1. |
Envision the automatic application of comprehensive metadata to all your information. Centralpoint equips you with tools to manage robust, N-tiered metadata and Taxonomy. This includes scheduling the indexing or ingestion of structured and unstructured data, enabling metadata application based on record content. Centralpoint facilitates scheduled Data Transfer and Transformation. These tools allow you to traverse diverse databases or file folders, scanning and applying metadata based on predefined rules....
- Blogs
- Everyone: All Users
- 3/23/2019
- Relevance: 38
-
-
12/31/9999 11:59:59 PM
-
Data Cleaning, Data Scrubbing, Taxonomy, MDM, Master Data Management, Automate Metadata, auto classify document, automatically classify, auto apply metadata, Knowledge Management
-
-
-
-
-
-
-
-
8/10/2023 7:17:15 PM
-
-
|
2. |
Enhance or Replace Sharepoint with a superior Microsoft based technology
- Site Map
- Everyone: All Users
- 9/26/2016
- Relevance: 21
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Project Cortex, Replace Sharepoint, Sharepoint Alternative, Syntex, Sharepoint Knowledge Management, Sharepoint Migrate, Sharepoint Migration
-
-
-
-
-
-
-
-
8/10/2023 4:51:14 PM
-
-
|
3. |
- Security Policies
- Security
- Everyone: All Users
- 7/27/2022
- Relevance: 19
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:27 AM
-
-
|
4. |
- Centralpoint Module Gallery
- Mobile (Responsive), Personalization, Roles based authentication, Digital Asset Management (DAM), Document Management, Filtered by Audience (Channel of User), Filtered by Role (of User), Digital Experience Platform
- Everyone: All Users
- 5/30/2017
- Relevance: 18
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint QR Codes allow you to customize what data is contained within a QR Code (or Data Matrix Bar Code) for virtually anything. This code can be scanned to determine the item's point of origin (like a document), or be used for ID Badges or inventory management. Generally you would use QC Codes around data sets (employees, inventory, documents) wherein you would like to scan (later) to determine extended information about that user. Formatting of these codes can be modified to support any type of reader/scanner, to gather that information (inventory control, or secure access to a building when an id badge is presented).
The QC Code (script) is generally applied to the record view of a larger record set (or output). In this way, each code rendered contains the data defined in the QR code itself for scanning.
-
Video of this module below:
-
-
-
-
-
-
2/19/2024 12:08:47 PM
-
https://qc.xoprod20.com/Uploads/Public/MobileIcons/QR_Codes.jpg
-
|
5. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
6. |
The Federal Information Security Management Act (FISMA) requires federal agencies to implement and support standardized IT security controls. These controls, defined by the National Institute of Standards and Technology (NIST), allow agencies to safely and confidently outsource critical applications to FISMA-compliant clouds, managed hosting environments and SaaS providers. Designed to Address Strict FISMA Standards More than half of all federal cabinet-level agencies — including Veterans Affairs, the De...
- Site Map
- Everyone: All Users
- 9/13/2017
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
Fedramp, FISMA, Federal Government Hosting, 21st Century Digital Experience, Managed Services, FedRAMP Compliance, FISMA compliant, US Government
-
-
-
-
-
-
-
-
12/20/2023 3:53:17 PM
-
-
|
7. |
- Centralpoint Module Gallery
- Content Management, Deep Dive - Video Overview, Development Tools (Utilities), Knowledge Management, Strategy
- Everyone: All Users
- 12/28/2015
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This process allows for your terminology, product skus, laws, policies, and other pertinent information to be leveraged as a way to enrich your metadata, taxonomy and ontology....automatically.
Centralpoint's Data Cleaner covers HTML, Taxonomy, and Keywords, granting you the ability to manage condition dictionaries, including determining how many instances of a word or part number correspond to specific Taxonomy or keywords. For further insights, explore the extensive features we offer for MDM (Master Data Management).
The best way to understand how this tool can benefit your organization is to actually see it. We encourage you to set up a demonstration with us, so that we may step through the various routines online, via a MS/Teams Meeting demo, and we can address any of your questions or challenges .If you are interested in this new module, you may also want to see our Taxonomy Pre-Import Tool. Be sure to see our Data Transfer module for more information.
Types of Data Transformation which are supported and the required fields needed for each:
- Structured Data Sources
- MS/Sharepoint -Source Site URL, Title, List Title, Username, Password
- Oracle -Connection String/table name, any query or filter (credentials)
- MS/SQL -Connection String/table name, any query or filter (credentials)
- MS/Office 365- (Ondrive) Authorization, Source Folder (Office365 file Selector), Source Recursive (y/n), Source End Point (bulk or changes)
- OLEDB - Connection String/table name, any query or filter (credentials)
- ODBC - Connection String/table name, any query or filter (credentials)
- XML- ReadXML -XML Source (path to xml), Available tables and columns, Source Table Index
- XML- CpCollection –Source XML (path to xml), Default File, Source Directory, Number of Files to select, XSLT
- Delimited TXT (oledb)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Delimited TXT (Stream)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Active Directory – (Used to build employee directories typically) – Directory Path, Filter
- MS/Excel – Source File (path to excel, if not uploaded into centralpoint), Source Header row, Source Select Command (if any)
- RSS/ATOM- Source Feed URL (Web path to RSS Feed), Feed type (atom or rss)
- MS/Access- Source File (Path), Source Select Command (query)
- MS/Office365 – Source Authorization (Authorize), Source Folder, Source is Recursive, Source End Point
- Custom Provider – Typically used when ingesting from a WebAPI/Web Services – Source Type, Source Parameters (Custom covers virtually any configuration) wherein certain security considerations or custom methods must be passed in order to authorize or encrypt.
- Centralpoint to Centralpoint (Modules, Audiences, Taxonomy, Roles) – This is used when transforming data Centralpoint to Centralpoint or to an outside system, or after staging and testing initial imports.
- Unstructured
- File path (and/or credentials) to spider (Network drive, Any file path, web based drive (OneDrive- Source Directory, Source Pattern, Source Options. This feature also has the ability to spider all sub folders within a larger shared drive, ingested each record, and where applicable, fully text indexing, converting and preserving PDF, Word, XLS, PPT, Images, Videos and more. Additionally, the names from file folders (within the shared drive) may be included within the data cleaner/governance rules, to better organize content. Please see (below) Data Triage, which allows for your shared network drives to be ingested, allowing each file by type to be automatically organized into it's own unique module within Centralpoint.....automating the organization of all your information each day (via scheduled routines) and be made available on the internet, considerate of roles and authentication of each user.
When to consider INDEXING vs. INGESTING Data using Centralpoint Data Transformation
- Centralpoint supports both indexing or ingesting data. This is because you will want a federated search against all records, but need to preserve where some records currently live. In another case, you may need to have a new system of record or home to MOVE records into Centralpoint.
- You may want to avoid duplication of your records
- You may may need to consider the size of certain files (like CAD, Hi resolution images, etc.)
- You may need to consider the security of the file paths in which your files live today and user’s network accessibility to them.
- Indexing vs. Ingesting– The difference is whether you want to leave the record were it is found (to avoid duplication) in order to make it search able within Centralpoint, or whether you want to sunset an old system, where the new record will now live in Centralpoint as it’s new home. When creating your data transformation routine, the difference will be when field mapping ALTERNATIVE URL. Alternative URL is only used when indexing, allowing the path to record to be recorded in Centralpoint (as well as the enrichment), wherein the user will be returned to the original source, should they have the access to see the record. If you are intending to move the record to Centralpoint as the new system of record, then DO NOT USE Alternative URL, and make sure each record is moved during the ingestion (via an available) File Upload field.
- Security Consideration- Whether you are ingesting or indexing records using Data Transformation, always be sure to map the security roles from the system or path your scanning, in which to maintain who may see or access records (either indexed o ingested in Centralpoint)
Data Governance (Data Cleaner) considerations, when executing your Data Transformation.
Data cleaning is a separate module found under the Centralpoint Data Transformation suite of tools, which allow you to set up data governance rules which may work in unison with your Data Transformation routines.
- Keyword Generator – Used to enrich, supplement or add new keywords to any record, where certain values are is found (during mining).
- Example: If the word ‘apple’ is found, add keywords of ‘fruit, food, nutrition, pectin’ which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine : Search for?, attributes, add keywords
- Taxonomy Generator- Used to apply one or more metadata/taxonomy types when certain value(s) are found.
- Example: If the word ‘apple’ is found, apply to N-tiered taxonomy under Food/Fruit, which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine Search for?, case sensitive?, regex?, Taxonomy
- Attribute Generator – Used to apply new values in any field within one or more modules when certain value(s) are found (during mining).
- Example: If the term ‘Top Secret’ is found within any document, apply the value for the Role=Top Secret, to the ‘Roles’ attribute for any module. This will override the security roles for all documents which contain ‘Top Secret’
- What it will ask you for this routine : Search for?, regex?, value to add, attribute, which modules?
- HTML Cleaner- Used to clean or scrub any HTML or code where certain values are found (during mining). Often used to fix older or bad HTML or convert bad characters from MS/Word or faulty HTML being ingested.
- Example: Should you need to replace any fault HTML, codes or characters which includes “<b>Apple<b>, and replace with <b>Apple</b> (correcting the original faulty html)
- What it will ask you for this routine : Search for?, replacement type (html/text), replace with?
- Attribute HTML Cleaner- Used to apply new values into certain fields into specific modules whenever certain values are found (during mining)-allowing you to apply new values to any attribute as a result
- What it will ask you for this routine : Search for? , replacement type (html/text), replace with, attribute to add, which modules?
- Data Triage- Used to redirect certain file types into certain modules.
- Example, when spidering a shared network drive or database, you may want to deposit all documents containing ‘Marketing’ references into a module designated for only Marketing, or place all Excel documents found into it’s own module. This is used to organize content by type (within separate modules)
- What it will ask you for this routine: Search for?, regex (yes or no), searched attribute, destination modules, logging attribute
-
-
-
-
-
-
-
2/19/2024 12:08:54 PM
-
https://qc.xoprod20.com/Uploads/Public/datascrubbingthumbnail.jpg
-
|
8. |
- Centralpoint Module Gallery
- Data Aggregation, Data Transformation, Deep Dive - Video Overview, Development Tools (Utilities)
- Everyone: All Users
- 3/23/2023
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Data Governance, Automated Metadata, Govern, Data Rules, Data Cleaner, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This process allows for your terminology, product skus, laws, policies, and other pertinent information to be leveraged as a way to enrich your metadata, taxonomy and ontology....automatically.
Centralpoint's Data Cleaner covers HTML, Taxonomy, and Keywords, granting you the ability to manage condition dictionaries, including determining how many instances of a word or part number correspond to specific Taxonomy or keywords. For further insights, explore the extensive features we offer for MDM (Master Data Management).
The best way to understand how this tool can benefit your organization is to actually see it. We encourage you to set up a demonstration with us, so that we may step through the various routines online, via a MS/Teams Meeting demo, and we can address any of your questions or challenges .If you are interested in this new module, you may also want to see our Taxonomy Pre-Import Tool. Be sure to see our Data Transfer module for more information.
Types of Data Transformation which are supported and the required fields needed for each:
- Structured Data Sources
- MS/Sharepoint -Source Site URL, Title, List Title, Username, Password
- Oracle -Connection String/table name, any query or filter (credentials)
- MS/SQL -Connection String/table name, any query or filter (credentials)
- MS/Office 365- (Ondrive) Authorization, Source Folder (Office365 file Selector), Source Recursive (y/n), Source End Point (bulk or changes)
- OLEDB - Connection String/table name, any query or filter (credentials)
- ODBC - Connection String/table name, any query or filter (credentials)
- XML- ReadXML -XML Source (path to xml), Available tables and columns, Source Table Index
- XML- CpCollection –Source XML (path to xml), Default File, Source Directory, Number of Files to select, XSLT
- Delimited TXT (oledb)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Delimited TXT (Stream)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Active Directory – (Used to build employee directories typically) – Directory Path, Filter
- MS/Excel – Source File (path to excel, if not uploaded into centralpoint), Source Header row, Source Select Command (if any)
- RSS/ATOM- Source Feed URL (Web path to RSS Feed), Feed type (atom or rss)
- MS/Access- Source File (Path), Source Select Command (query)
- MS/Office365 – Source Authorization (Authorize), Source Folder, Source is Recursive, Source End Point
- Custom Provider – Typically used when ingesting from a WebAPI/Web Services – Source Type, Source Parameters (Custom covers virtually any configuration) wherein certain security considerations or custom methods must be passed in order to authorize or encrypt.
- Centralpoint to Centralpoint (Modules, Audiences, Taxonomy, Roles) – This is used when transforming data Centralpoint to Centralpoint or to an outside system, or after staging and testing initial imports.
- Unstructured
- File path (and/or credentials) to spider (Network drive, Any file path, web based drive (OneDrive- Source Directory, Source Pattern, Source Options. This feature also has the ability to spider all sub folders within a larger shared drive, ingested each record, and where applicable, fully text indexing, converting and preserving PDF, Word, XLS, PPT, Images, Videos and more. Additionally, the names from file folders (within the shared drive) may be included within the data cleaner/governance rules, to better organize content. Please see (below) Data Triage, which allows for your shared network drives to be ingested, allowing each file by type to be automatically organized into it's own unique module within Centralpoint.....automating the organization of all your information each day (via scheduled routines) and be made available on the internet, considerate of roles and authentication of each user.
When to consider INDEXING vs. INGESTING Data using Centralpoint Data Transformation
- Centralpoint supports both indexing or ingesting data. This is because you will want a federated search against all records, but need to preserve where some records currently live. In another case, you may need to have a new system of record or home to MOVE records into Centralpoint.
- You may want to avoid duplication of your records
- You may may need to consider the size of certain files (like CAD, Hi resolution images, etc.)
- You may need to consider the security of the file paths in which your files live today and user’s network accessibility to them.
- Indexing vs. Ingesting– The difference is whether you want to leave the record were it is found (to avoid duplication) in order to make it search able within Centralpoint, or whether you want to sunset an old system, where the new record will now live in Centralpoint as it’s new home. When creating your data transformation routine, the difference will be when field mapping ALTERNATIVE URL. Alternative URL is only used when indexing, allowing the path to record to be recorded in Centralpoint (as well as the enrichment), wherein the user will be returned to the original source, should they have the access to see the record. If you are intending to move the record to Centralpoint as the new system of record, then DO NOT USE Alternative URL, and make sure each record is moved during the ingestion (via an available) File Upload field.
- Security Consideration- Whether you are ingesting or indexing records using Data Transformation, always be sure to map the security roles from the system or path your scanning, in which to maintain who may see or access records (either indexed o ingested in Centralpoint)
Data Governance (Data Cleaner) considerations, when executing your Data Transformation.
Data cleaning is a separate module found under the Centralpoint Data Transformation suite of tools, which allow you to set up data governance rules which may work in unison with your Data Transformation routines.
- Keyword Generator – Used to enrich, supplement or add new keywords to any record, where certain values are is found (during mining).
- Example: If the word ‘apple’ is found, add keywords of ‘fruit, food, nutrition, pectin’ which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine : Search for?, attributes, add keywords
- Taxonomy Generator- Used to apply one or more metadata/taxonomy types when certain value(s) are found.
- Example: If the word ‘apple’ is found, apply to N-tiered taxonomy under Food/Fruit, which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine Search for?, case sensitive?, regex?, Taxonomy
- Attribute Generator – Used to apply new values in any field within one or more modules when certain value(s) are found (during mining).
- Example: If the term ‘Top Secret’ is found within any document, apply the value for the Role=Top Secret, to the ‘Roles’ attribute for any module. This will override the security roles for all documents which contain ‘Top Secret’
- What it will ask you for this routine : Search for?, regex?, value to add, attribute, which modules?
- HTML Cleaner- Used to clean or scrub any HTML or code where certain values are found (during mining). Often used to fix older or bad HTML or convert bad characters from MS/Word or faulty HTML being ingested.
- Example: Should you need to replace any fault HTML, codes or characters which includes “<b>Apple<b>, and replace with <b>Apple</b> (correcting the original faulty html)
- What it will ask you for this routine : Search for?, replacement type (html/text), replace with?
- Attribute HTML Cleaner- Used to apply new values into certain fields into specific modules whenever certain values are found (during mining)-allowing you to apply new values to any attribute as a result
- What it will ask you for this routine : Search for? , replacement type (html/text), replace with, attribute to add, which modules?
- Data Triage- Used to redirect certain file types into certain modules.
- Example, when spidering a shared network drive or database, you may want to deposit all documents containing ‘Marketing’ references into a module designated for only Marketing, or place all Excel documents found into it’s own module. This is used to organize content by type (within separate modules)
- What it will ask you for this routine: Search for?, regex (yes or no), searched attribute, destination modules, logging attribute
-
-
-
-
-
-
-
2/19/2024 12:07:44 PM
-
https://qc.xoprod20.com/Uploads/Public/Blogs/datacleanerthumb.png
-
|
9. |
Centralpoint features distinctive Data Transformation tools for automating Aggregation from diverse sources. It accommodates indexing and ingestion of both Structured and Unstructured data. This translates to aggregating information from various systems (SQL, Oracle, IBM, XML, JSON, CSV), even folders with files (PDF, Word, Images, Videos). The tools include Data Mining, which auto-classifies each record with accurate metadata and Taxonomy upon import. This empowers seamless searching across disparate sy...
- Site Map
- Everyone: All Users
- 10/18/2016
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
SQL Migration, Data warehousing, data migration, content migration, Data Mining, Automate Metadata, mass migration, data movement, sharepoint migration, sharepoint alternative, Oracle,
-
-
-
-
-
-
-
-
1/4/2024 10:01:47 AM
-
-
|
10. |
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This pro...
- Site Map
- Everyone: All Users
- 8/21/2018
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Data Mining, Automated Metadata, Taxonomy, Classification, Roles based, Security Assignment, Indexing, Crosswalks, Mashups
-
-
-
-
-
-
-
-
9/13/2023 1:53:00 PM
-
-
|
11. |
An important step in your project will be to define the metadata and taxonomy needs that will support an organization's goals for categorizing and relating both assets and content. Oxcyon will provide the expertise necessary to not only define this with you, but to incorporate a strategy toward managing it long term. Centralpoint offers robust tools for Data Transfer, Transformation, including the ability to auto apply metadata to both your Structured (Oracle, IBM, SQL, JSON, XML) and Unstructured (PDF,...
- Site Map
- Everyone: All Users
- 9/26/2016
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Taxonomy, Expertise, Implement Taxonomy, Metadata, Import taxonomy, build taxonomy, apply taxonomy
-
-
-
-
-
-
-
-
7/12/2021 3:38:13 PM
-
-
|