top of page

Learning How To Trust Information Stored in Trusted Information Repositories (TCRs)

Writer's picture: CraigRhinehartCraigRhinehart

Updated: Dec 3, 2024

Since choosing the right repository or content storage location is so important, how can we objectively evaluate the repositories we have?  Use this scoring model to assess and designate your content storage options (including ECM repositories) as Trusted Content Repositories (TCRs).


How to Trust Trusted Content Repositories

Level 0 – is missing key capabilities like security, basic content services and APIs. This category represents file shares, CDs and other relatively unsecure locations. These environments are flexible and useful but the missing capabilities cause us to lose confidence (or trust) in the content we keep there.  Imagine building an application that delivers critical documents only to have an end-user delete the underlying files.


Level 1 – Missing key capabilities like repository governance and lineage. This category represents SharePoint, wikis and blogs and other environments with user-controlled governance. These environments are fantastic for collaboration and are easy to deploy but are missing essential capabilities when the environment itself can’t be properly governed and secured in accordance with IT standards (including the ability to meet SLAs). Imagine building an application that depends on critical documents only to have an end-user retire the SharePoint site that used to contain the needed documents or records.


Level 2 – Missing a few key capabilities to instrument and automate workflows like event management and content federation. This category represents most ECM repositories from major vendors like IBM, EMC, OpenText and selected others. The missing capabilities enable us to have confidence the right documents are designed as “trusted” so they can be found, automated and consumed with confidence.


Level 3 – Has all of the key capabilities.  This is the optimal level for trusted content applications.  Only IBM FileNet P8 has all of these characteristics today.


Remember … if you can’t trust your repository you can’t trust what is in it, can you? Critical content must be stored in Trusted Content Repositories … it’s that simple.  Next time we’ll explore what it takes to create and maintain trusted content.  In the meantime, leave me your feedback on the model.


Trusted Information


Comentarios


Sign Up for the Newsletter

Sign up for the Newsletter to be the first notified about new posts, resources and insights.

©2024 by Rhinehart Enterprises, LLC.  All material appearing on the Building Bigger + Better Businesses website (“content”) is protected by copyright under U.S. Copyright laws and is the property of Rhinehart Enterprises, LLC ... or the party credited as the provider of the content. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any way exploit any such content without prior written permission of Rhinehart Enterprises, LLC.  For permission to use any of the website's content, contact Craig Rhinehart.

 

Rhinehart Enterprises, LLC provides the https://www.buildingbiggerbetterbusinesses.com website as a service to the public.  Rhinehart Enterprises, LLC is not responsible for, and expressly disclaims all liability for, damages of any kind arising out of use, reference to, or reliance on any information contained within this website.  All the information published on this website, or in any article herein is true and accurate to the best of the authors’ knowledge.

Privacy Policy | Terms of Use | Accessibility | We use cookies on our website to see how you interact with it. By using this site you agree to our use of such cookies.

bottom of page