SlideShare ist ein Scribd-Unternehmen logo
1 von 12
ECM Project Management Basics David Champeau IBM FileNet Certified Professional AIIM ECM Master AIIM BPM Pracitioner AIIM IOA Practioner
ECM Projects Start with one or more basic methodologies depending on the size and scope of the project Zachman Frameworks MIKE2 PMBOK
Sequence of ECM Projects
Project Infrastructure Stakeholders Communications Plan Resource Plan Geography Priorities Artifact Management
Dual Tracks Information Architecture Governance Taxonomy Business Processes Records Security Technology Architecture Infrastructure Operations Integration
Architectures Application Infrastructure Network ECM Platform Business Data Operations Support Geography
Situational Analysis This will determine the next steps New ECM program Start from the beginning Leave room for lots and lots of planning New project in existing program Same style as other tactical projects or Something new What does it add Impact on infrastructure
Eating an Elephant Organize the project into the high-level categories or tracks Break each down multiple times Get to manageable pieces Determine dependencies Begin to see the timeline Gauge level of effort Use one of numerous algorithms
Undersell, Overdeliver If this is all new, start small Use prototypes for testing the integration points automating business processes experimenting with user interfaces
Plan and Plan Again Whiteboards help flush out ideas, identify the tough spots Planning does not have to lead into analysis paralysis Each project needs someone to drive it forward This is often overlooked Someone has to understand how all the pieces fit together
Keep the Solution Simple Do not “code for the exception”, “code for the rule” Keep it at 80-20 Dump the exceptions to the side and let someone manually sort them out This is a project killer
Keep the Solution Simple Try to use out-of-the-box Lots of good stuff coming OOTB these days Integration points require customization Sell the users on “simple first” Most requirements delivered are rarely or never used

Weitere ähnliche Inhalte

Was ist angesagt?

Workday overview sigmora
Workday overview sigmoraWorkday overview sigmora
Workday overview sigmora
bgadicha
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omaha
kmansour
 
Short reference architecture
Short reference architectureShort reference architecture
Short reference architecture
Steve Feldman
 
SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides
WSO2
 
Application Rationalization
Application RationalizationApplication Rationalization
Application Rationalization
Carolyn Reid
 

Was ist angesagt? (20)

Business Process Design
Business Process DesignBusiness Process Design
Business Process Design
 
ERP And Enterprise Architecture
ERP And Enterprise ArchitectureERP And Enterprise Architecture
ERP And Enterprise Architecture
 
Vidya dharan presentation
Vidya dharan presentationVidya dharan presentation
Vidya dharan presentation
 
Ronald Schmelzer Keynote Address
Ronald Schmelzer Keynote AddressRonald Schmelzer Keynote Address
Ronald Schmelzer Keynote Address
 
Designing a to be process
Designing a to be processDesigning a to be process
Designing a to be process
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Workday overview sigmora
Workday overview sigmoraWorkday overview sigmora
Workday overview sigmora
 
Ea As Strategy Ver1 0
Ea As Strategy Ver1 0Ea As Strategy Ver1 0
Ea As Strategy Ver1 0
 
Transaction processing hub
Transaction processing hubTransaction processing hub
Transaction processing hub
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omaha
 
Managing Your IT Portfolio
Managing Your IT PortfolioManaging Your IT Portfolio
Managing Your IT Portfolio
 
Short reference architecture
Short reference architectureShort reference architecture
Short reference architecture
 
The Rapid Tools 360o value proposition
The Rapid Tools 360o value propositionThe Rapid Tools 360o value proposition
The Rapid Tools 360o value proposition
 
Transform Software Delivery to Address Market Complexity and Change
Transform Software Delivery to Address Market Complexity and ChangeTransform Software Delivery to Address Market Complexity and Change
Transform Software Delivery to Address Market Complexity and Change
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
 
Ess executive support system
Ess executive support systemEss executive support system
Ess executive support system
 
SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides
 
Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)Practical Cloud - Stephen Betts (Avanade)
Practical Cloud - Stephen Betts (Avanade)
 
Bpm
BpmBpm
Bpm
 
Application Rationalization
Application RationalizationApplication Rationalization
Application Rationalization
 

Ähnlich wie ECM Project Management Basics

Software Rollout
Software RolloutSoftware Rollout
Software Rollout
colmbennett
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
clarkems
 

Ähnlich wie ECM Project Management Basics (20)

How Should We Estimate Agile Software Development Projects and What Data Do W...
How Should We Estimate Agile Software Development Projects and What Data Do W...How Should We Estimate Agile Software Development Projects and What Data Do W...
How Should We Estimate Agile Software Development Projects and What Data Do W...
 
What Do You Do When Agile Is Too Slow?
What Do You Do When Agile Is Too Slow?What Do You Do When Agile Is Too Slow?
What Do You Do When Agile Is Too Slow?
 
IT Modernization For Process Modernization
IT Modernization For Process ModernizationIT Modernization For Process Modernization
IT Modernization For Process Modernization
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Carasik BPM ECM
Carasik BPM ECMCarasik BPM ECM
Carasik BPM ECM
 
Software engineering project(srs)!!
Software engineering project(srs)!!Software engineering project(srs)!!
Software engineering project(srs)!!
 
Software Rollout
Software RolloutSoftware Rollout
Software Rollout
 
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber SecurityAFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
AFITC 2018 - Using Process Maturity and Agile to Strengthen Cyber Security
 
Lecture5
Lecture5Lecture5
Lecture5
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
 
21UCAE52 Software Project Management.ppt
21UCAE52 Software Project Management.ppt21UCAE52 Software Project Management.ppt
21UCAE52 Software Project Management.ppt
 
Andy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutionsAndy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutions
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx
 
Slides chapter 3
Slides chapter 3Slides chapter 3
Slides chapter 3
 
Slides chapter 3
Slides chapter 3Slides chapter 3
Slides chapter 3
 
Pete Marshall - casmadrid2015 - Continuous Delivery in Legacy Environments
Pete Marshall - casmadrid2015 - Continuous Delivery in Legacy EnvironmentsPete Marshall - casmadrid2015 - Continuous Delivery in Legacy Environments
Pete Marshall - casmadrid2015 - Continuous Delivery in Legacy Environments
 
Software models
Software modelsSoftware models
Software models
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentation
 

Mehr von David Champeau

Moving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summaryMoving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summary
David Champeau
 

Mehr von David Champeau (10)

It business processes EA, SA and SOA together
It business processes   EA, SA and SOA togetherIt business processes   EA, SA and SOA together
It business processes EA, SA and SOA together
 
Information management
Information managementInformation management
Information management
 
Some Basics of an ECM Project
Some Basics of an ECM ProjectSome Basics of an ECM Project
Some Basics of an ECM Project
 
Moving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summaryMoving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summary
 
Enterprise Content Search Paradigms
Enterprise Content Search ParadigmsEnterprise Content Search Paradigms
Enterprise Content Search Paradigms
 
ECM Pillars
ECM PillarsECM Pillars
ECM Pillars
 
ECM BPM Strategy With Enterprise Architecture Maturity Model
ECM BPM Strategy With Enterprise Architecture Maturity ModelECM BPM Strategy With Enterprise Architecture Maturity Model
ECM BPM Strategy With Enterprise Architecture Maturity Model
 
It Architects And Engineers
It Architects And EngineersIt Architects And Engineers
It Architects And Engineers
 
BPM Process Patterns Primer
BPM Process Patterns PrimerBPM Process Patterns Primer
BPM Process Patterns Primer
 
Taxonomy And Metadata
Taxonomy And MetadataTaxonomy And Metadata
Taxonomy And Metadata
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

ECM Project Management Basics

  • 1. ECM Project Management Basics David Champeau IBM FileNet Certified Professional AIIM ECM Master AIIM BPM Pracitioner AIIM IOA Practioner
  • 2. ECM Projects Start with one or more basic methodologies depending on the size and scope of the project Zachman Frameworks MIKE2 PMBOK
  • 3. Sequence of ECM Projects
  • 4. Project Infrastructure Stakeholders Communications Plan Resource Plan Geography Priorities Artifact Management
  • 5. Dual Tracks Information Architecture Governance Taxonomy Business Processes Records Security Technology Architecture Infrastructure Operations Integration
  • 6. Architectures Application Infrastructure Network ECM Platform Business Data Operations Support Geography
  • 7. Situational Analysis This will determine the next steps New ECM program Start from the beginning Leave room for lots and lots of planning New project in existing program Same style as other tactical projects or Something new What does it add Impact on infrastructure
  • 8. Eating an Elephant Organize the project into the high-level categories or tracks Break each down multiple times Get to manageable pieces Determine dependencies Begin to see the timeline Gauge level of effort Use one of numerous algorithms
  • 9. Undersell, Overdeliver If this is all new, start small Use prototypes for testing the integration points automating business processes experimenting with user interfaces
  • 10. Plan and Plan Again Whiteboards help flush out ideas, identify the tough spots Planning does not have to lead into analysis paralysis Each project needs someone to drive it forward This is often overlooked Someone has to understand how all the pieces fit together
  • 11. Keep the Solution Simple Do not “code for the exception”, “code for the rule” Keep it at 80-20 Dump the exceptions to the side and let someone manually sort them out This is a project killer
  • 12. Keep the Solution Simple Try to use out-of-the-box Lots of good stuff coming OOTB these days Integration points require customization Sell the users on “simple first” Most requirements delivered are rarely or never used