m-files

Customer Story | Meals on Wheels SA centralises IT to realise $50,000 cost saving

Customer Story | Meals on Wheels SA centralises IT to realise $50,000 cost saving

Meals on Wheels SA centralises its IT environment to better coordinate thousands of daily deliveries. Almost everyone has heard of Meals on Wheels. David explained that implementing an Intelligent Information Management System allowed his group to digitise their financial model, saving his business $50K per year while increasing efficiency and security.

ECM | 4 Reasons M-Files Is The Best ECM Tool Available

People are creatures of habit. They hate making changes. If they have a problem, they quickly get used to it and come up with the solution they need to keep going. Despite this, more companies switch to M-Files every day. Why? Because it is the best ECM tool on the market. But don’t just take our word for it.

M-Files 2018 – New Features and Enhancements Summary

william-iven-5893.jpg

Intelligent Metadata Layer

bIkzfoI

This is the latest enhancement from M-Files where it doesn’t matter where a document is stored or what system manages it, M-Files will provide easy access to it through their user interfaces and allow metadata to be edited and added. This is done with the aid of intelligence services that add a layer of artificial intelligence to M-Files.

Note that a license and setup is required (it doesn’t just happen out of the box)

IML External Connectors

Allows end users to use any M-Files interface to search, browse, edit, and add metadata to content located in repositories other than vaults by means of special vault applications known as connectors.

The image on the right shows install files stored in a file share being accessed via the M-Files interface. Video

CPfmsSS

5 Considerations For Choosing An Enterprise Content Management (ECM) System

mark-rabe-341219.jpg

Within the industry, it is known that when an organisation fails to research their needs for an ECM system that there is a good chance that the project will fail, or the resulting implementation will leave a lot to be desired.

Therefore, the most cost-effective step you can take when purchasing and implementing an ECM system is to not rush through the process of choosing your supplier. This is assuming that you have identified a need for an ECM system in the first place, and that your employees are invested in an ECM solution.

To ensure that your ECM implementation will be a success, here are five points that you should consider:

1. Requirements Gathering 

It is imperative to start with finding out what your needs are, and how they will be addressed by your potential ECM solutions. You must gather feedback from all areas of the business who will be using the system. As ECM is a huge product category, and ECM suppliers provide a very wide variety of products and product features, it is vital to define and understand what functionality is required before moving further.

2. Supplier Selection

It can take a considerable amount of time to research a supplier, the customers they have and whether they “fit” your company, but it must be done to give your ECM implementation the greatest chance of success. Important questions to ask every potential supplier should include:

  • What type of training and support do they provide?
  • What technology platform do they use and how scalable is it?
  • What do they know about your industry and potential problems within that industry?
  • Do they have success stories and testimonials from other clients?

3. Post-Implementation Support 

It is important that after installation and configuration, that post implementation support is available, and you know the cost for that support. Ensure that you feel comfortable with the technical staff who will be providing that support.

4. Flexible Deployment Options 

Many ECM systems can be run on-premise or in the cloud, with different methods of accessing each. In the future you may need to setup users with different configurations, to adjust to the needs of your business. This includes flexible licensing options, which may allow for greater customisation in the long run.

5. Integration with Third Party Applications 

It is important to ensure that your solution can be integrated with any third-party apps or data that you currently use. Miss out on this step and you may end up having to take more steps to accommodate for those apps, resulting in more work for users.

When choosing an Enterprise Content Management solution, ensure that you cover all the above points. There are other things to consider of course – as each organisation has different needs. Choosing a solution that doesn’t meet the needs of your organisation could be costly, so invest time and money in clearly defining your needs and selecting suitable partners.

To learn more about Electronic Content Management, don't hesitate to speak to one of our team members by contacting us below.

Are Your Business Processes a Target For Scammers?

andrew-neel-117763.jpg

Cyber criminals are tricking CEOs out of millions of dollars by exploiting their organisations poor business processes and fooling unsuspecting employees into transferring money. The growing trend, known as ‘CEO Whaling’, involves plain text e-mails being sent to employees’ responsible financial transactions, masquerading as their boss requesting them to urgently pay invoices. Those falling victim have no way to recover the money with insurance generally not covering international fraud.

These highly organised con artists are not just spamming companies at random, instead they’re using social media to research potential victims, taking advantage when they’re most vulnerable. For example they may identify through social media that the boss or the person responsible for financial transfers is on a holiday and that’s when they strike, sending an e-mail saying they’re about to get on a flight and need an invoice paid urgently. They use a fake e-mail address and include some personal details uncovered via social media to give the e-mail just enough validity to trick the employee into believing it needs to be done and that requesting confirmation will probably make their boss angry due to the delay caused by being on a flight and unable to respond.

facebook_20110509184953_640_480_20110929102731_640_480.jpg

Organisations with business processes that rely on an e-mail from the boss for financial approvals are at high risk of falling victim to this scam as the process doesn’t include any validation that the invoice hasn’t been modified or that the approval has come from the person with authority to approving it. Busy people find the use of e-mail in a process like this convenient as they can be sent at will from virtually anywhere, on any device, at any time, putting them at risk of being exploited. Processes that involve printing, stamping, signing and shuffling paper around for approval stall when the approver is not in the same location as the document. Allowing e-mails to be used in place of an actual signature on the document makes the process susceptible to scammers. This issue was recently reported on in The Advertiser, read that article here http://www.adelaidenow.com.au/technology/how-australian-bosses-are-being-tricked-out-of-millions-of-dollars-by-cyber-criminals/news-story/57318e06c02a8215b8d67d521a219aea.

The solution to avoid being tricked by the scammers is to implement a flexible solution like M-Files where the business process is migrated into the system with secure access provided via desktop, web and mobile app. M-Files stores a single electronic version of the invoice with security that restricts access to only the people involved. This avoids copies of the invoice being e-mailed, instead those involved all refer to the same version stored in M-Files. With the approval process managed via workflow, the approver is notified of an invoice to approve and is required to authenticate themselves to view and approve, which can be done quickly a simply via the mobile app using fingerprint authentication. The people responsible for payment are then notified and required to authenticate to access the approved invoice. M-Files keeps a detailed version history of every change the document goes through, so if the person responsible for payment wants validation that the boss approved the invoice for payment, they can review the documents history to confirm it was actually approved by the boss’s user account. The version history can be used to identify changes to the original document and can potentially identify fraud attempts where bank details for payment have been changed on an invoice. Aside from not falling victim to fraud, the benefits of keeping the records electronically rather than physically include incredibly fast retrieval of information and increased office space when you recycle the filing cabinets for scrap metal.

M-Files-Logo-Blue-High-Resolution.png

If you’re still using a manual process that involves printing, stamping, signing and shuffling paper around your organisation for approval that can be short circuited by e-mails, you are at risk of being scammed. If you think it won’t happen to you, think again as the Federal Government have been briefed on the severity of this trend because the losses are increasing into the millions. If you want to know more about how M-Files can help your business, please contact us.

Artificial Intelligence for a Repository Neutral ECM

helloquence-61189.jpg

Artificial Intelligence for a Repository Neutral ECM

On a recent trip to California I discovered how convenient instant access to information from Google Assistant on my Pixel phone was to help make decisions in a place I was completely unfamiliar with. While navigating to the next stop I could ask for ‘places to eat’, ‘gas stations’ or ‘tourist stops’ and have suggestions, from data scattered all over the web, presented in real-time in Google Maps. Imagine if your ECM could do the same and present information and search results from all the different systems and repositories in your organisation in one simple familiar interface.

For this to work the ECM would need a common interface that connects to your CRM , Accounting System, shared network drives, file syncing services like Dropbox and OneDrive, e-mails and SharePoint as well as some way of reading all the content in those repositories and intelligently storing metadata to allow you to search on it. Combine the ability to add your own metadata to those items while preserving the content from its original repository so it doesn’t stop its use in the original system and you would have a very user friendly, ‘Repository Neutral ECM’ where the context is more important than where something is stored.

The figure on the right provides an overview of the ‘Repository Neutral ECM’ architecture that M-Files will release later this year with a vision that ‘Context is King’

repos.png

The ‘Unified User Experience Layer’ is the ‘simple user interface’ that provides a single familiar user interface to interact with information regardless of the original repository. Think of it as Google Maps. This includes simple user access from any device including mobile apps for phones and tablets in addition to PCs. Just like Google Assistant’s ability to present outside information in Google Maps by simply asking, having a simple user interface means the user doesn’t need to learn other systems to be able to find relevant content in them and they can add their own metadata without stopping it from continuing to be used in the original system.

The ‘Multi—Repository Backend’ connects with the organisations repositories and systems via ‘connectors’ that include a set of core ‘out of the box’ connectors for repositories like network file shares, Office 365 and SharePoint, but also allow third-parties to develop connectors for other repositories and systems. This allows organisations to preserve legacy systems and avoid expensive integrations or migrations to new systems just to add functionality.

The ‘Intelligent Metadata Layer’ (IML) contains the intelligence components and multi-repository search along with the typical capabilities of an ECM such as search, dynamic views, workflow, security, version control and check-in/check-out. The intelligence components support automatic classification and metadata suggestions using text analytics. Like the Multi-Repository connectors, third-parties can add ‘metadata providers’ for specific industries or use cases. Along with text analytics, this layer includes machine learning to help improve suggestions based on user behaviour.

The power behind IML’s ‘Intelligence Components’ comes from the integration of Artificial Intelligence (AI) from Abbyy into M-Files. Abbyy produces Artificial Intelligence technologies based on textual content capture and OCR. This AI technology allows text to be understood and interpreted based on its content using algorithms that analyse the meaning of the words and the relationships between them. This allows accurate classification of complex and unstructured data in real time.

iml.png

It’s exciting to see this automatic classification and metadata tagging in action, drag and drop a document into M-Files and you’re presented with ‘tags’ or ‘suggestions’ that you can click on to populate the metadata fields. Similar to how Google Assistant effortlessly presents pins on Google Maps of suggestions from your request on ‘places to eat on my route’.

The ‘tags’ are based on the content of the document being passed through the Intelligence Services in IML and returning matches. If you don’t like the suggestion you can still select metadata as you would in the past and the AI learns from your behaviour. This technology will improve the efficiency and accuracy of data typically entered by humans as the suggestions help you make the right selection.

The benefits of IML don’t stop at metadata suggestions, there’s also the External Connectors to other repositories. We’ve all used Windows folder search and most likely found it painful at the best of times, especially if it’s a network share. This is where IML’s External Connectors can help, because the content is indexed by the ‘Connector’ you can use M-Files powerful search feature to quickly locate a file based on its content rather than where you think it might be stored. It’s lightning fast and allows you to add your own metadata to any object from any repository to help you manage your information better. Having a connector for every repository in your organisation is a powerful concept that is difficult to ignore.

ia.png

The Intelligent Metadata Layer allows organisations to have a true Repository Neutral ECM by providing Intelligent Services and External Connectors that present information from all the different systems and repositories in a single simple to use interface. It allows them to keep their legacy systems and avoid expensive integrations and migrations while providing simple efficient access. If you’d like to find out more on M-Files and how the Intelligent Metadata Layer can help your organisation, please contact us.

 Read my blog on 5 Things to Consider when Preparing for a Respository Neutral ECM.

5 Things to Consider When Preparing for a Repository Neutral ECM

aidan-hancock-338905.jpg

1. Business Requirements

Establish the business requirements as a clear goal for your project and speak to all the departments across all locations and facilities in the organisation to get an indication on how many employees need access. One of my early projects during business requirements discovery the number of employees needing access increased to 115 from an initial 15 and fortunately the architecture scaled easily for the multi-site distribution of employees.

1.jpg

Be very clear about what you are trying to solve with each requirement and ensure that each stakeholder has had a chance to provide their list of requirements. At a recent project, it became apparent one of the biggest issues a majority of employees were having was needing information locked in a system they had no access to. This led to either using inaccurate or out of date information, or using inefficient methods to access the information through someone with a license. Management hadn’t provided access because the licenses were considered expensive and weren’t aware of the impact the work around methods were having on the organisation.

Prioritise the requirements with your project team and base the order on importance, technical complexity, risk and cost to implement. At a project where we were asked to provide a solution to standardise the handling of proprietary formulas within an organisation, several steps leading up to the conception of these formulas needed to be in place prior to work starting on the actual formulas themselves.

2. Current Information Locations

Identify all existing locations where information is stored including documents in file shares and file syncing services like Dropbox and OneDrive, databases including financial, service & CRM information and portals. A quick way to get a concise list is to ask finance for details on the software subscriptions and maintenance they pay or have paid in the past.

Establish the current and annual volume increase as well as types of information stored e.g Proposals, Invoices, Drawings, Customer Service Tickets etc… Modern ECMs like M-Files utilise compression and binary delta algorithms to efficiently store versions of documents, so your annual volume increase for migrated repositories will be considerably less. The site admin at one of my projects stated that after moving to M-Files where the chance of duplication and multiple versions of files was essentially wiped out, they went from network share storage increasing by 1TB per year to the M-Files vault only increasing by 50GB per year.

2.jpg

Determine which of these repositories need to remain in operation and which could be migrated into your ECM and be retired. We usually migrate things like legacy access databases that perform simple tasks like providing unique identifiers (e.g. batch numbers) to the ECM so it then provides the batch number as part of a workflow. You may have situations where it’s critical to preserve a legacy repository like a customer portal that allows service tickets to be raised. Its content can still be made available in the ECM for search capabilities and other purposes while its original functionality is preserved.

3. Security Requirements

Review the current levels of security within each repository that that will be accessed via the ECM and map them to one of the scenarios in the table below. The credentials used to access the external repository will be determined by the type of access specified for the connection. As an example, providing public access to Supplier and Customer lists may be necessary for all users in the ECM as this information is useful as metadata for other objects, whereas you may want to limit access to project related data to only the people in the project team. We often provide ‘metadata-driven’ permissions on project based data by including ‘project team’ metadata with the project so security access can be easily managed by the client.

3.png

The scenarios to consider when providing access to a repository via an ECM can be split into several categories:

Public

A common authentication is used to connect to the external repository, the ECM then controls access to the content via its internal security e.g Public Network Share

Public with Varying Permissions

Users and groups in the ECM are mapped to users and groups in the external repository to control access to specific content e.g Network Share with ACL restrictions to certain groups

User-Specific

The external repository dictates access rights requiring the ECM users to log into the repository with their own credentials e.g. SharePoint

4. Hosting Requirements

Determine if the system will be hosted on-premise, in the cloud or a hybrid to enable planning for hardware, review of service agreements with cloud providers or both. We’ve found to avoid delay in starting projects, development can be done on cloud servers during the process of hardware procurement and deployment, and then transferred once the on-premise environment is ready. It’s also quick and very easy to change cloud server specs to increase performance if needed.

4.jpg

Use the current volume plus expected annual volume increase values (from step 2) to determine what sort of backend the ECM requires as well as to establish storage and backup requirements. M-Files recommend using the embedded database option (Firebird) up to 50,000 objects and Microsoft SQL Server once that has been exceeded. If using Microsoft SQL Server, you also have the option of storing the file data within the database or as separate files. There are pros and cons that I’ll go through in another blog.

Size the hardware based on the number of employees and volume of data to be stored (from step 2), use the business requirements (from step 1) to help. Identify how connection will be made to each external repository (local or cloud) so connectivity can be determined either directly or whether a VPN is required. Where connectivity is difficult, it may be feasible to maintain a local copy that’s refreshed periodically or use technology that provides these capabilities.

5. Access Requirements

Establish the landscape for how employees will access the ECM keeping in mind it will become the central point to reference the connected external repositories. Most ECMs support access through Windows Desktop clients, Web Access and Mobile clients. If the ECM will be available externally, securing access via SSL or VPN is critical. On most of our M-Files deployments, our clients not only want access to M-Files via their mobile phone, but also on their laptops from anywhere! We use their SSL certificate (required for mobile access) and setup what’s called ‘HTTP over RPC’ so their M-Files Desktop Client connects securely whenever an internet connection is present. If you want to know more about setting up HTTP over RPC for M-Files, contact us.

5.png

Some ECMs support replication strategies where servers can be hosted in multiple locations and cache or replicate from a central location to provide efficient access to information. We’ve delivered successful projects where M-Files outperformed SharePoint when deployed to a customer’s remote locations as ‘cache’ servers that connect back to the main M-Files server via hardware based VPNs over 3G links. Consideration needs to be given to the technologies available to help meet access requirements.

For more information on M-Files contact us

Clicky