SlideShare una empresa de Scribd logo
1 de 27
Romulo Lopez
&
Rainer Heufers

DATA MANAGEMENT AND OFFICE
COMMUNICATION
Biggest problem in today’s
office
 Too much information (TMI)
 Information overload (where do I start)
 Consumerization of resources everyone is
  their own IT.
 Connecting the dots
 Disperse knowledge (Information Silos)
Tools to communicate

 Email
 Social Networks
 Wiki’s
 Intranets
 Blogs
 Youtube
Tools to store information

 Paper
 Mainframes
 Servers and PC (Personal Computer)
 External disks (Laptops)
 SAS (Software as a Service)
 Cloud
Information storage paradigm
shift.
   Paper
   Mainframes - Dumb Terminals Not much can be done
   Personal computer revolution. Store everything on your PC
   Information Grows, use external storage
   Cloud storage
     Box
     Dropbox
     Sugar Sync
 PC is again a dumb or nearly dumb terminal, we use
  phones, tablets, readers, VDI (Virtual Desktop
  Infrastructure)
 Technology has gone from being centralized, to de-
  centralized to being a commodity like electricity or water.
Email Tools

 Exchange server, Outlook
 Hotmail, Yahoo, Gmail
 Offline email programs (for when you are not
  able to be online)
 Franklin Covey (Franklin Planner)
  Categorization
 Zero Inbox Philosophy
Other alternatives to email

 Social Networks
 Facebook private messages
 SMS and Twitter (hash tags)
 Google Hangouts
 Skype
 Comment tools in services like Box or Wiki or
  sites.
Document Collaboration

 Microsoft Office (SharePoint and now Office
    Live)
    http://www.microsoft.com/office/olsb/Splitte
    r-EN-US.html
   Google Docs https://docs.google.com
   Zoho Docs https://www.zoho.com/docs/
   Adobe PDF (you need full PDF version to use
    it)
   Wikia (from Wikipedia platform)
    ttp://www.wikia.com/Wikia
Document Collaboration
                 Less known but interesting
 Slide Share http://www.slideshare.net/
 Prezi http://prezi.com/explore/
 WebEx
 GoToMeeting (Atlas uses this)
Content Management systems
CMS
 Sharepoint
 Wordpress
 Typepad
 Blogger
 Wikis
 Microsoft Content Management Server
 Tumblr (Microblogging)
 Twitter (Microblogging)
Security

 Norton
 Microsoft Security Essentials
 Trust Apple security and genius like a
  Clapping seal!!
 If you are a geek use weird operating systems
  like Linux or friendly Ubuntu.
Security – Passwords

 Lastpass https://lastpass.com/
 Keypass http://keepass.info/
 Double Authentication
  http://support.google.com/accounts/bin/ans
  wer.py?hl=en&answer=180744
 Fingerprint reader on laptop?
 Random number generator
Security – Backups

 Mozy
 Carbonite
 Amazon Cloud S3, Amazon Cloud Player
 Box
 Dropbox
 Icloud (Apple, Itunes for Music)
 Google docs, Picasa Web (Pictures)
 You-tube
Security guidelines
 Keep sensitive information of the net.
 Spend time designing your security strategy.
 Use encryption whenever possible.
 Password protect your user when you turn your computer even
  after screensaver.
 Wipe used hard drives or destroy them with a construction
  hammer, before recycling computer. Darik's Boot And Nuke
 Beware of social engineering attacks.
  http://en.wikipedia.org/wiki/Social_engineering_%28security%2
  9
 Don’t be a fool. (If you fear someone finding your weird stuff,
  don’t even have it online).
  http://online.wsj.com/article/SB1000142405297020479530457722
  1164189123608.html (Why we tell all online)
Security tools
 Password manager
 Disk encryption in your computer, password protect your system
  (including after screensaver)
 Always use and enable https on email and other services.
 Avoid open Wifi, secure your home or office wifi.
 Use VPN if you need to use open wifi
       Hamachi https://secure.logmein.com/products/hamachi/download.aspx
   Change passwords frequently, specially after trips
   Check what IP’s are used to log on to your email, become familiar with
    your usual IP’s
   If you stop using an old account, visit it once a month and delete junk
    and change passwords. Forward emails to your main account.
   Register your cellphone with email in case you get locked out.
   Password protect your phone, have remote wipe procedures.
   Fill out security questions in case you get locked out.
Database

 CRM or ERP?
 Custom Made (might require to host server)
 Microsoft Access
 Salesforce (cloud)
Financial Software
The Mighty Might
 Quicken
 Mint
 Peachtree
 Quickbooks
Or the 800 pound Gorillas
 Raisers Edge
 Sage
 Microsoft Dynamics
 Sage ERP
Check this link:
http://www.techsoup.org/learningcenter/software/page5144.cfm
Voice and Video
communications
 Skype
 VoIP (Vonage.com, Google Voice)
 Google Hangouts
 WebEx
 GoToMeeting
 Cell phones- Smartphones
 PBX (does anyone uses this?)
Licenses

 Techsoup http://www.techsoup.org
 Microsoft
 Adobe
 Intuit.
 Pay as you go (pay by service) specially if you
  are in the cloud.
 Use open source
 www.ninite.com
A few principles before
choosing software, hardware
or tools.
   Consider it’s learning curve
   Network effects
   Lock in costs
   Don’t forget that software and hardware are tools not your main
    business reason.
   Outsource whenever possible
   Give crowdsourcing a chance.
   Rent don’t own
   SAAS prefer out of the box ready to work solutions, avoid servers
    or costly custom built solutions that depend on a developer or
    particular company.
Working trends
   Working from home.
   Working from your nearest coffee house.
   Using shared office spaces.
   Working on a different country or town
   Outsourcing
   Crowdsourcing
   Kony 2012, Invisible Children campaign
   Wikipedia
   Readers, how many of you try to sell your books?
   Usage of mobile devices, IPAD, Kindle
    http://www.inc.com/business-travel-2011/apps-that-make-
    your-ipad-work-like-a-laptop.html
Bonus tool to learn

    How to manage your crazy Inbox
         The Zero Inbox Tool
Zero Inbox Philosophy

 Works best when you can archive messages (not
  delete)
 Keep inbox clean only stuff that is current and
  not pending is kept, anything that has been
  already taken care has been archived.
 Newsletters and non important stuff is archived.
 Personal stuff is handled with Personal email.
  (keep your professional and your personal life
  separate).
 Unsubscribed from unwanted email or mark as
  Spam what is spam.
Zero Inbox Philosophy(cont.)

 Use search function to find emails.
 Enforce good subject lines, avoid hi, hello,
  just wondering, funny subject lines.
 Keep messages brief, avoid online discussion
  unless necessary
 Use email to keep track record.
 Avoid attachments, include relevant
  information in message.
How to Start Zero Inbox

 Spend long hours filtering stuff and deleting.
 Risk loosing important information
 Preferred option in Extreme cases


    Declare email bankruptcy.
Final recommendations

 Live a more automatic life
  http://blogs.hbr.org/schwartz/2012/03/why-you-
  need-to-make-your-life.html?cm_sp=blog_flyout-_-
  schwartz-_-why_you_need_to_make_your_life,
  internalize best practices, rehearse and repeat spend
  more time thinking about new stuff.
 Learn to learn and Read to just read. (use Blog
  readers-RSS, Google Reader, Facebook or Twitter to
  find material to read)
 Develop your own brand, keep your reputation, both
  offline and online.
 Small changes lead to big changes (Personal story)
Change is
possible

Más contenido relacionado

Destacado

Service Coordination Overview Brochure
Service Coordination Overview BrochureService Coordination Overview Brochure
Service Coordination Overview BrochureBarry Newlin
 
Sales invoice standard (1)
Sales invoice standard (1)Sales invoice standard (1)
Sales invoice standard (1)kiabras
 
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorAutomating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorDigicomp Academy AG
 
APC AHNLAB Antivirus
APC AHNLAB AntivirusAPC AHNLAB Antivirus
APC AHNLAB Antivirusdaten
 
16025_callsheet_080516
16025_callsheet_08051616025_callsheet_080516
16025_callsheet_080516Scott Williams
 
The Why, How and What of Measuring Content
The Why, How and What of Measuring ContentThe Why, How and What of Measuring Content
The Why, How and What of Measuring ContentLars von Sneidern
 
Hortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleHortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleFull Time
 
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Visibl Me
 
Módulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasMódulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasAlejandro Cruz Artunduaga
 
Documento pdm el almendro
Documento pdm el almendroDocumento pdm el almendro
Documento pdm el almendroCalandro Calado
 
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dataconomy Media
 

Destacado (20)

Anteceden..[1]
Anteceden..[1]Anteceden..[1]
Anteceden..[1]
 
Service Coordination Overview Brochure
Service Coordination Overview BrochureService Coordination Overview Brochure
Service Coordination Overview Brochure
 
Gamba Natural en Castilla y León Económica
Gamba Natural en Castilla y León EconómicaGamba Natural en Castilla y León Económica
Gamba Natural en Castilla y León Económica
 
Bexi xexy
Bexi xexyBexi xexy
Bexi xexy
 
Tema 3 ozuna
Tema 3 ozunaTema 3 ozuna
Tema 3 ozuna
 
Sales invoice standard (1)
Sales invoice standard (1)Sales invoice standard (1)
Sales invoice standard (1)
 
Ppsmito
PpsmitoPpsmito
Ppsmito
 
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and OrchestratorAutomating OSD and Post-OSD Configuration with Powershell and Orchestrator
Automating OSD and Post-OSD Configuration with Powershell and Orchestrator
 
Oferta especial biodental 2012
Oferta especial biodental   2012Oferta especial biodental   2012
Oferta especial biodental 2012
 
APC AHNLAB Antivirus
APC AHNLAB AntivirusAPC AHNLAB Antivirus
APC AHNLAB Antivirus
 
16025_callsheet_080516
16025_callsheet_08051616025_callsheet_080516
16025_callsheet_080516
 
The Why, How and What of Measuring Content
The Why, How and What of Measuring ContentThe Why, How and What of Measuring Content
The Why, How and What of Measuring Content
 
Hortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar VilleHortência e Bromélia Ville - Solar Ville
Hortência e Bromélia Ville - Solar Ville
 
3 double-take omega
3 double-take omega3 double-take omega
3 double-take omega
 
Cp ugm ucinf
Cp ugm ucinfCp ugm ucinf
Cp ugm ucinf
 
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2Ciclo de Identidad Online Personal - UP 2014 - Parte 2
Ciclo de Identidad Online Personal - UP 2014 - Parte 2
 
Módulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsasMódulo produccióndeplantasenviverosantalucíabsas
Módulo produccióndeplantasenviverosantalucíabsas
 
Tout écran, tous à cran?
Tout écran, tous à cran?Tout écran, tous à cran?
Tout écran, tous à cran?
 
Documento pdm el almendro
Documento pdm el almendroDocumento pdm el almendro
Documento pdm el almendro
 
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
Dr. Mihael Ankerst, Manager Customer Data Analytics at Allianz Deutschland - ...
 

Similar a Data management and office communication

OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" J T "Tom" Johnson
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Blogtalk 2008
 
Password management
Password managementPassword management
Password managementKaren F
 
Jisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationJisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationTransition Bristol
 
Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Andrea Vaccarella
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Creating a productive work environment
Creating a productive work environmentCreating a productive work environment
Creating a productive work environmentRachel Eichen
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012Highway T
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computingJan Wong
 
Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Mark Frydenberg
 

Similar a Data management and office communication (20)

Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption"
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008
 
Password management
Password managementPassword management
Password management
 
Jisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For EducationJisc Rscwm Nov.2008 Free Software For Education
Jisc Rscwm Nov.2008 Free Software For Education
 
Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013Useful website, apps, tools for studying and working. YOUNG 2013
Useful website, apps, tools for studying and working. YOUNG 2013
 
Wpd09 Sydney
Wpd09 SydneyWpd09 Sydney
Wpd09 Sydney
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Creating a productive work environment
Creating a productive work environmentCreating a productive work environment
Creating a productive work environment
 
Free and Low Cost Tools - Coldwater 10-09
Free and Low Cost Tools - Coldwater 10-09Free and Low Cost Tools - Coldwater 10-09
Free and Low Cost Tools - Coldwater 10-09
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Internet security
Internet securityInternet security
Internet security
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
MISO L003 network computing
MISO L003 network computingMISO L003 network computing
MISO L003 network computing
 
Bentley College Computing Resources 2008
Bentley College Computing Resources 2008Bentley College Computing Resources 2008
Bentley College Computing Resources 2008
 

Último

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Último (20)

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

Data management and office communication

  • 1. Romulo Lopez & Rainer Heufers DATA MANAGEMENT AND OFFICE COMMUNICATION
  • 2. Biggest problem in today’s office  Too much information (TMI)  Information overload (where do I start)  Consumerization of resources everyone is their own IT.  Connecting the dots  Disperse knowledge (Information Silos)
  • 3. Tools to communicate  Email  Social Networks  Wiki’s  Intranets  Blogs  Youtube
  • 4. Tools to store information  Paper  Mainframes  Servers and PC (Personal Computer)  External disks (Laptops)  SAS (Software as a Service)  Cloud
  • 5. Information storage paradigm shift.  Paper  Mainframes - Dumb Terminals Not much can be done  Personal computer revolution. Store everything on your PC  Information Grows, use external storage  Cloud storage  Box  Dropbox  Sugar Sync  PC is again a dumb or nearly dumb terminal, we use phones, tablets, readers, VDI (Virtual Desktop Infrastructure)  Technology has gone from being centralized, to de- centralized to being a commodity like electricity or water.
  • 6. Email Tools  Exchange server, Outlook  Hotmail, Yahoo, Gmail  Offline email programs (for when you are not able to be online)  Franklin Covey (Franklin Planner) Categorization  Zero Inbox Philosophy
  • 7. Other alternatives to email  Social Networks  Facebook private messages  SMS and Twitter (hash tags)  Google Hangouts  Skype  Comment tools in services like Box or Wiki or sites.
  • 8. Document Collaboration  Microsoft Office (SharePoint and now Office Live) http://www.microsoft.com/office/olsb/Splitte r-EN-US.html  Google Docs https://docs.google.com  Zoho Docs https://www.zoho.com/docs/  Adobe PDF (you need full PDF version to use it)  Wikia (from Wikipedia platform) ttp://www.wikia.com/Wikia
  • 9. Document Collaboration Less known but interesting  Slide Share http://www.slideshare.net/  Prezi http://prezi.com/explore/  WebEx  GoToMeeting (Atlas uses this)
  • 10. Content Management systems CMS  Sharepoint  Wordpress  Typepad  Blogger  Wikis  Microsoft Content Management Server  Tumblr (Microblogging)  Twitter (Microblogging)
  • 11. Security  Norton  Microsoft Security Essentials  Trust Apple security and genius like a Clapping seal!!  If you are a geek use weird operating systems like Linux or friendly Ubuntu.
  • 12. Security – Passwords  Lastpass https://lastpass.com/  Keypass http://keepass.info/  Double Authentication http://support.google.com/accounts/bin/ans wer.py?hl=en&answer=180744  Fingerprint reader on laptop?  Random number generator
  • 13. Security – Backups  Mozy  Carbonite  Amazon Cloud S3, Amazon Cloud Player  Box  Dropbox  Icloud (Apple, Itunes for Music)  Google docs, Picasa Web (Pictures)  You-tube
  • 14. Security guidelines  Keep sensitive information of the net.  Spend time designing your security strategy.  Use encryption whenever possible.  Password protect your user when you turn your computer even after screensaver.  Wipe used hard drives or destroy them with a construction hammer, before recycling computer. Darik's Boot And Nuke  Beware of social engineering attacks. http://en.wikipedia.org/wiki/Social_engineering_%28security%2 9  Don’t be a fool. (If you fear someone finding your weird stuff, don’t even have it online). http://online.wsj.com/article/SB1000142405297020479530457722 1164189123608.html (Why we tell all online)
  • 15. Security tools  Password manager  Disk encryption in your computer, password protect your system (including after screensaver)  Always use and enable https on email and other services.  Avoid open Wifi, secure your home or office wifi.  Use VPN if you need to use open wifi  Hamachi https://secure.logmein.com/products/hamachi/download.aspx  Change passwords frequently, specially after trips  Check what IP’s are used to log on to your email, become familiar with your usual IP’s  If you stop using an old account, visit it once a month and delete junk and change passwords. Forward emails to your main account.  Register your cellphone with email in case you get locked out.  Password protect your phone, have remote wipe procedures.  Fill out security questions in case you get locked out.
  • 16. Database  CRM or ERP?  Custom Made (might require to host server)  Microsoft Access  Salesforce (cloud)
  • 17. Financial Software The Mighty Might  Quicken  Mint  Peachtree  Quickbooks Or the 800 pound Gorillas  Raisers Edge  Sage  Microsoft Dynamics  Sage ERP Check this link: http://www.techsoup.org/learningcenter/software/page5144.cfm
  • 18. Voice and Video communications  Skype  VoIP (Vonage.com, Google Voice)  Google Hangouts  WebEx  GoToMeeting  Cell phones- Smartphones  PBX (does anyone uses this?)
  • 19. Licenses  Techsoup http://www.techsoup.org  Microsoft  Adobe  Intuit.  Pay as you go (pay by service) specially if you are in the cloud.  Use open source  www.ninite.com
  • 20. A few principles before choosing software, hardware or tools.  Consider it’s learning curve  Network effects  Lock in costs  Don’t forget that software and hardware are tools not your main business reason.  Outsource whenever possible  Give crowdsourcing a chance.  Rent don’t own  SAAS prefer out of the box ready to work solutions, avoid servers or costly custom built solutions that depend on a developer or particular company.
  • 21. Working trends  Working from home.  Working from your nearest coffee house.  Using shared office spaces.  Working on a different country or town  Outsourcing  Crowdsourcing  Kony 2012, Invisible Children campaign  Wikipedia  Readers, how many of you try to sell your books?  Usage of mobile devices, IPAD, Kindle http://www.inc.com/business-travel-2011/apps-that-make- your-ipad-work-like-a-laptop.html
  • 22. Bonus tool to learn How to manage your crazy Inbox The Zero Inbox Tool
  • 23. Zero Inbox Philosophy  Works best when you can archive messages (not delete)  Keep inbox clean only stuff that is current and not pending is kept, anything that has been already taken care has been archived.  Newsletters and non important stuff is archived.  Personal stuff is handled with Personal email. (keep your professional and your personal life separate).  Unsubscribed from unwanted email or mark as Spam what is spam.
  • 24. Zero Inbox Philosophy(cont.)  Use search function to find emails.  Enforce good subject lines, avoid hi, hello, just wondering, funny subject lines.  Keep messages brief, avoid online discussion unless necessary  Use email to keep track record.  Avoid attachments, include relevant information in message.
  • 25. How to Start Zero Inbox  Spend long hours filtering stuff and deleting.  Risk loosing important information  Preferred option in Extreme cases Declare email bankruptcy.
  • 26. Final recommendations  Live a more automatic life http://blogs.hbr.org/schwartz/2012/03/why-you- need-to-make-your-life.html?cm_sp=blog_flyout-_- schwartz-_-why_you_need_to_make_your_life, internalize best practices, rehearse and repeat spend more time thinking about new stuff.  Learn to learn and Read to just read. (use Blog readers-RSS, Google Reader, Facebook or Twitter to find material to read)  Develop your own brand, keep your reputation, both offline and online.  Small changes lead to big changes (Personal story)

Notas del editor

  1. Open discussion, some notes on board, have input from participants.
  2. Remember to discuss organization problems for email.
  3. Systems that allow you to manage your own websites
  4. Do you have any security at all? Are you a Mac user?
  5. Do you use password management strategies?Do you have problems accessing or remembering passwords?Do you save your passwords in the browser?
  6. What would happen if your computer is stolen or disappears on a fire where all your backups are gone?What would you do with your documents
  7. Best Password can be beaten by lack of common senseWhy is it that we have become so prone to share everything we do online. Isn’t this a security threat in your countries? Do you check your security settings in Facebook and twitter. Do you share your personal life to everyone?
  8. -Security can seem ridiculous, but it’s something that is necessary. -Yes there are bad guys out there.-Yes it can happen to you.-No matter what you do someone is going to fool you. Doesn’t means that we can’t or we shouldn’t prepare.-I can see with a easy to find wifi scanner what you are doing on an open wifi. Always encrypt, or learn how to encrypt your communications.-Best tool, if you need to share a password, pick up the phone and call your friend, also a great excuse to talk to people.-Use your memory (or a password manager) no small papers or notes in your corkboard.
  9. Do you get software licenses for your non-profit?Check your country distributors, they are looking for good community partnerships they give away software.
  10. Which technology is more likely to get support from peers(Vhs or Beta and you choose Beta)
  11. Biggest campaign or issue is done by some small guy with a camera and youtube. The power of new and revolutionary ideas that make your think tank irrelevant.
  12. Only if there is time.
  13. The more automatic we live the more time we have to think new problems
  14. Who knows me more than 2 years ago?