For the CEO: Highly Sensitive.

Preventing a Landfill

In looking to prevent a “digital landfill,” the following are the characteristics one should look for from their ECM:

  1. Multi-Cloud Environments. The best ECM platforms can be adapted for private-clouds, public clouds, or a hybrid-cloud environment that may also include on-premises storage.
  1. Administrative Auditing. The ECM should include an auditing engine that records every event related to the file (who created the file, who has accessed, when a file was accessed, etc.). Additionally, a central administrator should be able to change access privileges, switch administrators, or create rules based upon the end user and the location of the file. Auditing can be used to prove complaint practices.
  1. Strong Synch and Share Functions. In the last two years, the enterprise file synch and share technology has become viable and desired. At the time of file creating, the user can send credentials to colleagues for editing or read-only privileges. Credentials can be condition-based to change privileges based on time-sensitivity. The majority of ECM platforms will archive every version of a file presenting only the most recent revision.
  1. Analytic in the Platform. A school of thought exists that information can be gleaned from how files are accessed. Characteristics about file access (who accessed, how long the interaction, when accessed) can be valuable in public-facing settings.
  1. Platform Integration. Using Open API, ECM platforms can be integrated with data-loss prevention measures or risk-management can be applied to file access to mitigate threats to the most sensitive files.

Each feature mentioned here is important, however, when various aspects of ECM are combined, the value of the platform moves up exponentially. For instance, if a data loss prevention program triggers an alarm about a suspicious activity within a file, an investigation can be launched about the user or the type of access to the file — these factors can be used to determine if there is a greater breach onto the network.

Final Thought

Content management is not simply a burden to be bared; efficient ECM can be a smart way to improve a current business and avoid digital landfills. Additionally, ECM is important in managing content storage costs and supporting an enterprise’s fiduciary obligation to protect and maintain records. When companies work with employees or contractors, personal information and intellectual property must be accessible, but must also be treated with confidentiality.

The Confluence of Mobile Capture and Case Management

Today’s Guest Post By: Kevin Craine, Technology Analyst and Host of the Document Strategy Podcast

There is a lot of excitement about Mobile Capture these days…and for good reason: 58% of American adults use a smartphone, over 40% own a tablet, and mobile computing grew by over 80% just last year alone. Indeed, there are more mobile devices out in the world than there are personal computers. Smartphones and tablets have become a nearly ubiquitous part of our personal and business lives.

Extending Capture Beyond Boundaries

There is incredible opportunity to be found in the convergence of mobile computing and document capture technologies. We’ve long been able to capture important bits of information by scanning paper documents and extracting specific data elements in the process. But these activities have been largely confined to centralized scanning and processing facilities. Instead, Mobile Capture extends capture beyond the edges of the organization with the ability to use smartphones and tablets to capture images and documentation directly at the point of service with customers; in regional offices, in the field and in customer’s homes. The result is a faster, more accurate and more cost effective processes.

 

Positive Business Results

One area that is poised to see tremendous benefit is the area of Case Management. A great deal of flexibility, adaptability and collaboration is needed for effective case management, and organizations find that traditional ECM approaches often miss the mark. The ability to capture critical documents using a smartphone, and have that information immediately uploaded, tagged and included in the case file, brings a new level of efficiency and speed. New solutions streamline the process, eliminating the burden of paper and scanners, and help case workers collect data and coordinate services in ways that achieve more positive case results.

 

Capturing Case Management Improvements

The confluence of Capture and Case Management provides a higher degree of flexibility, agility and collaboration for any organization that needs to build a superior level of service and customer satisfaction. Banks and other financial institutions are using the approach for loan origination and new customer on-boarding, particularly for missing or “trailing” documents. Field workers, like claim adjusters or building inspectors, are using mobile capture to not only photograph an incident but also take a picture of the accompanying documentation and upload on the spot to complete a case for adjudication. Other examples are claims processing and reimbursement, benefit enrollment, and logistics and transportation, to name just a few.

Clearly, a unique opportunity for important process improvement is at hand, so the question becomes: How can your organization benefit by the convergence of Mobile Capture and Case Management?

Want to learn more?  Download my white paper “Are You Ready for Mobile Capture?

Interested in Case Management innovations? Download this Forrester Report on Dynamic Case Management.

A Look at Datacap 9.0

Today’s Post By: Mark Martin, Senior Offering Manager – IBM Capture and Imaging

I recently participated in a Datacap v9 customer introduction event in the Northeast. The local IBM team brought together about 15 people from 5 or 6 different companies. Some have Datacap, some have other solutions. Some were from the insurance sector, some from financial services and others from learning institutions. And while they came from different companies and industries, they came with similar requirements and similar challenges.

Top of mind for all of these customers was the ability to quickly build and deploy capture applications. We heard the group talk about their desire to drive more paper out of their processes by introducing more applications. We heard about their desire to become more nimble – to be able to quickly make changes to their capture workflow when the line of business asks for changes to react to the marketplace or their business environment.

We showed them FastDoc, the new Datacap capture application configuration interface. Designed so that business analysts can use templates, pre-configured rules and other building blocks to quickly modify existing applications and create new ones we think FastDoc is a huge step forward in designing capture applications. This group agreed. FastDoc would be a game changer for them. Two things are precious to any organization – skilled resources and time. Datacap FastDoc lowers the amount of both needed to modify and configure new capture applications. If your organization is struggling to keep pace with requests for new capture applications, you absolutely must have a look at the new FastDoc in Datacap v9.

The topic of Mobile also generated lively discussion. We talked about use cases. Some were common and well understood. Others were unique. Here’s one: Imagine a capture-enabled process at a university that enables students facing expulsion to submit documents to support their appeal process. This real world example is one that the customer can meet with Datacap, helping make it more efficient for the school to manage the appeal process – and easier on the already stressed out student to comply.

My colleagues Joe Cannon and William Yee showed an end-to-end demo of “capture from anywhere”, collecting insurance information and accident photos directly from the scene of an accident using Datacap Mobile, verifying that the information was accurate and complete and then automatically starting a new claim workflow in IBM Case Manager. In their demo, while the Playmobil car was totaled, the little people walked away unscathed – and saw that their insurer was working their claim long before they got back to the toy box.

Point, click, sdatacapblogubmit from a mobile device, and a Case was launched. It struck me while watching Joe’s demi that the use of a toy as a prop was appropriate. Today’s device-savvy kids could do this after about 30 seconds of instruction. Child’s play – but with grown up results. See what Datacap v9 can do for your business.

For more information, check out ibm.com/Datacap.

Benefits of a Fully Automated Data Archiving System

Today’s Post By: Abtin Assadi, Solution Architect, Information Lifecycle Governance, IBM Analytics

In today’s information economy, data availability is an absolute and constant necessity. In many enterprises, backups are the primary means for data preservation. Backups provide the ability to recover from mistakes, as well as natural or man-made disasters. In some organizations, backups are even used as a means to preserve records to ensure regulatory compliance or in case of litigation and discovery. However, as any backup admin can tell you, backup storage can grow very rapidly and be a major source of IT enterprise infrastructure cost. Archive storage can reduce the costly burden as well as reduce duration and the number of backups performed daily.

Many are familiar with Email archiving – court mandated email preservation for eDiscovery has established email archiving as a common IT practice. However, archiving can, and should, be extended to structured and unstructured enterprise data.

Moving non-critical data from primary to archive storage reduces primary storage cost. Additionally, once data is archived, it is removed from the regular daily backup cycle. Since incremental or full backups are done on a daily basis, the backup savings from archive storage could be even greater than the primary storage savings. Although it is true that backup deduplication helps in backup reduction, removing non-critical data from the backup cycle is the more economical approach.

So, how do you determine what data is critical and what is not? This is the essence of Information Lifecycle Management. Every piece of data has a lifecycle, from data creation (or arrival), prime time use, to retention period and disposition. For example, my email to my son to feed the dog should be disposed of after it is read; no retention is required. A facility lease document on the other hand, will probably need to be retained for several years after the lease has expired. In this example, prime time is during the lease negotiation while the facility team, the property owner and the lawyers are creating multiple document versions. Once the lease agreement is signed, the retention period is set to the duration of the lease plus a fixed period of time afterward depending of the legal and record retention schedule.

Data that has passed its prime use needs to be retained and easily accessible. However, it does not need to be kept on the primary storage and backed up continuously. An enterprise archive system will automatically archive and preserve your data for the period specified by your retention schedule on lower cost storage (on the premises or in the Cloud), while maintaining seamless access. An enterprise archive system can even dispose of data once it has reached the end of its useful life. This can all be automated using content analytics and based on a company’s document retention policies. Analytics can help identify data and document types. For example, analytics can recognize a document as a lease agreement that expires in June 2017 and has not been accessed for two years. Correctly identifying the document and knowing the retention period will automate data archiving and disposition, creating great savings for enterprise IT.

To learn more please review our Value-Based Archiving solution brief.

The Benefits of Content Collaboration

Today’s Guest Post by: Christopher Kissel, Analyst, Frost & Sullivan

Historically, the concept of data had a simple connotation as something that had to be searched for and retrieved behind a network firewall in an IT-managed repository. The data itself was a dead document and without management, it could be lost, misplaced, inadvertently deleted, or breached.

Shocking to think about when we consider that data is one of the most important natural resources of any company. According to IBM, 80% of what is in enterprise storage is content (and of that 80%, 68% is historical content that is not used on a daily basis).

Content has significant value to the Line of Business in their day-to-day activities and Enterprise file sync and share (EFSS) services change the entire paradigm of data access and handling.

The first and most important aspect of data handling in an EFSS is that the data resides in one easily accessible place,such as a cloud environment. Also, the term data feels like a generic term, but, data is in fact a very big idea. For instance, Box identified 11,000 concept file types (e.g., if all the variations of file extensions for PDF, Excel, video, business files, etc. are accounted for) under its care.

Second, the type of collaboration where a file is updated and the newest revision of the file are keys to its management. The data now has an historical record. The ability to prove data security is related to compliance requirements. The file itself becomes a manageable, audit-able event. As data is extracted from the file, it becomes part of a dynamic business operation and the real magic and business value of content collaboration begins.

The variety of business operations richly benefiting from a cloud-based file sharing system is immense. The following are illustrative examples:

  • In construction, CAD documents can be dynamically changed as data is shared in real-time. An architect working remotely can change portions of a blueprint and the result can be accessed by a contractor either through a laptop, tablet, or custom-built device reflecting the changes.

 

  • In the mortgage loan origination industry, there is no shortage of documents that need to be signed or notarized. A mortgage loan is a highly structured transaction and time-stamping proves that the necessary procedures were followed in order to produce a legally binding document and agreement.

 

  • Famously, one television executive quipped that programming is what happens in between commercials. The finalization of commercials is no casual affair. The production team finishes a commercial. In many instances, sound techs comb the files for sound integrity and then add music and audio effects. The content is then vetted by a company’s marketing department and executive team. Last, the legal team reviews the file commercial. Not only does the EFSS automatically update the file containing the commercial as changes are being made (and create an archive of previous versions), the whole process of transferring physical tape is eliminated.

 

  • At a disaster site, insurance adjusters are taking hundreds upon hundreds of pictures in trying to determine damages and claims. The ability to establish a time-record and a hierarchy as the pictures are being taken is valuable. (Worth noting here is that Frost & Sullivan prefers EFSS systems that use an Open API for integration as many industries may have case-based applications that can be integrated with the EFSS).

 

  • Production can be a granularly managed event. If a publicly traded company is compiling a 10-Q form, the financial department can easily segment the parts of the report that each department head needs to file without having to parse content from a larger publication.

 

  • Data access and retrieval becomes an integral part of workflow. Almost every business has a set of invoices, bills of lading, shipping documents, sales and marketing materials. How and when these documents are accessed creates a line of business.

 

“Heaven forbid” also happens . . .data breaches happen. EFSS systems will create a log of who and what devices have accessed a given file, when a file was accessed, what changes were made, and where the file was located in terms of a cloud or firewall. All of this log information can be compiled and correlated in a forensics investigation. Of course, the faster a breach can be identified and understood, the faster remediation can begin—a benefit of an effective EFSS solution.

We earlier alluded to the idea that the file becomes an event. Security analysts almost reflexively join cloud based communications with cloud computing. Our thinking is that analytics can readily be integrated with data to create positive outcomes.

In this way, social media and EFSS are coupled. If an enterprise has a Web site and uploads different content to the Web site, the way that followers interact with content is useful information. The idea that customers will download coupons or special offers in exchange for a phone number or a physical address is a staple of advertising. However, that event is now non-evasive. As a customer interacts with a piece of content, or an event planner, the enterprise knows from what device a customer used, the duration of the interaction, and what commentary was made as a part of the auditing and reporting platforms in an EFSS.

What really has happened is that data is no longer a passive activity. Data access can be an integral aspect of workflow or of any aspect of business production and applications. Content collaboration becomes easier in that team members (or other partners and contractors) work only with the latest and most properly vetted files. The smartest EFSS provide open-source API so enterprises can integrate its publishing tools, contact management, and custom-made applications to enhance presentations. The further advance of EFSS is not only creating new avenues for content collaboration, business operations are improved, and new interaction with social media and marketing tools adds to the overall value of EFSS platforms.

More on the new European Union Data Protection Legislation: let’s be prepared

Today’s Guest Post by: Dr. Donald Macfarlane, ILG Solution Expert, IBM Enterprise Content Management

Generally no company, irrespective of size, can escape privacy and personal data regulation.

In Europe the Data Protection Direction has been implemented across the EU states since 1996. Recently in Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González (2014) the Court of Justice of the European Union held that a search engine provider is responsible for the processing that it carries out of personal information which appears on web pages published by third parties. This has implications across all national courts in the EU. Add to this the looming EU General Data Protection Regulation (GDPR) which is expected to be in full force by 2016.

Our clients recognise that the landscape is changing and that there is a very short window for international companies to make their transition and achieve personal data compliance. Therefore it is easy to see why business is telling IBM “Our lawyers are asking us about our internal data protection, so we want to know what solutions are there to address these operational business challenges/issues?”

Why should we all care about this? Recent EU case law and the upcoming GDPR have implications for every organisation holding EU citizen data. This means even US companies who hold data on EU citizens are effected and not just by the upcoming GDPR. Commentators state that the GDPR is going to give the consumer power to ask to see their data and also give them the right to be erased (or even forgotten), this consumer right is backed by strict regulation with large penalties and significant commercial consequences.

Once adopted the GDPR is expected to change the climate of EU Data Regulation by applying a single set of rules across all of the EU and EU regulators, covering data on cloud and social media and it will likely require business to proactively justify their compliance. Ask yourself the question: could you offer your customers the right to be erased from the companies systems? Would you have confidence that IT can certify to the consumer and regulator that their data is cleared from every network drive, SharePoint, repository, email server or employee laptop? Other than reputational damage current fines are anticipated to be in the region of € 100 m or 5 % of your company’s annual revenue.

IBM through its international experience can help all business proactively approach the shifting data protection landscape and upcoming GDPR and make a swift and effective transition to become fully compliant to regulation.

By using our range of products such as StoredIQ, IBM Content Collector and Atlas eDiscovery IBM can create a “privacy by design” enterprise grade data protection governance solution. IBM can effectively and accurately discover and classify personally identifiable information, including where it is stored on the IT network – meaning you are in control of all private consumer data anywhere on your network. By utilising Policy syndication capabilities business can make bespoke rules for retention of private data, setting reasons for retention (such as updatable local policies) and timelines for disposition, ensuring compliance in a defensible manner.

Data protection has been the theme of a recent Webinar from AIIMS – where a live poll was launched and 42% of respondents, asked if a new European General Data Protection Regulation was necessary to harmonise the current laws across the EU member states, strongly agreed with that. By removing country-based variations, this will reduce the likelihood of breaches and therefore enhance business opportunities.

Interested in learning more? Listen to our recent webinar.

 

 

 

 

 

Customer service and the cashless society

Today’s Post By: Neil Parrott, Senior Manager, Enterprise Report Management

Billing issues – including actual or suspected fraudulent use generally top the list in terms of customer frustration. After all, your hard earned money is at stake. Thinking about customer service, most of us can recall good and bad experiences. Bad experiences may be based on difficulties contacting a vendor or merchant, such as reaching an answerphone message, or being endlessly passed around an automated call handling system. Perhaps you succeed in making contact with a real person only to be passed between different departments, all the while having to re-explain an issue and eventually to be told ‘we will investigate your inquiry and get back to you in the next few days’.

Good experiences are a result of prompt and efficient inquiry handling either by phone, or, the option to serve yourself – via an online portal. You explain an issue once and the organization quickly responds to the matter and, perhaps, provides you with additional useful information about relevant products or services that may interest you.

To combat fraud and promote usage, payment companies are gradually moving us towards a cashless society. Tap and pay has been available for several years in the UK, but, since there is no authentication, payments are limited to the equivalent of $35 – $40. Apple Pay promises to overcome this issue with fingerprint or Watch authentication. But the future envisioned by Mastercard avoids the need for pin codes and passwords by integrating payment and security technology into wearables – with persistent biometric identification.   The nymi wrist band provides authentication based on your heart’s unique signature (Electrocardiogram or ECG) to authenticate and confirm your identity while you are wearing it. Could such seamless payment systems eventually pave the way towards a cashless society?

Recently Forrester Research Vice President and Principal Analyst Craig Le Clair led a webinar titled “Statement Presentment in the API Economy” in which Craig and I discussed emerging trends in bill presentment, on-line payments and customer self-service in the API economy, all of which have to do with this new “cashless society. Do you pay with your phone? Do you think before you swipe?

One thing is certain, all of these cashless payment solutions will lead to a rapid increase in volumes of transactional data and statement information. Efficiently managing and presenting these financial records will be essential to the overall customer experience.

 

Saying bye to 2014 and welcoming in 2015

Today’s Guest Post by: Mohammed Attar, Director of Case Management & ECM Solutions

This time of year is always a great opportunity to reflect upon everything accomplished throughout the year, and to set goals and expectations for the upcoming year. I am very proud to say that IBM Case Manager and our team has accomplished very much, highlighted by a strong Case showing at IBM Insight 2014, extension of IBM’s 3 Year Lead (emphasizing strong case management capabilities) in Gartner’s ECM Magic Quadrant, and the release of IBM Case Manager 5.2.1. But, what I am most proud of is growing base of customers we have deploying Case Manager to solve both common and new business problems they are dealing with.

However, celebrations asides, we must remain vigilant as we enter the New Year. The IBM Case Manager team will continue to relentlessly innovate and provide the best case management solution in the market – a standard you can expect from IBM. Throughout the year, I have spoken to many case management customers and business partners and discussed how IBM Case Manager can help benefit their businesses and organizations. I assure you that we are listening to your feedback and 2015 promises to be an exciting, innovative year. We are constantly refining ICM and implementing new features to help drive better business outcomes. I have no doubt that 2015 will be another big year for Case.

Look out for my Part II entry in IBM Case Manager Shared Services series early next year. It is going to be an exciting entry that really highlights the value of ICM’s Shared Services capabilities to enterprises. In addition, look for my new upcoming blog series that highlights compelling customer use-cases and how IBM Case Manager improved their businesses.

Have a safe and happy holiday season!

Share your thoughts and let’s continue the conversation. Tweet to: @MAttarECM

Biography:

mattarMohammed Attar joined IBM in 2006 as part of the FileNet acquisition. Mohammed has over 15 years of experience in the ECM space, and is currently serving as Director of Case Management & ECM Solutions. Mohammed has extensive experience both in product development and management. Mohammed started his career as a Software Engineer focused Performance & Systems Analysis. He later spent time serving as a Product Manager over the IBM ECM Platform. In 2008, Mohammed led his first development team, and since then has continued to serve in a leadership capacity in the business. Mohammed was one of the original development managers responsible for the design, development, and delivery of IBM Case Manager. Mohammed holds a Bachelor of Science in Computer Science from California State University, Fullerton. You can follow him on Twitter @MAttarECM.

cmisblog

Did You Know? Unified Content Access is Possible with CMIS.

Today’s Guest Post by: Aliye Ergulen, ECM Portfolio Marketing Manager

Does it matter? To answer this question, I must ask myself: In my organization, am I creating content? Am I consuming content? Am I impacted by the content growth (whether structured or unstructured)? How many content sources do I have that I need to gain unified access independent from apps creating them?

Most of us accept that information is growing, and being stored, at an unprecedented rate. This information growth inevitably leaves organizations with several content siloes created. An abstraction layer on top of these content siloes is required to enable users and applications with unified access independent from content sources.

Content Management Interoperability Services (CMIS) is the abstraction layer. What SQL is for structured data, CMIS is for unstructured content. No matter what content solution you are using, CMIS enables unified access to distributed multi-vendor content solutions. CMIS is vendor agnostic and can help you incorporate content into line of business applications and user interfaces. You can then access this content from any engagement platform – mobile, social, desktop, and web leveraging onprem, cloud, or hybrid.

cmisblogTop 3 Reasons to use CMIS:

CMIS increases:

  1. your elasticity in developing and unifying content sitting in multi-vendor solutions; you can keep things in place or consolidate at your own pace;
  2. your agility to develop new innovative apps and create easy to use user experiences; and
  3. your pace to market.

Bonus: IBM Content Navigator and CMIS Integration

IBM Content Navigator comes with CMIS compatibility, which provides unified access to not only all IBM ECM (Enterprise Content Management) flagship content solutions but also to non-IBM content sources such as SharePoint. The mobile, web, cloud, and desktop app development capabilities of Content Navigator bring social and collaborative content creation, sharing, document management to the hands of mobile workers on the go, in turn enabling mobile workers to close more business as they interact with their clients. This will result in faster and better service, higher client satisfaction, more business, and thus, more money.

Check out our CMIS 4-minute overview video and blog post if you are interested in a deeper dive:

https://www.youtube.com/watch?v=-fqv2FREpCA

http://ibmecmblog.com/2014/09/16/early-access-to-our-next-generation-cmis-server-architecture/

Cool, yes?