123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Enterprise Content Management Systems Cross Departmental And Functional Boundaries

Profile Picture
By Author: Manuel J. Montesino
Total Articles: 916
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

What is content? What does content management involve? And what is special about enterprise content management? This introductory article will seek to answer these questions.

In today's context, content means digital information. This information typically resides in text documents, audio or video files and other kinds of digital files. Digital information is easier to manage compared to paper-based information (even though it is vulnerable to its own special kinds of risks).

Content management involves managing the different stages in the lifecycle of content. The lifecycle stages of content are Creation, Updating, Publication, Translation, Archiving and Destruction.

Capturing data in an electronic form creates content. This could be through direct entry of relevant details at the time of a transaction or through transcription from original paper-based transaction documents into data entry forms.

In some cases, such as contracts, the paper documents are converted directly into a digital form through electronic scanning, and then made into an editable text-document with the help of Optical Character ...
... Recognition - OCR - technology.

The major management task in creation of content is ensuring that only authorized persons can do it, and they can do it in a convenient manner, with a minimum of cost to the organization.

Created information often needs to be edited or updated in the course of the business. This is the second lifecycle stage. Managing this stage involves restricting access and edit rights to authorized persons, and making the tasks of retrieval of the original document, its updating, and saving the updated version, convenient and easy.

The third stage of publication could mean different things. It could mean that supervisory persons review the suggested content and authorize it for final transfer to the content repository. It could also mean granting access rights to individuals and groups. Finally, it could mean making the content available to others (including the world at large).

The publication stage needs to be managed carefully to ensure that only properly authorized information is published, and published in an authorized manner.

Translation and localization might become necessary to make the content available to intended target groups. Managing this stage mainly involves finding competent persons to do the tasks of translation and localization.

When the content has been replaced by new content, or has become old or obsolete, it is archived and put beyond current access. Some information needs to be retained for specific periods, but might not be used for current operations. Such content is best archived.

When content is not needed either for operational use or for complying with legal requirements, destroying it is the best option. Clear policies need to be formulated regarding which content is archived/destroyed, and how the archiving/destruction process is carried out.

The brief description above defines content management. Content management was traditionally exercised at departmental or functional levels with the help of standalone software.

Enterprise content management crosses departmental and functional boundaries and seeks to manage all content generated by an enterprise--wherever it is generated. Modern large enterprises are global in their reach and operations, and content might be generated on the other side of the globe.

Modern enterprise content management systems provide access to this content for those who need it for decision support or other authorized purposes. Internet technologies are typically used for such enterprise-wide content management systems.

Separate articles will describe specific issues involved in enterprise content management systems.

Total Views: 262Word Count: 545See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: