Feeds

Managing mashed content

Alfresco aims to bring Web 2.0 and ECM together

  • alert
  • submit to reddit

3 Big data security analytics techniques

For most businesses, large or small, the most common approach to providing content management is to use a shared F: drive across the network. This is despite the fact that there are many content management tools available on the market.

One of the reasons, according to John Newton, chief technology officer of Alfresco, is the fact that ECMs (Enterprise Content Management systems) are geared to a `top-down’ approach that requires the whole enterprise to be covered by the system. In addition, they are often too complex and built on proprietary technology that has to be learned by IT support staff and users. “Compared to that, the shared F: drive appears a much simpler solution,” he said.

But it is a solution with limitations, and with the advent of Web 2.0 technologies – with mashups being the obvious prime candidate of how content can now be re-purposed and re-used – those limitations are, in Newton’s view, growing. To address this, the company has just launched version 2.1 of its ECM system, which Newton claims is modeled on the familiarity of the F:drive, but with many `extras’. It is being pitched as tackling all three problems found with traditional ECM systems at once.

To overcome the top-down approach and the need to work with inevitable proprietary idiosyncrasies, the Alfresco system is built on open source technologies and is designed to be utilised in a bottom up style. The basic system can be downloaded for free and any user or individual can try it on the company’s own website using its hosted trial service.

Any department in a company can use it to build an ECM for their own requirements, which does sound like a good way to create content anarchy, but Newton pointed out that this is overcome by the ability to easily federate the individual departments together as and when necessary.

“This is the lowest-cost approach to ECM,” he said, “and is the way that many of our enterprise customers have come to us. They have started by downloading the system and using it – we have had over 15,000 downloads so far. When they want to, these users can become fully supported enterprise customers.”

There are some 300 of those so far, including NASA, the French Ministry of Justice, HR Block, Reed Employment and three of the top 10 investment banks. The largest installation in Europe is the European Union.

The EU is an example of the flexibility claimed possible using the open source approach. The system is built in a modular form using the Spring Framework and Alfresco is starting to operate a module respository that some users can contribute to and other users can exploit. The EU has contributed modules to localize the system into 20 different languages, together with Wiki capabilities, auto transformation tools and a new calendaring system. The use of Spring also means that modules can be written in most available scripting languages, including .NET.

The potential impact of Web 2.0 on content management is addressed by using web-oriented architecture based on the REST architecture, addressing everything as a URL. “This means users can now mashup internal enterprise content with external content,” Newton said, “and it is all based on modularized and standard tools so that no developer has to learn new languages, scripts or proprietary tools. In fact, scripting a new content rule becomes a relatively simple task that, in some cases, could even be undertaken by a smart business manager.”

Each installation of Alfresco will have an Application Lifecycle Framework (ALF) repository, and the system incorporates an ALF Module Package which allows modules to be distributed between the installations simply by ZIPing them up and distributing them around the respositories. The installations can also be federated, not only within an enterprise, but also externally, allowing federated networks of content-sharing business partners to be created.

Another departure from the more traditional ECM approach is that it is also possible for users to incorporate Alfresco into their own applications or services, either as an appliance, a utility, or as a component. “The licencing for this is very similar to the MySQL business model,” Newton said. “If a user’s application or service is made open source then use of the system is free. If it is sold then they pay a licence fee.”

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.