SlideShare a Scribd company logo
1 of 8
1BigData Analytics Panel-Diskussion DMS EXPO 2013Moderation Dr. Joachim Hartmann
IBT@DMSEXPO
Richard MedinaRichard Medina
Co-Founder & PrincipalCo-Founder & Principal
ConsultantConsultant
Workplace 2025 -Workplace 2025 -
The RealityThe Reality
TV ShowTV Show
© Doculabs, Inc. 2013
The Successful Workplace in 2025
In 2025, the successful mobile and social workplace will:
1.Have a baseline of adequacy in the new technologies
2.Have some solid mobile and social line-of-business applications
3.Will address the serious inefficiencies and risks of mobile and
social
It’s a lot more exciting than it sounds!
© Doculabs, Inc. 2013
The Winners Do 4 Things Right
1. They focus on addressing the Fragmentation Problem
2. They establish the minimal (necessary) conditions for success
with systems of engagement (SOEs)
3. They then pick and successfully implement the right mobile
and social line-of-business applications
4. They focus on controlling the serious inefficiencies and risks of
mobile and social
© Doculabs, Inc. 2013
#1: What is the Fragmentation Problem?
1. The Fragmentation Problem results from the explosion of
SOEs
2. SOEs include mobile applications, social media, wireless
access, “life splicing”, multiple BYOD devices, synching
everything
3. The Problem is uncontrolled diversity, failed enterprise
synching, content stored in multiple locations, multiple and
varied content formats, no security control, no version control,
no process control, no backup, and failed access.
© Doculabs, Inc. 2013
#2: How Do They Establish a Baseline of Adequacy?
1. They assess themselves using SOE categories.
2. They implement general baseline principles.
3. They address over-retention by dividing the monster into 2
more tractable sub-problems: day-forward information
disposition and historical information disposition
– Day-forward information disposition is easier
– Historical information disposition is much harder, takes years, and
requires a solid methodology and mix of technologies
© Doculabs, Inc. 2013
#3: Which SOE Applications Do They Implement?
1. There are 3 kinds of applications:
– 1) “Pure” SORs (systems of record), 2)“Pure” SOEs, and 3) SOEs that
integrate with SORs
1. The 3rd
kind – social-enabled and mobile-enabled ECM
applications – typically beat the other 2 kinds in ROI and
controlling risk.
2. So the Winners in 2025 focused most of their attention on
social/mobile-enabled ECM applications.
3. But they did so one step at a time –
in Content, Process, or Participation.
© Doculabs, Inc. 2013
#4: How Do They Address the Risks and Inefficiencies of SOEs?
1. The Winners in 2025 think of SOEs in terms of optimization
problems.
2. You have an optimization problem whenever you have some
objectives or factors that you want to improve – but you can’t
maximize them all because they conflict with each other.
3. SOEs are full of them: participation vs. quality; usability vs.
security; the needs of “the business” vs. the needs of the “risk
managers” – versus the needs of IT.
4. It’s all about finding and implementing many optimal
compromises that let you get sufficient benefits while
controlling the downside.
5. The Winners in 2025 find the right balance for each problem –
and then “bake them into” the standard solutions and
expected behaviors for each type of application.
© Doculabs, Inc. 2013
#4: How Do They Address the Risks and Inefficiencies of SOEs?
1. The Winners in 2025 think of SOEs in terms of optimization
problems.
2. You have an optimization problem whenever you have some
objectives or factors that you want to improve – but you can’t
maximize them all because they conflict with each other.
3. SOEs are full of them: participation vs. quality; usability vs.
security; the needs of “the business” vs. the needs of the “risk
managers” – versus the needs of IT.
4. It’s all about finding and implementing many optimal
compromises that let you get sufficient benefits while
controlling the downside.
5. The Winners in 2025 find the right balance for each problem –
and then “bake them into” the standard solutions and
expected behaviors for each type of application.

More Related Content

What's hot

Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
Chris Pepin
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
Symplified
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
Symantec
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile Devices
Wendy Wang
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_final
Intralinks
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed management
Ediey Smile
 

What's hot (15)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Mobile Myths in Enterprise Development
Mobile Myths in Enterprise DevelopmentMobile Myths in Enterprise Development
Mobile Myths in Enterprise Development
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Research report
Research reportResearch report
Research report
 
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee Group
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting PatentsInternet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
 
Agile mobility solutions v.1.2
Agile mobility solutions v.1.2Agile mobility solutions v.1.2
Agile mobility solutions v.1.2
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile Devices
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_final
 
Smart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibmSmart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibm
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed management
 

Similar to DMS Expo: Workplace 2025 -- The Reality TV Show

Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
openi_ict
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
UBM (Technology)
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 

Similar to DMS Expo: Workplace 2025 -- The Reality TV Show (20)

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Corporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come overCorporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come over
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
 
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

DMS Expo: Workplace 2025 -- The Reality TV Show

  • 1. 1BigData Analytics Panel-Diskussion DMS EXPO 2013Moderation Dr. Joachim Hartmann IBT@DMSEXPO Richard MedinaRichard Medina Co-Founder & PrincipalCo-Founder & Principal ConsultantConsultant Workplace 2025 -Workplace 2025 - The RealityThe Reality TV ShowTV Show
  • 2. © Doculabs, Inc. 2013 The Successful Workplace in 2025 In 2025, the successful mobile and social workplace will: 1.Have a baseline of adequacy in the new technologies 2.Have some solid mobile and social line-of-business applications 3.Will address the serious inefficiencies and risks of mobile and social It’s a lot more exciting than it sounds!
  • 3. © Doculabs, Inc. 2013 The Winners Do 4 Things Right 1. They focus on addressing the Fragmentation Problem 2. They establish the minimal (necessary) conditions for success with systems of engagement (SOEs) 3. They then pick and successfully implement the right mobile and social line-of-business applications 4. They focus on controlling the serious inefficiencies and risks of mobile and social
  • 4. © Doculabs, Inc. 2013 #1: What is the Fragmentation Problem? 1. The Fragmentation Problem results from the explosion of SOEs 2. SOEs include mobile applications, social media, wireless access, “life splicing”, multiple BYOD devices, synching everything 3. The Problem is uncontrolled diversity, failed enterprise synching, content stored in multiple locations, multiple and varied content formats, no security control, no version control, no process control, no backup, and failed access.
  • 5. © Doculabs, Inc. 2013 #2: How Do They Establish a Baseline of Adequacy? 1. They assess themselves using SOE categories. 2. They implement general baseline principles. 3. They address over-retention by dividing the monster into 2 more tractable sub-problems: day-forward information disposition and historical information disposition – Day-forward information disposition is easier – Historical information disposition is much harder, takes years, and requires a solid methodology and mix of technologies
  • 6. © Doculabs, Inc. 2013 #3: Which SOE Applications Do They Implement? 1. There are 3 kinds of applications: – 1) “Pure” SORs (systems of record), 2)“Pure” SOEs, and 3) SOEs that integrate with SORs 1. The 3rd kind – social-enabled and mobile-enabled ECM applications – typically beat the other 2 kinds in ROI and controlling risk. 2. So the Winners in 2025 focused most of their attention on social/mobile-enabled ECM applications. 3. But they did so one step at a time – in Content, Process, or Participation.
  • 7. © Doculabs, Inc. 2013 #4: How Do They Address the Risks and Inefficiencies of SOEs? 1. The Winners in 2025 think of SOEs in terms of optimization problems. 2. You have an optimization problem whenever you have some objectives or factors that you want to improve – but you can’t maximize them all because they conflict with each other. 3. SOEs are full of them: participation vs. quality; usability vs. security; the needs of “the business” vs. the needs of the “risk managers” – versus the needs of IT. 4. It’s all about finding and implementing many optimal compromises that let you get sufficient benefits while controlling the downside. 5. The Winners in 2025 find the right balance for each problem – and then “bake them into” the standard solutions and expected behaviors for each type of application.
  • 8. © Doculabs, Inc. 2013 #4: How Do They Address the Risks and Inefficiencies of SOEs? 1. The Winners in 2025 think of SOEs in terms of optimization problems. 2. You have an optimization problem whenever you have some objectives or factors that you want to improve – but you can’t maximize them all because they conflict with each other. 3. SOEs are full of them: participation vs. quality; usability vs. security; the needs of “the business” vs. the needs of the “risk managers” – versus the needs of IT. 4. It’s all about finding and implementing many optimal compromises that let you get sufficient benefits while controlling the downside. 5. The Winners in 2025 find the right balance for each problem – and then “bake them into” the standard solutions and expected behaviors for each type of application.

Editor's Notes

  1. First, do a – focused, quick -- Current State Assessment of your organization’s situation, particularly with respect to ECM and SOEs – mobile, social, and the cloud. Address the ECM categories: people, process, technology, and content. There’s a solid methodology for doing this. But address and document the important SOE issues. Look for your Social Media policy and provide one if you don’t have one. (If you don’t have one, download a starter policy and tweak it.)   Assess and document the important SOE categories and issues, such as: the division of labor between IT and users, the capabilities used, the configurations, the types of devices (such as smart phones, Blackberries, iPads), and the types of users and user scenarios.   You’ll see lots of Fragmentation : uncontrolled diversity , failed enterprise synching , and lots of system of engagement problems. For basic ECM health these need to be managed at the enterprise level. You can tackle them while you address the Specific Applications , but these are more important than Specific Applications because the Fragmentation Problem will destroy you if you ignore it.   Second, Implement general baseline principles across information silos, content formats, devices, business units, and organizations.   Third, address over-retention. This is a huge problem that would have plagued us without the explosion of SOEs and fragmentation -- but it’s far worse with them. Think of email and twitter feeds, distributed repositories inside and outside of your firewalls and organizations, and so on. Organizations have been over-retaining electronic information and failing to dispose of it in a legally defensible manner when business and law will allow. It’s an issue you must address if you’re going to be letting folks seriously “engage” with Systems of Engagement.   Almost all organizations over-retain but this problem is far worse for bigger organizations. So if you’re a small firm you may be in pretty good shape. But if you’re big, you may have hundreds of TBs or even PBs of information that is compounding. So you must address it to meet General Adequacy.   The best way to address this monster problem of over-retention is to break it into 2 more tractable sub-problems: day-forward information disposition and historical informational disposition.   Addressing day-forward over-retention is much easier to address than historical retention -- even though addressing it messes with employees’ day-to-day activities. The key is to initiate information lifecycle (ILM) practices on a “day-forward” basis first, so any new content created or saved is assigned a disposition period. Then provide employees with very clear and explicit guidance for the acceptable use of available tools for dynamic content and their associated retention periods. An example is “retain non-records for 3 years, and retain official records per the retention schedule.”   Address historical content over-retention by using a defensible disposition methodology. The good news is that there’s a methodology to follow. It’ll be a long haul and you may be at it for years, but you can tackle it incrementally and you’ll start getting immediate benefits