Governance Gone! Wild!

While to some the acronym, ‘GGW’ might conjure up beautiful visions of fancy tour buses traveling the country capturing everything in sight on video for the whole world to see (as long as you pay the $9.99 per DVD, or opt for the $19.99 for full-DVD collection, or get their online subscription for $9.95 per month — or whatever it costs), I have just witnessed a different version of ‘GGW’ that is anything but beautiful.  In fact, ‘Governance Gone! Wild!’ is down-right scary!

I just attended several days of the Dreamforce 2012 conference in San Francisco and, as always, I was impressed with the innovation, which is clearly evident at these events.  I was impressed with the creativity of all the Software as a Service (SaaS) applications available built upon the Force.comheroku and/or other Salesforce platform services.  There were apps for this, and apps for that, and apps that work with other apps, and integrated apps.  In fact I’m on “app-overload” right now and tonight, instead of sweet sugar plums dancing through my head, I will most likely have a nightmare about all the possible lack of governance issues that are not being addressed in this quickly-evolving ‘cloud’ environment.  It’s truly like the Wild West!

This is not to say that these SaaS application vendors have overlooked governance issues completely.  In fact I suspect many of them take these items seriously and have built their respective solutions accordingly.  However, I can tell you what is an obvious generalization is the main pitch-points in these solutions is (1) easy user experience with a simple, familiar web-interface and (2) ability for organizations to self-manage or re-configure solutions without the need for costly professional services or software development.  These are not bad pitch-points in the least but what I must say is that conversations seem to rarely dig too much deeper than the surface of some point-and-click functionality and a demonstration or two.  I admire these vendors for their passion to solve very specific needs for enterprise customers and I’m invigorated with their energy to quickly have their Killer SaaS app deployed and being utilized by their customers to improve operational efficiency.

Yet, as I put myself in the shoes of the SaaS vendor the last thing I would want to do is possibly slow down the sales cycle by bringing up governance and organizational readiness topics such as policies, processes or people that wasn’t directly related to my particular technology.  These topics are somewhat related to the technology but it’s more about the organizational readiness by the customers themselves.  We must remember that these applications are promoting their solutions to enterprise organizations, not consumer.  Therefore, I would like to give one specific example of what caused my “Governance Gone!” nightmare.

 

Wild! 
As seen below in the photo below (not to the left), Salesforce.com introduced their new “marketing cloud”.  At the Dreamforce conference they setup an example of the ‘Dreamforce Social Media Command Center’.  They had a full-time agent at each of several work stations.  Each of these work stations was monitoring a different social media feed.  One each for Facebook, Chatter, Twitter, LinkedIn, YouTube and maybe even a few other social networks to provide an example of a Social Media Command Center and how this could be a reality within your particular organization.  As I saw this incredible activity of feeds, tweets, #hashtags, likes, posts and other real-time social interaction – this is where it really struck me about Governance (or lack thereof in this scenario).  It was Wild!

These are the types of things I was thinking to myself, not from a technology perspective itself, but rather ‘are these people considering the following types of items’ before going buck-wild to immediately implement this type of Command Center within their own organizations:

  • People:
    • Since these are mostly real-time conversations and, naturally, the business wants to represent themselves professionally, what type of special training will be required for this new type of social media command center operator?
  • Policy:
    • As we all know, social networks are filled with people that sometimes spew nasty, disgusting or plain hateful messages because they think they are completely anonymous to the world.  In these cases what is the organizations policy about any responses, deletion of messages or any other action?
  • Process:
    • With this gluttony of electronic information overload from such a wide ranging variety of sources, in different formats and with such a diverse contextually meaning, what is the process to accurately analyze the data?  After all, I would imagine that video-’gamers’ are quite active on these types of social networks and “rad”, “bad” or “bitchin’” don’t quite translate into the true meaning if you just consider the official dictionary definition of a word or phrase.

In summary, in our zeal to innovate and offer powerful, useful, as well as, truly remarkable technology, which is going to revolutionize the way we do business, we should not be in such a rush to not consider and overlook an organizations preparedness from a governance standpoint.  Great technology is not always good enough.  If your organization decides to not consider well-thought out governance plans then the “Governance Gone!  Wild!” bus may be paying you a visit sooner than expected!

Building an effective capture solution – Part 3 of 3 (Storage/Business Policy/Workflow)

Building an effective capture solution – Part 3 of 3 (Storage/Business Policy/Workflow)

 

The real value of capture is realized when the information extracted from images is used within a business process whether this information is used, for example, to kick-off an approval process for expense reports, or this information is a Social Security Number used to retrieve your medical records.  The ‘index values’, ‘metadata’, or ‘tags’ (whatever) you would like to call these extracted keywords help create the workflow that helps make processes more efficient.  After all, an image itself without recognized characters, numbers or words is useless to a computer for knowledge of what information is contained on the document.  It’s the information on the document that is of most importance, not just the image.

These days there are many great storage options for images and metadata captured but not all are created equal.  Below are a few considerations for storage as it directly relates to document capture.

Storage considerations for document capture applications:

  • Does your storage, and image viewer, support well known document formats such as TIFF, PDF, PJEG, DOC, XLS and others as well as emerging formats such as PDF/A or XML?  A universal viewer that supports a wide range of formats is preferable because you never know how requirements might change in the future.  Also, you might want to consider a viewer that allows for annotation, or markup, of images with items such as sticky notes, highlighting or shapes if your process requirements dictate these needs.
  • The capture process is all about extracting metadata from images so, therefore, does your storage provide a metadata framework in which you can store this information to enhance search and retrieval?  Basically this means does the storage provider offer a method to map captured index fields to database storage fields.
  • Security.  Of course security should be a major concern if your information is not intended for public consumption.  While it’s an important issue, in general, if you ensure three simple features of your solution then you will address 80% of potential problems:  (1) Secure disk-wiping of temporarily image files, (2) Encrypt data in motion and (3) Encrypt data at rest.  Of course these are not the only three items to consider but start with these and research other security techniques based on the sensitivity of your information.
supporting_file_formats supporting_metadata encryption

Now that we have covered two of three basic components of ‘Building an effective capture solution’ which included User Experience and Processing and having just outlined some Storage considerations, we should focus on the main theme of these posts and this is the point that ‘Capture begins with process‘.  In other words, and as I stated in the prelude to this series of blog posts, before considering all the technology and architectural options you should careful consider the business process or process workflow first.  Capture does not begin with a scan of a paper or picture of an image from a smart phone, it begins with process.

Below are a few considerations of business applications providers as it relates to document capture specifically:

Business rule considerations for capture:

      • Data Type constraints.  If the field is a ‘Date’ field then restrict the data in this field to only date values.  Or if the field is a ‘Social Security Number’ or ‘Phone Number’, then, naturally, allow only number instead of letters.  Conversely, if the field is a ‘Name’ field then the data type should only allow for letters instead of numbers.
      • One of the greatest ways to ensure business continuity, as well as reduce errors in your document capture solution, is to perform database validation.  In other words, when a particular piece of information, such as a Phone Number, is extracted from a document then a database lookup is executed to match that the Address field corresponds with the Phone Number field.  If it doesn’t, or there are multiple matches, then the capture workflow can automatically send the information to a validation station where a human will verify the correct data.  This helps to achieve the highest level of accuracy.
      • Handling exceptions is a critical, yet often overlooked part of the overall capture strategy.  We all hope our system works 100 percent perfect but this is just not reality for many reasons.  After all, there are a lot of moving parts in these types of solutions:  People, process, hardware, software, client, server, etc.  Be prepared, and actually expect the fact that ‘things’ will happen.  Try and define the possibilities.  For example, if you are automatically classifying documents, expect that the system will have unrecognized documents and be prepared to send those to an exception queue for manual classification.  Consequently this is also a great opportunity to ‘tune’ the system by adding a classification technique to recognize this document type in the future.  It’s an opportunity to create a process to improve the system accuracy over time from an activity that might have been perceived as a negative had exceptions not been considered.
data_type_constraints database_validation

Now that we have discussed some of the high-level concepts of building an effective capture solution, I invite you to dig a bit deeper into specifics of each area of interest to you.  We have many educational articles to supplement each of these three components of a solution including some of the following:

Building an effective capture solution:

Part 1 of 3 (User Experience/Device/Interface):  Network scanningmobilemultistream/color dropout
Part 2 of 3 (Capture/Processing/Transformation):  High resolution scanningforms processingAs a Service
Part 3 of 3 (Storage/Business Policy/Workflow):  SharePointcloud computingtaxonomies/metadata

Finally, if I could leave you with one bit of advice, or wisdom, from my industry experience is that in order to build a highly effective capture solution you should reverse-engineer the solution starting from the process and, ultimately, the choice of device and other considerations should be fairly obvious.  Not device to process.  Start by defining the process then build accordingly.  This will ensure the highest level of success, efficiency and high user adoption.

capture begins with process_arrow

capture begins with process_network

capture_processing_transformation_arrow_leftfacing