BLOG
Customer Story | Meals on Wheels SA centralises IT to realise $50,000 cost saving
Meals on Wheels SA centralises its IT environment to better coordinate thousands of daily deliveries. Almost everyone has heard of Meals on Wheels. David explained that implementing an Intelligent Information Management System allowed his group to digitise their financial model, saving his business $50K per year while increasing efficiency and security.
Meals on Wheels SA centralises its IT environment to better coordinate thousands of daily deliveries
Almost everyone has heard of Meals on Wheels. It was first formed in South Australia (SA), in 1954. Founder Doris Taylor MBE, wheelchair-bound from an accident as a teen, empathised with the challenges of those returning home from the hospital. She noted, in the elderly in particular, that they had trouble shopping and preparing meals for themselves, often depriving them of the ability to live independently. Meals on Wheels was her remedy. Nearly seventy years on, more than 50 million meals have made their way into SA homes. The organisation is currently providing 4,300 meals per day to customers across the state.
Key Challenges
The state-wide operation included a vast degree of variation among branches
There was no single payments system and accounting was resource-intense
COVID-19 caused a surge in demand that could only be met by a centralised model
In every other Australian state, Meals on Wheels operates as several independent entities. However, Meals on Wheels SA is a state-wide association with 80 branches. Some were established under the state-wide model, while others were independent organisations incorporated into the association - the latter managed their own affairs, with committees, treasurers, bank accounts and chequebooks. Add to this that many pre-dated the internet, set up without the benefit of computerised systems, and you get an idea of the variation within the Meals on Wheels model.
Even so, it’s a model that has served the community well for 50 years. Testimony to its success is the tenure of its volunteers. Among seven thousand volunteers, the average age is 75. David Smith, Executive Manager, Corporate Services for Meal on Wheels, recalls the first time he attended an annual award ceremony recognising long term volunteers; “There were 40 people who had been volunteering for 40 years,” he says.
COVID-19 caused a surge in demand
When COVID-19 arrived in early 2020, hitting Australian businesses hard, Meals on Wheels wasn’t one of them. “Quite the opposite,” Smith says. A surge in demand for meal services presented the organisation with the challenge of meeting it with maximum efficiency.
Growing fast in a controlled way required digitising and automating financial processes. It also called for complete compliance with Work health and safety (WHS) standards which view volunteers as employees, governed by the same safety rules. This includes 75 to 90-year-old volunteers who'd never had to think about them before during their working lives. “They've always stood on a ladder on top of a table to change a light bulb, so why would they not do it now?” says Smith.
Finally, the model needed to flexibly accommodate digital and non-digital interaction. Any assumption that in time everyone will become comfortable with internet-based services doesn’t take into consideration the aging population. “Just because you are computer literate now, it doesn't mean that when you're 85 or 90 you're somehow going to be magically better. And so this market for people who are getting older, and some of their capacities have diminished, they're always going to need a meal delivered to their house,” says Smith.
Meals on Wheels SA contacted Advance Business Consulting to help them cut through these requirements to arrive at a system that would allow them to grow securely with a fraction of the effort while getting more from their technology and data.
The challenge of connecting everyone
Creating a common organisational infrastructure was a priority. But not every branch had a physical office to call their own, and a few smaller branches had been relying on their own computers to log into Meals on Wheels. Smith leaned on Advance’s consultancy services to design an infrastructure capable of accommodating what Smith refers to as the “lowest common denominator of what you need a computer to be.” In this way, it would be embraced by everyone, regardless of their circumstance.
Security was top of mind. “If you have to put a secure internet connection in a branch and a managed computer, and that computer is only going to be used for one hour, twice a week, it's quite a big investment for a very small use case. Also, you don't know who's going to be using it. It might be 20 different people in a branch,” says Smith, who looked to Advance to propose the most viable security strategy.
Opportunity to streamline payments processes
Digitising and automating payments within one simple payment system was identified as an excellent way to inject efficiency into operations. In the past, Central Office would invoice the branches for meals delivered, and reimburse costs incurred by them. If those costs had been incurred directly by Central Office and not the branch, which sometimes happened, another invoice would be issued for the money to be returned. A reconciliation was completed every three months on a simple electronic cash book, to check the accuracy and retrieve surplus funds advanced but not used. There was also an exercise of distributing funds from more profitable branches to those who needed “propping up” to ensure equity across the model. Accounting in this way took time and resources that Meals on Wheels decided it would prefer to apply to service excellence.
Solutions:
Advance standardised how branches connected to Central Office
World-class security was built in via VPN enabled teleworker devices
M-Files automated important processes like payments and reimbursements
One simple means of connecting
Advance migrated Meals on Wheels from Telstra 4g connections to a Cisco Meraki SD-WAN with Teleworker VPN, which has proven to be incredibly successful. Teleworker devices are not carrier dependent, for one thing, which supports the association’s need for flexible connectivity, as well as delivering world-class security. In this model, secure corporate LAN connectivity is extended to employees at remote sites via Meraki APs (access points), without needing them to install VPN software on their devices themselves. It can all be done centrally, keeping things simple.
Added security benefits are realised through Meals on Wheels’ ability to whitelist applications, making them unavailable to users on their devices, as well as best-in-class anti-virus software. This provides better protection from hackers. “Meals on Wheels is a very well-known name, which unfortunately makes us an obvious target for cybercrime,” says David.
A unified payment system
Improving the efficiency of the outgrown payment system began with eliminating the need for branches to pay their own invoices. “How do you get at branches to be able to effectively send invoices into Central Office if they want to send them by fax, which some still do?” says Smith. “But of course, that really just pushes the workload elsewhere.”
Advance suggested M-Files, a document management system for coordinating the right information to the right people at the right time. This immediately gave branches the ability to scan an invoice, sign to confirm goods had been received, and be paid automatically. Where branches don’t always have a reliable internet connection, M-Files helps with that too: “M-Files was great because we could actually fall back to a mobile phone to do the same thing,” says Smith. “And in a couple of cases we still do use the fax, but what it means is no longer needing branches to pay any bills”
Verifying and reimbursing drivers
Additionally, M-Files was set up to support driver reimbursement. Volunteers are paid a fee per delivery for their petrol and wear and tear. “They used to be paid in cash. The driver could take the money and if they didn't, it got flipped into a bucket and then banked as a donation,” says Smith. M-Files has automated the entire process with a workflow that lets Meals on Wheels collect a declaration from drivers with their bank account details for payment. Stored securely in M-Files, it can be centrally and accurately managed.
“We realised while we're doing this, it would be useful to check that the person we're paying a driver reimbursement to is actually a volunteer,” says Smith, explaining that people used to get roped in to be a deliverer and stay for 10 years when they're not actually on the books. If they're not registered, it means they haven't had a police check. “Right through this process, we found little added gains from simply just trying to improve a process,” Smith says.
Compliance is much easier
Driver verification is one aspect of compliance, but it’s not the only one to benefit from the new technology-enabled operational model. Meals on Wheels can now issue communications on things like Work health and safety rules to employees and volunteers with minimum effort and feel confident they have been received.
Outcomes:
Closing the branch bank accounts saves $50,000 per year
New employees can be onboarded, from anywhere, in moments
Centralised management of data drives compliance across 80 branches and 7000 volunteers
When you no longer need to pay for anything by cash or cheque, you don't need money. Meals on Wheels has been able to close all its bank accounts. This simple act is saving of $50,000 per year in bank fees and transaction costs.
Security concerns are alleviated through central controls configured by Advance that let Meals on Wheels whitelist applications and prevent people from running programs that are not supposed to.
The project, which began pre-pandemic, turned out to be well-timed since it allowed Meals on Wheels to rapidly transition to a work-from-home strategy during COVID-19 restrictions with the Meraki teleworking devices. “When our staff had to work from home, it was a trivial matter to give them a network device with a SIM card in and connect them and get them working. It was an accidental benefit that really set us in good stead.”
Since kicking off its transformation, Meals on Wheels SA has gone from strength to strength, most recently introducing a new ERP system, Pronto, for dealing with manufacturing, and other important resources, with efficiency, and creating a host of web applications using low-code development tool Intrexx, provided by Advance.
With the expansion of services no longer a heavy lift, the sky is the limit.
CONTACT US
For any further information regarding how Advance can help implement a successful digital process in your industry, get in touch with us here. We’re here to help!
KEY TECHNOLOGY PARTNERS
ECM | 4 Reasons M-Files Is The Best ECM Tool Available
People are creatures of habit. They hate making changes. If they have a problem, they quickly get used to it and come up with the solution they need to keep going. Despite this, more companies switch to M-Files every day. Why? Because it is the best ECM tool on the market. But don’t just take our word for it.
For a business to succeed, it needs to leverage the competitive advantages available to it.
That’s why your company needs the best ECM tool available on the market. When share this view with people at networking events or client meetings, they all have a similar response,
‘Our current ECM system is fine.’
You wouldn’t pay a premium for food that is just ‘fine’. You wouldn’t pay to see an entertainer where the reviews say they are ‘fine’.
So why would you settle for anything less than the best? Especially when there is a solution that is rich in functionality and competitively priced compared to its rivals?
Simple. We are more comfortable with the problems we know, rather than the solutions that the best can bring. Here’s why.
Why Businesses Stick With Bad Services
People are creatures of habit. They generally avoid making changes. If they have a problem, they get used to it and come up with a workaround they need to keep going.
Despite this, more companies switch to M-Files every day. Why? Because it is the best ECM tool on the market. But don’t just take our word for it.
Here are four reasons your company needs M-Files.
Industry analysts have also recognised the M-Files approach to intelligent information management, labelling it as “Visionary” in the Gartner 2017 Magic Quadrant for Content Services Platforms
4 Reasons M-Files Is The Best ECM Tool Available
What follows are the four integral things that set M-Files apart from the competition-no matter what your industry is.
Reason 1: M-Files Unifies Information
The biggest issue people face with ECM tools is they don’t unify the company’s information. They use outdated silos or overly complex storage systems that make it difficult to retrieve your documents when you need them.
M-Files does away with the gatekeepers traditional to ECM software, by unifying information across multiple platforms such as:
Documentum
Dropbox
Box
Microsoft Sharepoint
Open Text
Reason 2: M-Files Has A Growing Network Of Responsive Partners
At a glance, this seems to be beneficial for the people promoting M-Files (like us) and not the user
The opposite is true.
M-Files is the best ECM tool available. That means it attracts only the highest quality partners.
When you engage with M-Files, you get access to a growing global list of partners who can help you integrate M-Files strategically to rapidly scale your business.
Reason 3: Seamless Integration With Microsoft Products
M-Files was smart. They recognised the business world’s dependency on Microsoft and developed an ECM software that integrated easily with it. M-FIles integrated with Microsoft Office, Microsoft SharePoint and even Microsoft Dynamics CRM.
Manage your Microsoft Office documents effectively – without changing the way you work.
Make Microsoft SharePoint even better.
Manage customers and their documents – No complex setups for Microsoft Dynamics CRM
That means you can quickly and easily add M-Files to your business without having to do complicated work arounds, bringing on extra IT staff, or wasting dozens of hours training your team to get started.
This is doubly important when using M-Files’ graphical workflow editor. You can easily and instantly set up different manual processes for office workflow-without having to learn convoluted systems!
Workflows facilitate routine tasks of the organisation, such as processing purchase invoices.
Reason 4: Adaptable Pricing Models Fit To Your Needs
Value and price aren’t the same thing-any good business knows that.
However, one thing M-Files recognised right away was that the blanket pricing model of traditional ECMs didn’t reflect the value of the price a company paid.
That is why M-Files has licensing options both for companies and offices that let you decide the level of engagement you need.
This is key. By opening access this way, M-Files makes sure you only pay for the value you need without trapping you in an overly large contract where you only use 10% of the services you pay for!
Talk With An M-Files Expert And Discover How To Rapidly Scale Your Business
M-Files is the best ECM tool available on the market. If you aren’t familiar with how our system works, or how your company can use ECM software's to rapidly scale your business, let’s talk.
Use the link below to schedule a quick call with one of our in-house experts. We can handle your questions, review your business, and outline how you can grow your business with M-Files.
M-Files 2018 – New Features and Enhancements Summary
Intelligent Metadata Layer
This is the latest enhancement from M-Files where it doesn’t matter where a document is stored or what system manages it, M-Files will provide easy access to it through their user interfaces and allow metadata to be edited and added. This is done with the aid of intelligence services that add a layer of artificial intelligence to M-Files.
Note that a license and setup is required (it doesn’t just happen out of the box)
IML External Connectors
Allows end users to use any M-Files interface to search, browse, edit, and add metadata to content located in repositories other than vaults by means of special vault applications known as connectors.
The image on the right shows install files stored in a file share being accessed via the M-Files interface. Video
5 Considerations For Choosing An Enterprise Content Management (ECM) System
Within the industry, it is known that when an organisation fails to research their needs for an ECM system that there is a good chance that the project will fail, or the resulting implementation will leave a lot to be desired.
Therefore, the most cost-effective step you can take when purchasing and implementing an ECM system is to not rush through the process of choosing your supplier. This is assuming that you have identified a need for an ECM system in the first place, and that your employees are invested in an ECM solution.
To ensure that your ECM implementation will be a success, here are five points that you should consider:
1. Requirements Gathering
It is imperative to start with finding out what your needs are, and how they will be addressed by your potential ECM solutions. You must gather feedback from all areas of the business who will be using the system. As ECM is a huge product category, and ECM suppliers provide a very wide variety of products and product features, it is vital to define and understand what functionality is required before moving further.
2. Supplier Selection
It can take a considerable amount of time to research a supplier, the customers they have and whether they “fit” your company, but it must be done to give your ECM implementation the greatest chance of success. Important questions to ask every potential supplier should include:
- What type of training and support do they provide?
- What technology platform do they use and how scalable is it?
- What do they know about your industry and potential problems within that industry?
- Do they have success stories and testimonials from other clients?
3. Post-Implementation Support
It is important that after installation and configuration, that post implementation support is available, and you know the cost for that support. Ensure that you feel comfortable with the technical staff who will be providing that support.
4. Flexible Deployment Options
Many ECM systems can be run on-premise or in the cloud, with different methods of accessing each. In the future you may need to setup users with different configurations, to adjust to the needs of your business. This includes flexible licensing options, which may allow for greater customisation in the long run.
5. Integration with Third Party Applications
It is important to ensure that your solution can be integrated with any third-party apps or data that you currently use. Miss out on this step and you may end up having to take more steps to accommodate for those apps, resulting in more work for users.
When choosing an Enterprise Content Management solution, ensure that you cover all the above points. There are other things to consider of course – as each organisation has different needs. Choosing a solution that doesn’t meet the needs of your organisation could be costly, so invest time and money in clearly defining your needs and selecting suitable partners.
To learn more about Electronic Content Management, don't hesitate to speak to one of our team members by contacting us below.
Are Your Business Processes a Target For Scammers?
Cyber criminals are tricking CEOs out of millions of dollars by exploiting their organisations poor business processes and fooling unsuspecting employees into transferring money. The growing trend, known as ‘CEO Whaling’, involves plain text e-mails being sent to employees’ responsible financial transactions, masquerading as their boss requesting them to urgently pay invoices. Those falling victim have no way to recover the money with insurance generally not covering international fraud.
These highly organised con artists are not just spamming companies at random, instead they’re using social media to research potential victims, taking advantage when they’re most vulnerable. For example they may identify through social media that the boss or the person responsible for financial transfers is on a holiday and that’s when they strike, sending an e-mail saying they’re about to get on a flight and need an invoice paid urgently. They use a fake e-mail address and include some personal details uncovered via social media to give the e-mail just enough validity to trick the employee into believing it needs to be done and that requesting confirmation will probably make their boss angry due to the delay caused by being on a flight and unable to respond.
Organisations with business processes that rely on an e-mail from the boss for financial approvals are at high risk of falling victim to this scam as the process doesn’t include any validation that the invoice hasn’t been modified or that the approval has come from the person with authority to approving it. Busy people find the use of e-mail in a process like this convenient as they can be sent at will from virtually anywhere, on any device, at any time, putting them at risk of being exploited. Processes that involve printing, stamping, signing and shuffling paper around for approval stall when the approver is not in the same location as the document. Allowing e-mails to be used in place of an actual signature on the document makes the process susceptible to scammers. This issue was recently reported on in The Advertiser, read that article here http://www.adelaidenow.com.au/technology/how-australian-bosses-are-being-tricked-out-of-millions-of-dollars-by-cyber-criminals/news-story/57318e06c02a8215b8d67d521a219aea.
The solution to avoid being tricked by the scammers is to implement a flexible solution like M-Files where the business process is migrated into the system with secure access provided via desktop, web and mobile app. M-Files stores a single electronic version of the invoice with security that restricts access to only the people involved. This avoids copies of the invoice being e-mailed, instead those involved all refer to the same version stored in M-Files. With the approval process managed via workflow, the approver is notified of an invoice to approve and is required to authenticate themselves to view and approve, which can be done quickly a simply via the mobile app using fingerprint authentication. The people responsible for payment are then notified and required to authenticate to access the approved invoice. M-Files keeps a detailed version history of every change the document goes through, so if the person responsible for payment wants validation that the boss approved the invoice for payment, they can review the documents history to confirm it was actually approved by the boss’s user account. The version history can be used to identify changes to the original document and can potentially identify fraud attempts where bank details for payment have been changed on an invoice. Aside from not falling victim to fraud, the benefits of keeping the records electronically rather than physically include incredibly fast retrieval of information and increased office space when you recycle the filing cabinets for scrap metal.
If you’re still using a manual process that involves printing, stamping, signing and shuffling paper around your organisation for approval that can be short circuited by e-mails, you are at risk of being scammed. If you think it won’t happen to you, think again as the Federal Government have been briefed on the severity of this trend because the losses are increasing into the millions. If you want to know more about how M-Files can help your business, please contact us.
M-Files Artificial Intelligence now makes Metadata Suggestions
M-File’s next release will include some powerful artificial intelligence services to help end users with metadata suggestions.
I mentioned in another article that the power behind IML’s ‘Intelligence Components’ comes from the integration of Abbyy’s Artificial Intelligence (AI) technologies into M-Files. Based on textual content capture and OCR these AI technologies interpret text using algorithms that analyse the meaning of the words and the relationships between them allowing real time classification of complex and unstructured data.
Even though it sounds complex, it couldn’t be simpler for the end user. Drag a document into the vault and you’re presented with ‘tags’ or ‘suggestions’ that you can click on to populate the metadata fields. The ‘tags’ are based on information in the document that matches metadata already in the vault. For example, your vault may have a list of suppliers stored as metadata to use when adding invoices. When AI reads the invoice, because it matches the supplier name with the one stored as metadata in your vault, a tag is created as a suggestion for you. All you need to do is click on it to add it as metadata, much faster, easier and more accurate than clicking in the field and typing the name to select it.
It doesn’t stop there either; AI based metadata tags can be invoked on existing documents when a property is changed. This is especially useful for business processes where metadata is added or changed along the way in a workflow. Going back to our invoice example, the initial metadata suggested when added didn’t include a description as this is to be populated by the person approving it.
If you want to know more about how to setup M-Files Intelligence Service to make suggestions when adding documents or when a property is changed, please contact us.
Artificial Intelligence for a Repository Neutral ECM
Artificial Intelligence for a Repository Neutral ECM
On a recent trip to California I discovered how convenient instant access to information from Google Assistant on my Pixel phone was to help make decisions in a place I was completely unfamiliar with. While navigating to the next stop I could ask for ‘places to eat’, ‘gas stations’ or ‘tourist stops’ and have suggestions, from data scattered all over the web, presented in real-time in Google Maps. Imagine if your ECM could do the same and present information and search results from all the different systems and repositories in your organisation in one simple familiar interface.
For this to work the ECM would need a common interface that connects to your CRM , Accounting System, shared network drives, file syncing services like Dropbox and OneDrive, e-mails and SharePoint as well as some way of reading all the content in those repositories and intelligently storing metadata to allow you to search on it. Combine the ability to add your own metadata to those items while preserving the content from its original repository so it doesn’t stop its use in the original system and you would have a very user friendly, ‘Repository Neutral ECM’ where the context is more important than where something is stored.
The figure on the right provides an overview of the ‘Repository Neutral ECM’ architecture that M-Files will release later this year with a vision that ‘Context is King’
The ‘Unified User Experience Layer’ is the ‘simple user interface’ that provides a single familiar user interface to interact with information regardless of the original repository. Think of it as Google Maps. This includes simple user access from any device including mobile apps for phones and tablets in addition to PCs. Just like Google Assistant’s ability to present outside information in Google Maps by simply asking, having a simple user interface means the user doesn’t need to learn other systems to be able to find relevant content in them and they can add their own metadata without stopping it from continuing to be used in the original system.
The ‘Multi—Repository Backend’ connects with the organisations repositories and systems via ‘connectors’ that include a set of core ‘out of the box’ connectors for repositories like network file shares, Office 365 and SharePoint, but also allow third-parties to develop connectors for other repositories and systems. This allows organisations to preserve legacy systems and avoid expensive integrations or migrations to new systems just to add functionality.
The ‘Intelligent Metadata Layer’ (IML) contains the intelligence components and multi-repository search along with the typical capabilities of an ECM such as search, dynamic views, workflow, security, version control and check-in/check-out. The intelligence components support automatic classification and metadata suggestions using text analytics. Like the Multi-Repository connectors, third-parties can add ‘metadata providers’ for specific industries or use cases. Along with text analytics, this layer includes machine learning to help improve suggestions based on user behaviour.
The power behind IML’s ‘Intelligence Components’ comes from the integration of Artificial Intelligence (AI) from Abbyy into M-Files. Abbyy produces Artificial Intelligence technologies based on textual content capture and OCR. This AI technology allows text to be understood and interpreted based on its content using algorithms that analyse the meaning of the words and the relationships between them. This allows accurate classification of complex and unstructured data in real time.
It’s exciting to see this automatic classification and metadata tagging in action, drag and drop a document into M-Files and you’re presented with ‘tags’ or ‘suggestions’ that you can click on to populate the metadata fields. Similar to how Google Assistant effortlessly presents pins on Google Maps of suggestions from your request on ‘places to eat on my route’.
The ‘tags’ are based on the content of the document being passed through the Intelligence Services in IML and returning matches. If you don’t like the suggestion you can still select metadata as you would in the past and the AI learns from your behaviour. This technology will improve the efficiency and accuracy of data typically entered by humans as the suggestions help you make the right selection.
The benefits of IML don’t stop at metadata suggestions, there’s also the External Connectors to other repositories. We’ve all used Windows folder search and most likely found it painful at the best of times, especially if it’s a network share. This is where IML’s External Connectors can help, because the content is indexed by the ‘Connector’ you can use M-Files powerful search feature to quickly locate a file based on its content rather than where you think it might be stored. It’s lightning fast and allows you to add your own metadata to any object from any repository to help you manage your information better. Having a connector for every repository in your organisation is a powerful concept that is difficult to ignore.
The Intelligent Metadata Layer allows organisations to have a true Repository Neutral ECM by providing Intelligent Services and External Connectors that present information from all the different systems and repositories in a single simple to use interface. It allows them to keep their legacy systems and avoid expensive integrations and migrations while providing simple efficient access. If you’d like to find out more on M-Files and how the Intelligent Metadata Layer can help your organisation, please contact us.
Read my blog on 5 Things to Consider when Preparing for a Respository Neutral ECM.
5 Things to Consider When Preparing for a Repository Neutral ECM
1. Business Requirements
Establish the business requirements as a clear goal for your project and speak to all the departments across all locations and facilities in the organisation to get an indication on how many employees need access. One of my early projects during business requirements discovery the number of employees needing access increased to 115 from an initial 15 and fortunately the architecture scaled easily for the multi-site distribution of employees.
Be very clear about what you are trying to solve with each requirement and ensure that each stakeholder has had a chance to provide their list of requirements. At a recent project, it became apparent one of the biggest issues a majority of employees were having was needing information locked in a system they had no access to. This led to either using inaccurate or out of date information, or using inefficient methods to access the information through someone with a license. Management hadn’t provided access because the licenses were considered expensive and weren’t aware of the impact the work around methods were having on the organisation.
Prioritise the requirements with your project team and base the order on importance, technical complexity, risk and cost to implement. At a project where we were asked to provide a solution to standardise the handling of proprietary formulas within an organisation, several steps leading up to the conception of these formulas needed to be in place prior to work starting on the actual formulas themselves.
2. Current Information Locations
Identify all existing locations where information is stored including documents in file shares and file syncing services like Dropbox and OneDrive, databases including financial, service & CRM information and portals. A quick way to get a concise list is to ask finance for details on the software subscriptions and maintenance they pay or have paid in the past.
Establish the current and annual volume increase as well as types of information stored e.g Proposals, Invoices, Drawings, Customer Service Tickets etc… Modern ECMs like M-Files utilise compression and binary delta algorithms to efficiently store versions of documents, so your annual volume increase for migrated repositories will be considerably less. The site admin at one of my projects stated that after moving to M-Files where the chance of duplication and multiple versions of files was essentially wiped out, they went from network share storage increasing by 1TB per year to the M-Files vault only increasing by 50GB per year.
Determine which of these repositories need to remain in operation and which could be migrated into your ECM and be retired. We usually migrate things like legacy access databases that perform simple tasks like providing unique identifiers (e.g. batch numbers) to the ECM so it then provides the batch number as part of a workflow. You may have situations where it’s critical to preserve a legacy repository like a customer portal that allows service tickets to be raised. Its content can still be made available in the ECM for search capabilities and other purposes while its original functionality is preserved.
3. Security Requirements
Review the current levels of security within each repository that that will be accessed via the ECM and map them to one of the scenarios in the table below. The credentials used to access the external repository will be determined by the type of access specified for the connection. As an example, providing public access to Supplier and Customer lists may be necessary for all users in the ECM as this information is useful as metadata for other objects, whereas you may want to limit access to project related data to only the people in the project team. We often provide ‘metadata-driven’ permissions on project based data by including ‘project team’ metadata with the project so security access can be easily managed by the client.
The scenarios to consider when providing access to a repository via an ECM can be split into several categories:
Public
A common authentication is used to connect to the external repository, the ECM then controls access to the content via its internal security e.g Public Network Share
Public with Varying Permissions
Users and groups in the ECM are mapped to users and groups in the external repository to control access to specific content e.g Network Share with ACL restrictions to certain groups
User-Specific
The external repository dictates access rights requiring the ECM users to log into the repository with their own credentials e.g. SharePoint
4. Hosting Requirements
Determine if the system will be hosted on-premise, in the cloud or a hybrid to enable planning for hardware, review of service agreements with cloud providers or both. We’ve found to avoid delay in starting projects, development can be done on cloud servers during the process of hardware procurement and deployment, and then transferred once the on-premise environment is ready. It’s also quick and very easy to change cloud server specs to increase performance if needed.
Use the current volume plus expected annual volume increase values (from step 2) to determine what sort of backend the ECM requires as well as to establish storage and backup requirements. M-Files recommend using the embedded database option (Firebird) up to 50,000 objects and Microsoft SQL Server once that has been exceeded. If using Microsoft SQL Server, you also have the option of storing the file data within the database or as separate files. There are pros and cons that I’ll go through in another blog.
Size the hardware based on the number of employees and volume of data to be stored (from step 2), use the business requirements (from step 1) to help. Identify how connection will be made to each external repository (local or cloud) so connectivity can be determined either directly or whether a VPN is required. Where connectivity is difficult, it may be feasible to maintain a local copy that’s refreshed periodically or use technology that provides these capabilities.
5. Access Requirements
Establish the landscape for how employees will access the ECM keeping in mind it will become the central point to reference the connected external repositories. Most ECMs support access through Windows Desktop clients, Web Access and Mobile clients. If the ECM will be available externally, securing access via SSL or VPN is critical. On most of our M-Files deployments, our clients not only want access to M-Files via their mobile phone, but also on their laptops from anywhere! We use their SSL certificate (required for mobile access) and setup what’s called ‘HTTP over RPC’ so their M-Files Desktop Client connects securely whenever an internet connection is present. If you want to know more about setting up HTTP over RPC for M-Files, contact us.
Some ECMs support replication strategies where servers can be hosted in multiple locations and cache or replicate from a central location to provide efficient access to information. We’ve delivered successful projects where M-Files outperformed SharePoint when deployed to a customer’s remote locations as ‘cache’ servers that connect back to the main M-Files server via hardware based VPNs over 3G links. Consideration needs to be given to the technologies available to help meet access requirements.
For more information on M-Files contact us