All posts by Jason

Workshare & Autonomy iManage pop-ups galore!

Workshare Protect v Autonomy iManage Send & File

Over the past few weeks we’ve been working on an upgrade from Workshare Professional 4.5 to 5.2 SR1 and during this time we’ve been getting a lot more information on Autonomy iManage WorkSite 8.5. The combination of these two got me thinking that either Workshare or Autonomy iManage need to work together on user experience around email sending.

In Workshare we have the Protect module configured so that as you send an external email you will get prompted with a pop-up box like that below. This allows you to utilise the Workshare functionality to removed meta-data, turn the document into a PDF etc

Protect after Send

In WorkSite 8.5 you can utilise the Send & File functionality to ease email management, in particular filing of Sent emails into the matter workspace (see my previous article on Send & File functionality). Again as you send an email you will get prompted with a pop-up box like the one below.

Send and File

What happens if you have both installed? I can see our lawyers getting really annoyed with multiple pop-ups when all they want is to get the email fired off to the client!

So a call to Workshare and Autonomy iManage, what we need is a Send, Protect & File integrated dialogue!

Share

Understanding WorkSite security part 2

So yesterday we went through how the security is structured across the workspaces, tabs, folders and documents. Now let’s look at how it’s applied.

Each item in WorkSite can have a default security. This applies to everyone accessing the folder, document etc. This the the “Shared As” option in properties.

You can set the “shared as” to:

  • Private – setting to this means by default any one but the creator/author won’t be able to see the workspace, folder, document etc
  • View – you can see it but access would be read only as would any property information/meta-data on the item
  • Public  – you can see the workspace, folder, document etc and edit them and their property information/meta-data

The easiest way to maintain security is to simply secure at this level. However there may be occasions where you need to secure at more advanced levels for different groups/people etc

This is where the ACL (Access Control List) comes in.

This is additional security information to the basic default security “shared as” setting above. And for the groups/people named in the ACL it will override the default “shared as” setting (e.g. if the document default “shared as” security is “View”, but I am added to the ACL with Read/Write access. Everyone else will be able to get read only access apart from me who will have write access – the author/creator will of course still have write access too)

In the ACL you can add individuals or groups of individuals and assign the following access levels (remember these will supersede the default level for those individuals/groups!)

  • Full Access – This allows full access to the document and full control over properties/meta-data and also the security (including for the folder, workspace etc)
  • Read/Write – full access  to the document, but limited control on properties/meta-data and no ability to change security (including for the folder, workspace etc)
  • Read – as it says, just allows to read documents, properties/meta-data etc
  • No Access – again as it says (remember unlike Windows where you could see the folder even if you couldn’t gain access to it, in WorkSite No Access = it’s invisible)

There are a few things worth pointing out about Groups and Individuals in terms of adding to the ACL.

  • Groups are extremely useful for workspaces that contain hundreds of documents and have security that changes regularly. This is because you can amend the security without having to refile everything (the refile action has to go through each document, folder etc and change the properties and security. On a large file this takes time!)
  • However the downside of Groups is that users of the FileSite or Desktop clients cannot add or remove people from them. This has to be done using the database administration tool.

So before you determine your security think carefully about the following to help determine the best security to apply:

  • potential size of the file (number of folders, documents etc)
  • frequency of change of individuals access requirements
  • degree of control the end user will need in maintaining the security

————–

OK now you hopefully understand a bit more about the default security and ACL. Let’s step back to how folders and documents inherit security from the parent folder, tab or workspace. Basically what we’re going to look at is limiting or opening up security within the workspace.

So remember the option to inherit or not?

Limiting access to sub folders or documents is easy.

You set the top level (e.g. your workspace) as open a security setting as is acceptable e.g. Public (remember this is the “shared as” default security, not in the ACL).

You can then uncheck the inherit security on the folders you wish to secure more tightly, then either change the default “shared as” security (e.g. to “View”) or add a specific ACL to those folders.

However the real difficulty is when you want to apply a more open security to sub folders. i.e. opening access to wider audience in a sub folder that at the levels above.

So say your top level (e.g. your workspace) is Private (again remember this is the “shared as” default security, not in the ACL) and maybe it is also secured in the ACL to a group or individual. In WorkSite you can only open sub folders or tabs to people specifically listed in top (i.e. workspace) ACL!

When you think about it this is logical as if you have no access to the top level you couldn’t see the workspace, so how could you expect to see a folder within it?

This isn’t so bad, but the big gripe is that it only lists Groups, not people contained in those Groups!  i.e. the workspace is secured to View in the ACL to the IT group, then you want to allow me to have read/write access to a sub-folder. Unless I am named in the ACL as an individual as well you won’t be able to pick me at a lower level even though I’m in the IT Group!

Individual documents though are a little different. These can be opened up to either Groups or Individuals that are not listed in the top level (i.e. workspace) ACL. I guess this is logical as you could search for the document by it’s document number?!

  ————–

Finally a quick note on Roles, just for completeness. These though really aren’t essential to understanding security from a WorkSite user perspective. So if your brain is full or fried stop reading now!

In the background your WorkSite administrator will assign users of the WorkSite system to “roles”. These are settings that basically allow some overriding “security” to be applied that a user cannot amend. It will always apply to all workspaces, tabs, folders and documents etc. So your actions available within the system will depend on the role you are placed in.

Roles apply to more specific functions, like the ability to actually create a workspace or be able to physically delete documents etc. An example of a role setting is shown below:

Share

Understanding WorkSite security – part 1

Matter Centric WorkSite security on the face of it can seem over complicated. But once you get the hang of it you can pretty much make it work well for any security requirement. This post will go through some of the basics.

First off a quick recap of the main components of WorkSite:

  • At the “top” level you have your Workspace – think of it as your filing cabinet for the matter
  • Below that you can have tabs – think of the logical dividers in that cabinet to split up your content
  • Either below a tab or in a workspace are folders – think paper folders full of a specific type of paper document in your cabinet
  • Then in the folders are your documents, emails etc

In WorkSite you can add “meta data” to your workspace (this is data that describes the workspace, so typically your client number, matter number, practice group etc). You can also secure a workspace to individuals or groups of individuals.

The tabs, folders or documents in the workspace can inherit that security (this can be changed for individual folders or documents if required).

If you know that some documents have had security changed and you want to re-apply the security from the workspace downwards then you use what WorkSite calls a “refile” action.

“Refiling” – applies the profile and security information downwards to folders and documents from the workspace (you can also refile from a tab or folder level if required)

As mentioned above you can set up folders not to inherit security. This is done with a simple checkbox on the properties of the folder (see below)

So when you refile either a workspace or tab you would get the following message. This allows you to avoid replacing security information for folders you set up not to inherit.

So if you do not want to pass the security down to folders set not to inherit, then leave the checkbox unchecked.

You can also chose to refile from the folder level downwards. For folders you get a similar option to pass down the security, but also an additional option asking whether you want to “re-inherit” the security from the above tab/workspace (see below).

So if you do not want to pass the security down to sub-folders set not to inherit, then leave the first checkbox unchecked.

If this folder does not inherit security and you do not want it to change to inherit. Then leave the second checkbox unchecked.

Part Two will be published tomorrow…

Share

Workshare 5.2 SR2 beta

Got our hands on Workshare Professional 5.2 SR2 beta last week, not really had time to get our hands on it (we’re still on a live 4.5 release and struggling with some specific issues with our environment and 5.2 SR1!). But thought it would be worth blogging what’s new in this release:

  • In Compare (i.e. Deltaview part of Professional)
  • Comparison of embedded Excel tables – this is the data not the formulae in the tables, but still a pretty useful feature.
  • Comparison of images – no it isn’t that fancy as to show what’s changed (i.e. that person has a scarf on in that photo!), it just checks whether the image has been modified, deleted etc
  • OCR support for PDF comparison – nice, BUT you need to have ABBYY recognition server configured
  • In Protect
  • Manual redact – is this a growing demand?
  • Cleaning password protected documents
  • Previewing cleaned or PDF attachments
  • In Review
  • PDF combine – this could be really useful. The ability to combine multiple files into a single PDF. Useful at the close of a case when you want to combine many documents into a single file.  BUT although it supports the combination of the following file types into a single PDF: DOC, DOCX, PPT, PPTX, XLS, XLSX, PDF, TXT, HTML. The PDF Combine functionality is only available from the local file system!! i.e. NOT the DMS!

When we’ve got it up and running successfully I’ll blog some more thoughts, particularly on:

  • Is the configuration easier to manage/understand?
  • Lightspeed clean in protect – how much faster is it than v4.5?
Share

Interwoven WorkSite 8.4?!?

Well I find out today that Interwoven will be releasing a v8.4!

It’s all part of the takeover by Autonomy and I know that until the merger goes through it’s difficult for them to disseminate information to customers on something that isn’t confirmed. But customers are still moving forward with projects and if you’re in the process of moving to v8.3 for the Vivisimo search, then you may want to take notes of these upcoming releases!

For those mid-project, here’s the order as a guide:

  • v8.5 is imminent (with Vivisimo Velocity) on a limited release (Limited release is fully tested production code but only released to clients who ask for it so they can be given preferential support)
  • v8.4 (with Autonomy’s IDOL engine) would follow this at some point. A server side upgrade retaining the v8.2 client – expect it to initially be a limited release while knowledge of IDOL grows within Interwoven.
  • v8.5 would then be released with Autonomy’s IDOL engine as a limited release
  • IUS (IDOL) limited release on a similar timetable to 8.5 IDOL
  • General availability of all above would follow later in year
  • Along with additional v8.5 modules such as SharePoint integration, WorkSite Web, IRM, language packs etc
  • After all this there comes the Fileshare release (I’m looking forward to this one! From what I understand you can make your workspaces available through a windows file share!)

In terms of architecture, the feedback is that the IDOL engine requires a similar capability as Vivisimo Velocity, so in their words “we can ‘simply switch’ from one index to the other”.

Share

Last time it was manufacturing, this time it’s white collars turn!

Almost every day on twitter or in the legal press there are stories of law firms cutting lawyers and/or staff. As I write this post according to The Lawyer the total UK legal redundancies stand at 2727. In fact it may be easier to reel off a list of those firms that haven’t yet made layoffs (note I say yet, I would bet that layoffs are being considered across all firms)

So is this recession worse than 1980’s? Are companies really in bad shape?

I read an article recently on two types of recession:

  • “boring recession” – troughs in the business cycle e.g. 1989-1992
  • “dramatic recession” – big transformations in the economy. e.g. 1980-1982

The article above points out that the early eighties recession stripped out much outdated manufacturing, mining etc. The recession forcing the market to do exactly what markets do and correct itself.

So what category is this recession? Boring or Dramatic? I’m going to take a guess at dramatic, but this time it’s not blue collar industries that the market is correcting, but white collar ones!

This is the reason we’re seeing so many law firms shedding jobs. Though it’ll probably take more than this wave of layoffs to “correct the market”. I don’t think we’ll see another wave of redundancies, as I think a lot of firms will have stripped out the numbers they can afford to lose without compromising the organisations. What I do think though is that we’ll start to see radical changes in law firms; new billing models, exploitation of technology (to take a quote “no longer need clerks and pupils to search libraries, copy forms and wrap bundles in pink ribbon”), commoditisation of legal work etc.

But I think the biggest impact we’ll see though is in the upturn. This time there are many more well educated, ambitious, highly talented people that have been made redundant. Some of these will “rebel” against the old way of doing law, they’ll not go back to working for one of the old firms and they’ll start new firms. There was a wave of small business entrepreneurs that came out of the last dramatic recession, this time those entrepreneurs could end up completely reshaping delivery of legal services. (it may not take the upturn to bring this about, I saw an article today which shows this could be already starting to happen!)

It’ll be interesting to see how the current Lawyer UK 100 and AmLaw 100 keep up! Who’ll do a Microsoft and shift like they did when they turned 180 degree and embraced the internet and who will be the Lotus sitting back complaining that that upstart Microsoft didn’t do things their way and took their business away?

Share

Legal IT twitterers

Caught a tweet from @DavidGurteen yesterday linking to a blog post he’d set up to log KM twitterers/tweeters. He also linked through to another site already listing “Must-Follow Twitterers on Twitter | Knowledge Management“.

I’ve had a look around and can’t find an equivalent for twitterers in Legal IT, so I thought I’d start to compile one (if there is one out there already then let me know!).

So if you work for a law firms IT department or you’re a lawyer, KM practitioner, legal librarian, ex-employee of law firm or whatever with an interest in legal IT and you have a twitter account, then let me know.

Either comment on this post, DM or @ me on twitter (@nooption) OR use the contact page on this site to email me.

My intention is to create some high level groupings of twitterers on the page, something like:

  • IT Management/Project Management/Risk
  • Applications/Business Systems/Desktop
  • Infrastructure/Network/Servers
  • Front Line Services/Help Desk/Support
  • Training
  • General interest in Legal IT

So when you contact me if you can let me know the grouping you’d like to appear (or more than one if you like)?

UPDATE:

The page is now up, I haven’t broken it down as above as I decided against such a rigid structure. If you’re on the list and want to be removed -or- if you want to be added to the list, then contact me and let me know!

Legal IT twitterers

Enjoy!

Share

Problems with Interwoven’s WAM (Workspace Archive Manager) product

This week we launched an archiving process for our Document Management System (DMS). Underlying the process we used a product from Interwoven called WorkSpace Archive Manager (WAM). The WAM tool basically moves an entire electronic file (the documents, emails,  folders and the meta-data) from one library to another, in our case from the Matters library to an Archive library.

I intend to blog about our general process and what we discovered working with our lawyers at a later date. The purpose of this post is to point out a bug or should that be a “feature” with the WAM tool. One that will probably cause you problems in the future if you don’t address it before you start.

We found in our analysis that keeping document numbers when moving documents between libraries was essential for the lawyers, especially as these numbers are often used in references on the documents themselves. We did look at using the WAM tools ability to store the document number in a separate “old document number” custom field, but lawyers didn’t like this. They wanted the document number to be the document number, end of!

Basically what this meant was, if you have ready to archive:

  • matter 1/1 with document numbers 100 and 101
  • matter 1/2 with document numbers 102 and 103

We would want them to appear in the archive with exactly the same matter numbers AND the same document numbers.

If you intend to archive everything in one big batch job and then seal up the archive and never write anything else to it then you’ll probably never hit the bug. But in reality you’ll probably want to archive in phases or even more likely on an ongoing basis. If that’s the case then you’ll likely hit the problem.

So in the example above, say we archived 1/1 one week and 1/2 a few weeks later. We would see the problem occur because we’d need to use two WAM jobs to do this. What happens is that the WAM run will create a webdoc entry in the document table (docmaster) of the archive library for the workspaces/folders using the next available document number (in the example of 1/1 it would use 102 – the next available number).

And this is where the problem occurs, when you come to archive 1/2 and it can’t maintain document numbers as 102 and probably 103 are already in use!

The trick to resolving this is to “seed” your document number in the archive libraries high (we chose 75000000), thus the next available document number for the webdoc entries is 75000001+. This will ensure all the actual document numbers can be maintained as they will unlikely “meet” a duplicate number. To me this is a flaw in the product as when you archive, you’re archiving the folders etc as well and thus surely these should maintain their numbers from the source library too.

It certainly should not go creating new entries in the archive with new numbers!

Share

How’s your Google CV?

I saw an interesting post on the Personal Branding Blog last week, written shortly after the Michael Phelps cannabis story. It referred to a “Google CV”.

What’s a Google CV? I’m not sure Dan Schawbel actually coined the term, but on his site it’s referred to as

“A Google CV is the Google search results page returned for a name search.”

There have been countless cases of the impact of the negative Google CV, people sacked for something said on facebook etc. But I suspect the more savvy HR departments and employers will start to use the online you more positively and begin to complement your paper CV with your Google CV.  So just as you take time to prepare your paper CV, maybe now is the time to take a look at your Google CV and make sure it’s one that you want to show a potential employee?

So here are 6 tips for maintaining your Google CV

  1. Unless you’re quite confident that your non-work persona is perfect for the workplace AND that your social network of friends fulfil the same criteria, then create a dual online personality.
  2. Get at least two email addresses (make sure they’re not both from your own domain!!), one for signing up the professional you to social sites and one for the personal you. Most social sites use the concept of a “friend searches” that use email addresses.
  3. Make sure your online presence is up to date. And unlike your paper CV that is gathering dust, keep it up to date. A two year old Lined In profile with 1 connection may send a wrong impression.
  4. Use Google itself and services like  123people to look at the online you, find all those sites you’d forgotten you’d signed up to and tidy up those you don’t want people to find!
  5. Obvious one, for those personal social sites (facebook, bebo, myspace), lock them down to your friends. Here’s a great post on facebook privacy.
  6. Get the professional you on LinkedIn or other similar social sites, set yourself up a blog related and/or contribute to online forums that relate to your field of expertise. Basically heighten the chance of that HR person finding the professional polished you on Google!

If you’ve any more suggestions why not post a comment?

Share

Internet Blackout N.Z

The whole music and film industry against “the internet” is getting a little ridiculous. From the Pirate Bay trial (follow it on twitter) this week to the Davenport Lyons debacle (yes, debacle! a friend of mine got a letter and the one piece of evidence? An IP address, I mean come on!)

Through following Stephen Fry on twitter I come across this law being put into effect in New Zealand. From what I can tell a section of this law will allow “for internet disconnection based on accusations of copyright infringement without a trial and without any evidence held up to court scrutiny”. Basically if you’re accused, your internet connection is taken down!

Find more details at http://creativefreedom.org.nz/

I don’t even think the whole copyright theft or illegal file sharing is the root issue. I think it’s the fact that the music industry and film industry know they were too late to the internet party and rather than use technology to innovate they got scared and decided to use what they know, the law.

Share