1. |
- Security Policies
- Security
- Everyone: All Users
- 9/27/2023
- Relevance: 176
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 4:23:01 PM
-
-
|
2. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 129
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
3. |
Oxcyon releases it's AI (Artificial Intelligence) Assistant empowering Centralpoint users to extend their knowledge management to other web based applications. This contextual sensitive avatar can be controlled by Centralpoint to live within any third party application, allowing the right information to serve each user when it is needed.
- Oxcyon In The News
- Everyone: All Users
- 1/9/2019
- Relevance: 88
-
https://www.oxcyon.com/centralpoint-dxp/module-gallery1/centralpoint-interstitials-ai-coach-200
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/28/2019 10:39:21 AM
-
-
|
4. |
Oxcyon, is compliant with ISO27k by proxy of Certificate Number OHS 587454 . Those prefixed with ‘A’ are listed in Annex A of ISO/IEC 27001:2013 and are explained in more detail in ISO/IEC 27002:2013. Further ISO27k standards fill-in various supplementary details ( e.g. ISO/IEC 27005 on information risk management and ISO/IEC 27018 on privacy in cloud computing), while other ISO and non-ISO standards and resources provide lots more information, and in some cases recommend alternative o...
- Site Map
- Everyone: All Users
- 8/2/2014
- Relevance: 66
-
-
12/31/9999 11:59:59 PM
-
ISO27K, EU, EU Compliance, Standards, Policy, ISO/IEC 27001:2013
-
-
-
-
-
-
-
-
8/8/2017 11:24:16 AM
-
-
|
5. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 58
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:19 PM
-
-
|
6. |
- Security Policies
- Security
- Everyone: All Users
- 7/27/2022
- Relevance: 54
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:27 AM
-
-
|
7. |
Oxcyon, Inc.and its subsidiaries respect the privacy of their employees, users and customers and are committed to protecting employee, user and customer data maintained by the company. Due to the global nature of Oxcyon, Inc.’ business, transfers of employee and customer Personal Data, defined below, across national boundaries may occur. As a result, Oxcyon, Inc.has adopted this Safe Harbor Data Privacy Policy and adheres to the Safe Harbor Principles published by the U.S. Department of Commerce, in agre...
- Site Map
- Everyone: All Users
- 4/12/2013
- Relevance: 54
-
-
12/31/9999 11:59:59 PM
-
Centralpoint by Oxcyon's Safe Harbor Policy
-
-
-
-
-
-
-
-
8/8/2017 11:30:38 AM
-
-
|
8. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 50
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
9. |
In the healthcare sector, security concerns have escalated alongside the pre-existing patient privacy and safety considerations. Unlike industries such as retail, where breaches involve credit data, healthcare deals with far more sensitive information. Your responsibility, therefore, requires careful handling to prevent harm to patients and their families. So, how can you safeguard your healthcare consumer data effectively? Comprehensive Encryption: Prioritize encryption across all possible areas. Howeve...
- Blogs
- Privacy
- Everyone: All Users
- 6/6/2015
- Relevance: 48
-
-
12/31/9999 11:59:59 PM
-
PHI, HIPAA, Security, Oxcyon, Centralpoint, Gartner, SSL, Encryption, Firewall, Privacy, GDPR,
-
-
-
-
-
-
-
-
8/10/2023 7:20:29 PM
-
-
|
10. |
- Security Policies
- Security
- Everyone: All Users
- 8/26/2021
- Relevance: 46
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:13:03 AM
-
-
|
11. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 41
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:53 PM
-
-
|
12. |
Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. We are focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings, providing security control transparency. This effort by design is integrated with and will support ...
- Site Map
- Everyone: All Users
- 6/5/2017
- Relevance: 33
-
-
12/31/9999 11:59:59 PM
-
CMS CAIQ Compliance, CAIQ Portal, ECM CAIQ
-
-
-
-
-
-
-
-
9/19/2018 5:58:02 AM
-
-
|
13. |
Your personal data Personal data relates to a living individual who can be identified from that data. Identification can be by the information alone or in conjunction with any other information in the data controller’s possession or likely to come into such possession. The processing of personal data is governed by the General Data Protection Regulation (the “GDPR”). Who we are ,legal name, [cp:scripting key='AudienceInfo' attributesys...
- Site Map
- Everyone: All Users
- 9/10/2010
- Relevance: 31
-
-
12/31/9999 11:59:59 PM
-
Oxcyon, Centralpoint, Privacy Policy, GDPR, EU, European Privacy, Website Privacy Policy
-
-
-
-
-
-
-
-
2/16/2023 3:37:37 PM
-
-
|
14. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 29
-
-
12/31/9999 11:59:59 PM
-
SOC 2 Report 2017, Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:55 PM
-
-
|
15. |
- Security Policies
- Operations, Security
- Everyone: All Users
- 6/1/2022
- Relevance: 29
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:48 PM
-
-
|
16. |
- Centralpoint Update History
- Everyone: All Users
- 8/2/2021
- Relevance: 29
-
-
12/31/9999 11:59:59 PM
-
Centralpoint Updates, Centralpoint Version, Oxcyon Release, Centralpoint Release, Digital Experience, Magic Quadrant, ECM, Content Management, Portal, Enterprise, User Experience, MDM, Master Data Management, Gartner
-
-
Feature |
Summary |
Master Logging |
A new Master > Admin > Properties > Logging attribute has been added. The cpsys_Logging table contains no user interface but can be used for debugging and tracing at the database level. |
CpCaching |
The internal caching system has been updated with automatic expiration of unused items, intelligent priority selection, and enhanced synchronization using concurrent collections. |
Data Cleaner > Taxonomy Generator |
Now supports Case Sensitive match. |
-
-
-
-
-
-
8/16/2021 10:26:42 AM
-
-
|
17. |
- Security Policies
- Security
- Everyone: All Users
- 6/18/2022
- Relevance: 27
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:11 AM
-
-
|
18. |
- Centralpoint Module Gallery
- User Experience, Strategy, Forms & Workflow, Mobile (Responsive), Roles based authentication, Digital Experience Platform
- Everyone: All Users
- 5/30/2017
- Relevance: 25
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's Social Media Mashup module allows you to manage all of your social media accounts from a singular, central point. In this way, you can see all social media activity (or chatter) at a glance, able to filter by outlet to see activity on each one. This module requires that you enter your ID and API Key for each, so that Centralpoint may merge it all into one unified report. This report may also be filtered by Audience (and role), allowing you to have all social media (for the parent company), as well as individualized report for each subsidiary or brand that you oversee.
This is also ideal for manufacturers who want to monitor the activity of their re sellers or dealers who represent their brand. We encourage manufacturers to consider gaining this consent from their distributors in an effort to monitor and preserve their brands. It is also possible to consider using this feature for your employees (given their consent to privacy waivers) which would allow you to monitor the brand of each employee who represents your company. This type of reporting would be limited to brand sensitive organizations (wherein their staff could potentially tarnish the corporate brand, and is striclty limited to the privacy/consent forms you would have in place with your employees.) Centralpoint's, out-of-the-box social media integration includes: Facebook, Twitter, Google, Youtube, Pinterest, Vimeo and Instagram.(Other may be added). Additionally, Centralpoint integrates with Slack and Yammer (in addition to these providers, for purposes of live reporting, data sources, and/or import of data from these sources.
-
-
-
-
-
-
-
2/19/2024 12:09:19 PM
-
https://qc.xoprod20.com/Uploads/Public/MobileIcons/Social_Media_Integration_Oxcyon_Centralpoint.jpg
-
|
19. |
The Federal Information Security Management Act (FISMA) requires federal agencies to implement and support standardized IT security controls. These controls, defined by the National Institute of Standards and Technology (NIST), allow agencies to safely and confidently outsource critical applications to FISMA-compliant clouds, managed hosting environments and SaaS providers. Designed to Address Strict FISMA Standards More than half of all federal cabinet-level agencies — including Veterans Affairs, the De...
- Site Map
- Everyone: All Users
- 9/13/2017
- Relevance: 25
-
-
12/31/9999 11:59:59 PM
-
Fedramp, FISMA, Federal Government Hosting, 21st Century Digital Experience, Managed Services, FedRAMP Compliance, FISMA compliant, US Government
-
-
-
-
-
-
-
-
12/20/2023 3:53:17 PM
-
-
|
20. |
Centralpoint by Oxcyon provides easy to implement AI (Artificial Intelligence) Assistants for Call Center AI & Artificial Intelligence
- Site Map
- Everyone: All Users
- 12/7/2018
- Relevance: 25
-
-
12/31/9999 11:59:59 PM
-
AI Assistant, AI Coach, Artificial Intelligence,Call Center AI, AI Chatbot, Guided Search, Cross Linking, iframe articles, Centralpoint, Gartner, Magic Quadrant
-
-
-
-
-
-
-
-
8/10/2023 4:53:36 PM
-
-
|
21. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 25
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:21 PM
-
-
|
22. |
- Centralpoint Update History
- Everyone: All Users
- 3/23/2009
- Relevance: 19
-
-
12/31/9999 11:59:59 PM
-
Centralpoint Updates, Centralpoint Version, Oxcyon Release, Centralpoint Release, Digital Experience, Magic Quadrant, ECM, Content Management, Portal, Enterprise, User Experience, MDM, Master Data Management, Gartner
-
-
- RTF Editor attributes that allow resources were previously doing a case sensitive replacement from /Console/Resource.ashx to /Resource.ashx when a document was saved. When the editor changed to XHTML compliant after the last sync it began converting all styles to lowercase. Because of this change the replacement had to be redeveloped without the case sensitivity. I have also added a replacement for /Console/Uploads/ to support standard file upload within the editor.
- When a web site search was executed, navigation items would be returned that were orphans (descendants of inaccessible or deleted items). When visited, these orphans would return a 404 error. The web site search now filters out these orphaned navigation items when searching a single audience, but this problem must be managed manually when using the new Search All Audiences web site search described later.
- A problem that caused “Ambiguous Column Name…” errors when searches were executed in some modules in the client console has been repaired. This repair has been made separately for several modules and fields.
- A bug that prevented the Structure / Navigation / Header Tags attribute from working properly has been repaired.
- All Telerik controls have been upgraded to the Q1 2009 release. This includes the changes listed here: http://www.telerik.com/versionnotes.aspx?id=1728. We primarily utilize the RadEditor, RadSpell, and RadUpload controls.
- A new parameter has been added to the FormListBox and FormRadioButtonList CpScripts and documented in the Scripting help file. The parameter is called DataFilter and only works when the SystemType is set to TaxonomyTier. The purpose of this property is to only display taxonomy items that have been selected in data. You can enter the system name of the console navigation item (module) containing the data, or enter cpsys_CurrentModule to have the system automatically generate the table name using the current module.
- The dynamic search controls that are used to generate the Structure / Modules / Home View (#1) search have been modified so that multiple form items that relate to the taxonomy of the module will be treated as separate fields. Previously all taxonomy fields were treated as a single field (Taxonomy) which caused searches to return results that were in any of the selected taxonomy. Even if this taxonomy was selected using different form items. Separating these form items causes the search to AND the different taxonomy form controls.
- Structure / Audiences / Company has a new attribute called Search All Audiences. This new attribute has been added to instruct an Audience’s web site search to search all audiences as opposed to only the current audience. Please read this attributes header text carefully before use.
-
-
-
-
-
-
4/2/2009 10:02:03 AM
-
-
|
23. |
- Centralpoint Module Gallery
- Deep Dive - Video Overview, Social and Collaboration, Content Management, Can be Cross walked against any (matching) record, Filtered by Audience (Channel of User), Filtered by Role (of User), Mobile (Responsive), Roles based authentication, Supports Advertising, Supports Search within Module, Supports Taxonomy, WYSIWYG Module Designer, Knowledge Management, Search Engine Optimization, User Experience, Interoperability, Supports Optional Ratings
- Everyone: All Users
- 1/14/2013
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Properly classifying data involves a multi-tiered ontology. This hierarchy comprises various levels, each defining the data's nature and context. Simultaneously, data is classified based on intended audiences or departments, tailoring content relevance. Adding another layer, data classification is influenced by security roles, ensuring access control.
Imagine this as a three-dimensional matrix of classification: the first axis delineates the data's core ontology, dissecting it into intricate facets. The second axis bifurcates data for diverse audiences or departments, aligning content with their specific needs. Lastly, the third axis encompasses data classification based on security roles, safeguarding sensitive information from unauthorized access.
In practice, this means each record is meticulously tagged with metadata, departmental relevance, and security clearance. This layered approach orchestrates a finely tuned orchestration of data, culminating in a harmonious symphony of contextualized, relevant, and secured information delivery.
Another way to describe this MphC (or Multi Polyhiearchical Classification) would be "Multi-Dimensional Hierarchical Classification" or "Nested Hierarchical Classification" which refers to a classification structure that combines multiple levels or dimensions of hierarchies in different dimensions, creating a complex and multidimensional classification structure. Specifically within Centralpoint these three separate dimensions involve metadata, audience or departmental assignment and then security roles. Each of these selectors offers its own N-tiered, tree view of options allowing for all centralized information to cascade and reach each user, by audience, department, and security roles. Should one use belong
Another way to describe this classification structure could be "Multi-Dimensional Hierarchical Classification" or "Nested Hierarchical Classification." These terms highlight the idea that the classification system involves multiple layers of hierarchies that are interconnected and nested within each other. This conveys the complexity and depth of the classification approach you're describing.
This results in a multi-tiered approach to managing your knowledge. It empowers you to distribute your information in a very granular way, to anyone (employees, clients, partners) from a singular, central point. Given that each multi selector is parental, this means that they are polyhierarchical (meaning more than tree, rather it considers the forest). Also, given that we employ three different (multi) selectors, it becomes Multi-Poly-Hierarchical. We didn't invent the term, it is simply what is called. The reason you may not have heard it before, is because we are the only vendor in the world to employ this architecture (fully, and to this level). It is also the only way that you will ever successfully centralize information within your organization, and with out it, will have to depend on multiple technology to simulate it.
-
-
-
-
-
-
-
2/19/2024 12:10:03 PM
-
https://qc.xoprod20.com/Uploads/Public/Centralpoint_Oxcyon_ContentManagement_MPHC.jpg
-
|
24. |
Introducing Oxcyon's Innovative WebHooks Module: Streamlining System and API Integration BATH, Ohio — Oxcyon, a leading provider of Centralpoint, a leading Digital Experience Platform is pleased to announce the launch of its latest module, Centralpoint WebHooks, designed to revolutionize the way businesses integrate their systems and connect with external APIs. With this innovative addition to the Oxcyon platform, organizations can seamlessly streamline data sharing, enhance workflow automation, and...
- Oxcyon In The News
- Everyone: All Users
- 6/5/2023
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
12/20/2023 3:51:17 PM
-
-
|
25. |
MD5 stands for "Message Digest Algorithm 5." It is a widely-used cryptographic hash function that produces a 128-bit (16-byte) hash value from any given input. The idea is similar to other hash functions: you input data (like a message or file), and you get out a fixed-size series of characters, which in the case of MD5 is 32 characters long in its hexadecimal representation. MD5 has been utilized in a wide variety of security applications and is also commonly used to check the data integrity of files. F...
- Site Map
- Everyone: All Users
- 9/15/2023
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/15/2023 5:10:39 PM
-
-
|
26. |
- Centralpoint Module Gallery
- Information Architecture
- Everyone: All Users
- 8/15/2017
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
This advanced module developed for IT and Developer personnel empowers you to configure query string and url schemas around your needs. This module gives you control over the rules which govern the URL strings created by your site. This is often required for multi site management, print friendly marketing campaigns and even search engine optimization.
-
This module was designed for technically savvy administrators only. The powerful rule based engine can lead to difficult to understand configurations and potentially break existing URLs. Some common difficulties and pitfalls include:
- All relevant routes are checked with every page load. Adding a large number of records to this module could affect the load time of every page in the site because the HttpModule executes on every page load and must check each route. URL generation is also executed multiple times per page load and a large number of complicated patterns may affect the performance of this feature. This is not an alternative to Admin > Error Messages/Redirects > Type = 404 Redirect. 404 Redirects are designed for migrating old dead URLs to new URLs and they are optimized to do that efficiently. Friendly URLs is designed for routing and generating the URLs of existing pages.
- Domain and Audience routing requires a Navigation or Document route. Domain and audience routes won't apply if the Routing module property is set to Fallback mode and the navigation and document portion of the path is not routed. The "System: Extension-Less URLs with Fallback Routing" record was designed to route all standard Centralpoint navigation and document paths. Enabling this record or restoring it to it's original values will typically resolve this problem.
- Routing is executed in the following order: Domain, Audience, and then Navigation & Document. If two records have the same order the newer record will be tested first. A preferred URL is chosen when building a URL in a slightly different way. When a document URL is being built records with specific documents selected will be tested first, and when a navigation url is built records with specific navigation items selected will be tested first. Records with no navigation item will always execute after those with specified values.
- Only managed (ASP.NET served) requests are supported by default. If you wish to route non-managed requests like .htm, .css, or .custom extensions you must set run AllManagedModulesForAllRequests to true in the Root/Web.Config. This will cause all HttpModules, regardless of their preCondition attribute setting, to fire on all requests which could lead to performance problems and unexpected behaviors.
- Conflicts may occur with the IIS URL Rewrite module. Similar redirects set up in the web.config or IIS could cause issues or even infinite loops. They should be removed from the web.config when they are added to this module.
- Permanent redirects are cached at many levels. When the Redirection module property is set to enabled and Enable Permanent Redirection Cache is set to Yes the browser and proxies will cache the redirection. If the preferred URL is changed later it may lead to 404 errors until browser cache is cleared.
- Changing URLs can lead to SEO problems. If the site has already been indexed by search engines you must ensure that the indexed URLs resolve properly including the appropriate canonical URL meta tags or redirect to the correct URL.
- Domain routing skips Default.aspx. If the site is using features that require the domain to redirect to Default.aspx then you cannot enable records with Type = "Domain." Domain routing automatically loads the the Default Path without the redirect to Default.aspx and then to the default path. The most commonly used features that require Default.aspx and are incompatible with Type = "Domain" are Admin > URL Redirect to Audiences and Admin > IP Manager > Action = "Redirect".
Utilizing this module typically involves creating or enabling a record and testing the route and URL generation then testing all other routes to make sure they weren't negatively affected. It is highly recommended that you set up and test one record at a time being sure to include the test URLs in the Test URLs attribute. A unique Notes attribute will display for each Type selection which explains how to configure that type for routing and generation. By default all system pages will generate a canonical URL meta tag when the page is loaded on a non-preferred URL, but the Redirection module property can be enabled to redirect to the preferred URL instead. You can use the Friendly URLs module to perform many URL manipulation tasks, some of which include:
- Supporting extensionless URLs. Enable the "System: Extensionless URLs with Fallback Routing" record to route and generate system URLs without the extension (.aspx). The legacy urls (including .aspx) will still be supported. If a hardcoded URL is accessed with the extension it will render normally including a canonical URL meta tag pointing to the preferred (extensionless) version of the URL. The path to all records will exclude the extension: /aud/nav or /aud/nav/doc.
- Enforcing all lowercase URLs. Enable the "System: Extensionless URLs with Fallback Routing" record, add .aspx to the Preferred URL if you'd prefer to keep the extensions ({smi}{doc}.aspx), and set Admin > Properties > Web Site Generated URL Casing to "Lowered". If a hardcoded URL is accessed in a different casing it will render normally including a canonical URL meta tag pointing to the correct casing. Set the Redirection module property to "Case Sensitive (Enabled)" to force a permanent redirection to the correct URL and casing.
- Supporting pathless audience homepages. Enable the "System: Pathless Audiences" record to route and generate system URLs that point to audience homepages without the homepage system name or extension. If a hardcoded URL is accessed with the homepage in the URL it will render normally including a canonical URL meta tag pointing to the preferred audience URL. This record will automatically utilize Site Architecture > Homepages > SystemName = "Home" for all audiences. If all audiences do not utilize this homepage you must create separate records for each audience/homepage combination. The path to all audiences will exclude the homepage: /aud.
- Supporting pathless domain homepages. Enable the "System: Pathless Domains" record and make sure that the Default Path and Navigation relate to the homepage of the Main audience to route and generate system URLs that point to the main audience home page without the audience or home page system name or extension. If a hardcoded URL is accessed with the audience and homepage in the URL it will render normally including a canonical URL meta tag pointing to the domain only. Set the Default Path and Navigation attributes accordingly to use a different homepage. The domain alone will render the main audience home page: /.
- Changing the audience system name. Create a new record with Type = "Audience", set the Pattern to the new audience system name supporting an optional trailing slash (custom-aud/?), set the Default Path to the home page portion of the URL (home), set the Preferred URL to the new audience system name (custom-aud), select the homepage under Navigation, and select a single Audience. You may also want to change the Order to 95 if you want to the "System: Pathless Domains" record to execute first.
- Changing the path to a document. Create a new record with Type = "Document", set the Pattern to the new path supporting an optional trailing slash (custom/doc/?), set the Preferred URL to the document path (custom/doc), select the Navigation, and select the Document. The selected navigation must have a page type of module and its module must include the selected document. The path will still contain the audience system name unless you have configured an audience specific domain: /aud/custom/doc.
- Changing the path to an HTML page. Create a new record with Type = "Navigation", set the Pattern to the path supporting an optional trailing slash (custom/nav/?), set the Preferred URL to the navigation path (custom/nav), and select the Navigation. The path will still contain the audience system name unless you have configured an audience specific domain: /aud/custom/nav.
- Changing the path to a module. Create a new record with Type = "Navigation", set the Pattern to the path including {doc} and supporting an optional trailing slash (custom/module{doc}/?), set the Preferred URL to the navigation path including {doc} (custom/module{doc}), and select the Navigation. The path will still contain the audience system name unless you have configured an audience specific domain: /aud/custom/module or /aud/custom/module/doc.
- Using a custom extension instead of ASPX. Open the site's Root/Web.Config file and set runAllManagedModulesForAllRequests attribute to "true" in configuration/system.webServer/modules. This will cause all HttpModules, regardless of their preCondition attribute setting, to fire on all requests which could lead to performance problems and unexpected behaviors. Disable the "System: Extensionless URLs with Fallback Routing" because this new record will handle all system URLs. Create a new record with Type = "Navigation", set the Pattern to include the custom extension ({smi}{doc}\.custom), set the Preferred URL to include the custom extension ({smi}{doc}.custom), and select All Site Map Items under Navigation. The path to all records will end in the custom extension (.custom): /aud.custom, /aud/nav.custom, or /aud/nav/doc.custom.
- Configuring an audience specific domain.Create a new record with Type = "Domain", set the Pattern to the audience specific domain (www\.yourdomain\.com), set the Default Path to the homepage portion of the URL (home), set the Preferred URL to the audience specific domain (www.yourdomain.com), select the homepage under Navigation, and select a single Audience to generate fully qualified URLs in canonical URL meta tags using your audience specific domain. By default audience specific domains do not support or generate the audience system name in the URL. If your site contains hardcoded URLs which include the audience system name they will return 404 errors which will be detected automatically by the error handler and redirected to the same URL without the audience system name regardless of the selection in the Redirection module property. If you would prefer to maintain the audience system name in the URL it should be included in the Default Path (main/home).
- Configuring a preferred domain. Create a new record with Type = "Domain", set the Pattern to catch all potential domains (.*), set the Preferred URL to your preferred domain (www.yourdomain.com), and select the related Audiences to generate fully qualified URLs in canonical URL meta tags using your preferred domain.
- Requiring HTTPS on a specific domain. Create a new record with Type = "Domain", set the Pattern to catch all potential domains (www\.yourdomain\.com), and select Yes under Requires HTTPS to generate fully qualified URLs in canonical URL meta tags using your preferred scheme. Set the Redirection module property to "Enabled" to force a permanent redirection to the correct scheme.
-
-
-
-
-
-
2/19/2024 12:10:19 PM
-
https://qc.xoprod20.com/Uploads/Public/MobileIcons/Centralpoint_Oxcyon_Digital_Experience_Platform_Friendly_URL.jpg
-
|
27. |
- Security Policies
- Security
- Everyone: All Users
- 7/25/2022
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:13:18 AM
-
-
|
28. |
Oxcyon has proposed it's Centralpoint Data Aggregation platform to the NIH to automatically ingest and report on data from over 23,000 Pulbic Waste Water Treatment plants nationwide to detect COVID-19. This proposed solution is designed to empower NIH to better monitor COVID-19 (and other) health related data, by municipality, county and state, which would not require any individualized testing. This solution aggregates data submitted from each participating location on a scheduled basis, allowing for o...
- Oxcyon In The News
- Everyone: All Users
- 6/6/2020
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
7/15/2020 7:23:59 PM
-
-
|
29. |
- Centralpoint Module Gallery
- Content Management, Deep Dive - Video Overview, Development Tools (Utilities), Knowledge Management, Strategy
- Everyone: All Users
- 12/28/2015
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This process allows for your terminology, product skus, laws, policies, and other pertinent information to be leveraged as a way to enrich your metadata, taxonomy and ontology....automatically.
Centralpoint's Data Cleaner covers HTML, Taxonomy, and Keywords, granting you the ability to manage condition dictionaries, including determining how many instances of a word or part number correspond to specific Taxonomy or keywords. For further insights, explore the extensive features we offer for MDM (Master Data Management).
The best way to understand how this tool can benefit your organization is to actually see it. We encourage you to set up a demonstration with us, so that we may step through the various routines online, via a MS/Teams Meeting demo, and we can address any of your questions or challenges .If you are interested in this new module, you may also want to see our Taxonomy Pre-Import Tool. Be sure to see our Data Transfer module for more information.
Types of Data Transformation which are supported and the required fields needed for each:
- Structured Data Sources
- MS/Sharepoint -Source Site URL, Title, List Title, Username, Password
- Oracle -Connection String/table name, any query or filter (credentials)
- MS/SQL -Connection String/table name, any query or filter (credentials)
- MS/Office 365- (Ondrive) Authorization, Source Folder (Office365 file Selector), Source Recursive (y/n), Source End Point (bulk or changes)
- OLEDB - Connection String/table name, any query or filter (credentials)
- ODBC - Connection String/table name, any query or filter (credentials)
- XML- ReadXML -XML Source (path to xml), Available tables and columns, Source Table Index
- XML- CpCollection –Source XML (path to xml), Default File, Source Directory, Number of Files to select, XSLT
- Delimited TXT (oledb)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Delimited TXT (Stream)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Active Directory – (Used to build employee directories typically) – Directory Path, Filter
- MS/Excel – Source File (path to excel, if not uploaded into centralpoint), Source Header row, Source Select Command (if any)
- RSS/ATOM- Source Feed URL (Web path to RSS Feed), Feed type (atom or rss)
- MS/Access- Source File (Path), Source Select Command (query)
- MS/Office365 – Source Authorization (Authorize), Source Folder, Source is Recursive, Source End Point
- Custom Provider – Typically used when ingesting from a WebAPI/Web Services – Source Type, Source Parameters (Custom covers virtually any configuration) wherein certain security considerations or custom methods must be passed in order to authorize or encrypt.
- Centralpoint to Centralpoint (Modules, Audiences, Taxonomy, Roles) – This is used when transforming data Centralpoint to Centralpoint or to an outside system, or after staging and testing initial imports.
- Unstructured
- File path (and/or credentials) to spider (Network drive, Any file path, web based drive (OneDrive- Source Directory, Source Pattern, Source Options. This feature also has the ability to spider all sub folders within a larger shared drive, ingested each record, and where applicable, fully text indexing, converting and preserving PDF, Word, XLS, PPT, Images, Videos and more. Additionally, the names from file folders (within the shared drive) may be included within the data cleaner/governance rules, to better organize content. Please see (below) Data Triage, which allows for your shared network drives to be ingested, allowing each file by type to be automatically organized into it's own unique module within Centralpoint.....automating the organization of all your information each day (via scheduled routines) and be made available on the internet, considerate of roles and authentication of each user.
When to consider INDEXING vs. INGESTING Data using Centralpoint Data Transformation
- Centralpoint supports both indexing or ingesting data. This is because you will want a federated search against all records, but need to preserve where some records currently live. In another case, you may need to have a new system of record or home to MOVE records into Centralpoint.
- You may want to avoid duplication of your records
- You may may need to consider the size of certain files (like CAD, Hi resolution images, etc.)
- You may need to consider the security of the file paths in which your files live today and user’s network accessibility to them.
- Indexing vs. Ingesting– The difference is whether you want to leave the record were it is found (to avoid duplication) in order to make it search able within Centralpoint, or whether you want to sunset an old system, where the new record will now live in Centralpoint as it’s new home. When creating your data transformation routine, the difference will be when field mapping ALTERNATIVE URL. Alternative URL is only used when indexing, allowing the path to record to be recorded in Centralpoint (as well as the enrichment), wherein the user will be returned to the original source, should they have the access to see the record. If you are intending to move the record to Centralpoint as the new system of record, then DO NOT USE Alternative URL, and make sure each record is moved during the ingestion (via an available) File Upload field.
- Security Consideration- Whether you are ingesting or indexing records using Data Transformation, always be sure to map the security roles from the system or path your scanning, in which to maintain who may see or access records (either indexed o ingested in Centralpoint)
Data Governance (Data Cleaner) considerations, when executing your Data Transformation.
Data cleaning is a separate module found under the Centralpoint Data Transformation suite of tools, which allow you to set up data governance rules which may work in unison with your Data Transformation routines.
- Keyword Generator – Used to enrich, supplement or add new keywords to any record, where certain values are is found (during mining).
- Example: If the word ‘apple’ is found, add keywords of ‘fruit, food, nutrition, pectin’ which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine : Search for?, attributes, add keywords
- Taxonomy Generator- Used to apply one or more metadata/taxonomy types when certain value(s) are found.
- Example: If the word ‘apple’ is found, apply to N-tiered taxonomy under Food/Fruit, which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine Search for?, case sensitive?, regex?, Taxonomy
- Attribute Generator – Used to apply new values in any field within one or more modules when certain value(s) are found (during mining).
- Example: If the term ‘Top Secret’ is found within any document, apply the value for the Role=Top Secret, to the ‘Roles’ attribute for any module. This will override the security roles for all documents which contain ‘Top Secret’
- What it will ask you for this routine : Search for?, regex?, value to add, attribute, which modules?
- HTML Cleaner- Used to clean or scrub any HTML or code where certain values are found (during mining). Often used to fix older or bad HTML or convert bad characters from MS/Word or faulty HTML being ingested.
- Example: Should you need to replace any fault HTML, codes or characters which includes “<b>Apple<b>, and replace with <b>Apple</b> (correcting the original faulty html)
- What it will ask you for this routine : Search for?, replacement type (html/text), replace with?
- Attribute HTML Cleaner- Used to apply new values into certain fields into specific modules whenever certain values are found (during mining)-allowing you to apply new values to any attribute as a result
- What it will ask you for this routine : Search for? , replacement type (html/text), replace with, attribute to add, which modules?
- Data Triage- Used to redirect certain file types into certain modules.
- Example, when spidering a shared network drive or database, you may want to deposit all documents containing ‘Marketing’ references into a module designated for only Marketing, or place all Excel documents found into it’s own module. This is used to organize content by type (within separate modules)
- What it will ask you for this routine: Search for?, regex (yes or no), searched attribute, destination modules, logging attribute
-
-
-
-
-
-
-
2/19/2024 12:08:54 PM
-
https://qc.xoprod20.com/Uploads/Public/datascrubbingthumbnail.jpg
-
|
30. |
- Centralpoint Module Gallery
- Data Aggregation, Data Transformation, Deep Dive - Video Overview, Development Tools (Utilities)
- Everyone: All Users
- 3/23/2023
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
Data Governance, Automated Metadata, Govern, Data Rules, Data Cleaner, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This process allows for your terminology, product skus, laws, policies, and other pertinent information to be leveraged as a way to enrich your metadata, taxonomy and ontology....automatically.
Centralpoint's Data Cleaner covers HTML, Taxonomy, and Keywords, granting you the ability to manage condition dictionaries, including determining how many instances of a word or part number correspond to specific Taxonomy or keywords. For further insights, explore the extensive features we offer for MDM (Master Data Management).
The best way to understand how this tool can benefit your organization is to actually see it. We encourage you to set up a demonstration with us, so that we may step through the various routines online, via a MS/Teams Meeting demo, and we can address any of your questions or challenges .If you are interested in this new module, you may also want to see our Taxonomy Pre-Import Tool. Be sure to see our Data Transfer module for more information.
Types of Data Transformation which are supported and the required fields needed for each:
- Structured Data Sources
- MS/Sharepoint -Source Site URL, Title, List Title, Username, Password
- Oracle -Connection String/table name, any query or filter (credentials)
- MS/SQL -Connection String/table name, any query or filter (credentials)
- MS/Office 365- (Ondrive) Authorization, Source Folder (Office365 file Selector), Source Recursive (y/n), Source End Point (bulk or changes)
- OLEDB - Connection String/table name, any query or filter (credentials)
- ODBC - Connection String/table name, any query or filter (credentials)
- XML- ReadXML -XML Source (path to xml), Available tables and columns, Source Table Index
- XML- CpCollection –Source XML (path to xml), Default File, Source Directory, Number of Files to select, XSLT
- Delimited TXT (oledb)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Delimited TXT (Stream)– Source Directory, Source Delimiter used, Source Text Qualifier, Source Header Row, Source Select Command
- Active Directory – (Used to build employee directories typically) – Directory Path, Filter
- MS/Excel – Source File (path to excel, if not uploaded into centralpoint), Source Header row, Source Select Command (if any)
- RSS/ATOM- Source Feed URL (Web path to RSS Feed), Feed type (atom or rss)
- MS/Access- Source File (Path), Source Select Command (query)
- MS/Office365 – Source Authorization (Authorize), Source Folder, Source is Recursive, Source End Point
- Custom Provider – Typically used when ingesting from a WebAPI/Web Services – Source Type, Source Parameters (Custom covers virtually any configuration) wherein certain security considerations or custom methods must be passed in order to authorize or encrypt.
- Centralpoint to Centralpoint (Modules, Audiences, Taxonomy, Roles) – This is used when transforming data Centralpoint to Centralpoint or to an outside system, or after staging and testing initial imports.
- Unstructured
- File path (and/or credentials) to spider (Network drive, Any file path, web based drive (OneDrive- Source Directory, Source Pattern, Source Options. This feature also has the ability to spider all sub folders within a larger shared drive, ingested each record, and where applicable, fully text indexing, converting and preserving PDF, Word, XLS, PPT, Images, Videos and more. Additionally, the names from file folders (within the shared drive) may be included within the data cleaner/governance rules, to better organize content. Please see (below) Data Triage, which allows for your shared network drives to be ingested, allowing each file by type to be automatically organized into it's own unique module within Centralpoint.....automating the organization of all your information each day (via scheduled routines) and be made available on the internet, considerate of roles and authentication of each user.
When to consider INDEXING vs. INGESTING Data using Centralpoint Data Transformation
- Centralpoint supports both indexing or ingesting data. This is because you will want a federated search against all records, but need to preserve where some records currently live. In another case, you may need to have a new system of record or home to MOVE records into Centralpoint.
- You may want to avoid duplication of your records
- You may may need to consider the size of certain files (like CAD, Hi resolution images, etc.)
- You may need to consider the security of the file paths in which your files live today and user’s network accessibility to them.
- Indexing vs. Ingesting– The difference is whether you want to leave the record were it is found (to avoid duplication) in order to make it search able within Centralpoint, or whether you want to sunset an old system, where the new record will now live in Centralpoint as it’s new home. When creating your data transformation routine, the difference will be when field mapping ALTERNATIVE URL. Alternative URL is only used when indexing, allowing the path to record to be recorded in Centralpoint (as well as the enrichment), wherein the user will be returned to the original source, should they have the access to see the record. If you are intending to move the record to Centralpoint as the new system of record, then DO NOT USE Alternative URL, and make sure each record is moved during the ingestion (via an available) File Upload field.
- Security Consideration- Whether you are ingesting or indexing records using Data Transformation, always be sure to map the security roles from the system or path your scanning, in which to maintain who may see or access records (either indexed o ingested in Centralpoint)
Data Governance (Data Cleaner) considerations, when executing your Data Transformation.
Data cleaning is a separate module found under the Centralpoint Data Transformation suite of tools, which allow you to set up data governance rules which may work in unison with your Data Transformation routines.
- Keyword Generator – Used to enrich, supplement or add new keywords to any record, where certain values are is found (during mining).
- Example: If the word ‘apple’ is found, add keywords of ‘fruit, food, nutrition, pectin’ which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine : Search for?, attributes, add keywords
- Taxonomy Generator- Used to apply one or more metadata/taxonomy types when certain value(s) are found.
- Example: If the word ‘apple’ is found, apply to N-tiered taxonomy under Food/Fruit, which will enhance search (searching fruit, and relate anything apple to any other record which may also relate to fruit or food)
- What it will ask you for this routine Search for?, case sensitive?, regex?, Taxonomy
- Attribute Generator – Used to apply new values in any field within one or more modules when certain value(s) are found (during mining).
- Example: If the term ‘Top Secret’ is found within any document, apply the value for the Role=Top Secret, to the ‘Roles’ attribute for any module. This will override the security roles for all documents which contain ‘Top Secret’
- What it will ask you for this routine : Search for?, regex?, value to add, attribute, which modules?
- HTML Cleaner- Used to clean or scrub any HTML or code where certain values are found (during mining). Often used to fix older or bad HTML or convert bad characters from MS/Word or faulty HTML being ingested.
- Example: Should you need to replace any fault HTML, codes or characters which includes “<b>Apple<b>, and replace with <b>Apple</b> (correcting the original faulty html)
- What it will ask you for this routine : Search for?, replacement type (html/text), replace with?
- Attribute HTML Cleaner- Used to apply new values into certain fields into specific modules whenever certain values are found (during mining)-allowing you to apply new values to any attribute as a result
- What it will ask you for this routine : Search for? , replacement type (html/text), replace with, attribute to add, which modules?
- Data Triage- Used to redirect certain file types into certain modules.
- Example, when spidering a shared network drive or database, you may want to deposit all documents containing ‘Marketing’ references into a module designated for only Marketing, or place all Excel documents found into it’s own module. This is used to organize content by type (within separate modules)
- What it will ask you for this routine: Search for?, regex (yes or no), searched attribute, destination modules, logging attribute
-
-
-
-
-
-
-
2/19/2024 12:07:44 PM
-
https://qc.xoprod20.com/Uploads/Public/Blogs/datacleanerthumb.png
-
|
31. |
Centralpoint features distinctive Data Transformation tools for automating Aggregation from diverse sources. It accommodates indexing and ingestion of both Structured and Unstructured data. This translates to aggregating information from various systems (SQL, Oracle, IBM, XML, JSON, CSV), even folders with files (PDF, Word, Images, Videos). The tools include Data Mining, which auto-classifies each record with accurate metadata and Taxonomy upon import. This empowers seamless searching across disparate sy...
- Site Map
- Everyone: All Users
- 10/18/2016
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
SQL Migration, Data warehousing, data migration, content migration, Data Mining, Automate Metadata, mass migration, data movement, sharepoint migration, sharepoint alternative, Oracle,
-
-
-
-
-
-
-
-
1/4/2024 10:01:47 AM
-
-
|
32. |
TDE stands for "Transparent Data Encryption." It's a security feature primarily used in databases to encrypt data at rest. Here's a simple breakdown of what TDE is and how it works: Purpose: The main goal of TDE is to protect data at rest by encrypting database files. This means that if someone were to gain unauthorized access to the physical files, they wouldn't be able to read the data without the encryption keys. How it works: 1. Encryption: TDE encrypts the entire database. It doesn't encrypt individ...
- Site Map
- Everyone: All Users
- 9/15/2023
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/15/2023 5:12:10 PM
-
-
|
33. |
Centralpoint's Data Cleaner (otherwise known as Data Goverrnance) collaborates seamlessly with Centralpoint's Data Transfer utility, automating metadata and Taxonomy assignment for your content. This empowers the transformation of any information that lacks proper metadata. Regardless of the information type—raw data from databases like Oracle, IBM, SQL Access, Excel, and documents such as PDFs, MS Word, or Excel—Data Cleaner ensures metadata and Taxonomy application to each record upon import. This pro...
- Site Map
- Everyone: All Users
- 8/21/2018
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
Data Mining, Automated Metadata, Taxonomy, Classification, Roles based, Security Assignment, Indexing, Crosswalks, Mashups
-
-
-
-
-
-
-
-
9/13/2023 1:53:00 PM
-
-
|
34. |
This document outlines procedures and protocols for notification of and response to a security incident or breach involving unencrypted electronic personal information processed and/or maintained by Oxcyon and its extended providers, servers, clients and organizations. SECURITY INCIDENT NOTIFICATION REPORTING & INVESTIGATION PROTOCOL A. Security Incident Reporting In the event that a data owner, technology staff member, or Information Technology Services representative identifies a potential s...
- Site Map
- Everyone: All Users
- 5/12/2011
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
Big Data, Centralpoint, Digital Experience, Security Policy, Oxcyon, Security, Incident, Cloud, Hosting, Managed service, monitoring
-
-
-
-
-
-
-
-
2/1/2018 2:24:49 PM
-
-
|
35. |
Let's be honest—finding internal information is tough. Data is scattered in silos, spanning unstructured sources like Word, PDFs, alongside structured systems. Centralpoint offers installation either On Premise or in the Cloud. It efficiently crawls, indexes, and integrates data from these silos. This creates a role-based, federated search, enriching metadata automatically to enhance Crosswalks. This means relating records from disparate, unrelated systems becomes feasible. Centralpoint empowers with au...
- Site Map
- Everyone: All Users
- 2/25/2021
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
Cortex, Syntex, Microsoft Project Cortex, Project Cortex, Sharepoint Syntex, Centralize, Knowledge Management, Intranet, Extranet
-
-
-
-
-
-
-
-
10/25/2023 6:29:29 AM
-
-
|
36. |
Centralpoint offers both on-premise and Cloud installations for effective Big Data management. It starts by ingesting structured and unstructured data from diverse silos. Each row or record it scans can be enriched through data governance or Data Cleaner rules, enabling complete text indexing and enrichment with metadata, Taxonomy, part numbers, etc. This enhances information, transforming it into knowledge and facilitating relationships between unrelated records. A federated search is achieved, accommod...
- Site Map
- Everyone: All Users
- 5/5/2023
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
10/25/2023 6:20:42 AM
-
-
|
37. |
What Is the GDPR? The General Data Protection Regulation (GDPR) is one of the biggest legislative changes made since 1975. To be effective from May 25, 2018, the primary goal of these changes is protection of personal data and rights of EU residents. Our Commitment toward GDPR We are fully committed to upholding the privacy and rights of our customers and their customers. The essence of the GDPR is in direct alignment with our core values of customer trust and data privacy. With that in mind, we are act...
- Site Map
- Everyone: All Users
- 5/23/2017
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
5/23/2018 9:33:22 AM
-
-
|
38. |
- Centralpoint Update History
- Everyone: All Users
- 3/23/2015
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
Centralpoint Updates, Centralpoint Version, Oxcyon Release, Centralpoint Release, Digital Experience, Magic Quadrant, ECM, Content Management, Portal, Enterprise, User Experience, MDM, Master Data Management, Gartner
-
-
Feature |
Summary |
CheckInButton CpScript
|
This new script adds a check-in button to a page. On click it modifies a value in a module and reloads the page to display a checked-in message.
|
Education > Courses
|
An issue was addressed when validators were not firing for Radio Button Lists and Form List Boxes.
|
ExtPagination CpScript
|
An issue was addressed where the pager was not showing the number of items correctly.
|
FormAddToCartButton CpScript
|
This script has been updated to return nothing when placed on a module that has not enabled Ecommerce.
|
Forms > Forms
|
Page Type > Module Attributes (Automatic) now supports a new attribute, Columns to Display. This will show the form in a one or two column display.
|
JPlayer CpScript
|
The ScriptType property is no longer case sensitive.
|
NavigationTier CpScript
|
The Format property now accepts {5} which will write 'parent-selected' when the parent navigation is the current navigation page.
|
SearchTerm CpControl
|
An issue was addressed with the Search Term result count when using the ModulePageOverrides CpControl.
|
Surveys > Surveys
|
This module has been updated to include the comments in the email when “Users can write comments for this survey” is checked within the Options attribute and Email Results is set to Yes. The CC Email Address and BCC Email Address attributes have also been updated to support multiple addresses.
|
-
-
-
-
-
-
4/7/2015 11:10:48 AM
-
-
|
39. |
The 21st Century Digital Experience Act, often referred to as the 21st Century IDEA (Integrated Digital Experience Act), is a pivotal piece of legislation that sets stringent requirements for digital experiences provided by government organizations. In light of this, Oxcyon, an esteemed industry leader boasting an impressive 24-year legacy, has emerged as a steadfast and forward-thinking solution provider dedicated to meeting the Act's exacting standards. Oxcyon's DXP: A Legacy of Excellence Oxcyon's il...
- Site Map
- Everyone: All Users
- 12/15/2023
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
12/15/2023 2:24:33 PM
-
-
|
40. |
Centralpoint offers on-premise or Cloud installation for managing your Big Data. It begins by indexing structured and unstructured data from various sources. Each scanned row can be enhanced through data governance or Data Cleaner rules, enabling comprehensive text indexing and enrichment with metadata, Taxonomy, part numbers, etc. This transforms data into knowledgeable content, fostering relationships between seemingly unrelated records. A federated search is then realized, synchronized with user roles...
- Site Map
- Everyone: All Users
- 5/5/2023
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
10/25/2023 6:28:02 AM
-
-
|
41. |
Below are the security measures and security procedures Oxcyon follows to ensure the safekeeping of original documents when offering managed hosting services. If Centralpoint is set up on-site or in a cloud environment, the client would need to implement and oversee these same measures. First, an overview on what original or authoritative Documents are in simple terms is like a system or set of rules to manage important papers or digital files in an organized way. Imagine you have a big library, an...
- Site Map
- Everyone: All Users
- 9/12/2012
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/15/2023 5:06:26 PM
-
-
|
42. |
What is Section 508 Compliance? § 1194.1 Purpose. The purpose of this part is to implement section 508 of the Rehabilitation Act of 1973, as amended (29 U.S.C. 794d). Section 508 requires that when Federal agencies develop, procure, maintain, or use electronic and information technology, Federal employees with disabilities have access to and use of information and data that is comparable to the access and use by Federal employees who are not individuals with disabilities, unless an undue bu...
- Site Map
- Everyone: All Users
- 8/26/2016
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
508, Portal, Enterprise, Content Management, Digital Experience 508
-
-
-
-
-
-
-
-
2/1/2018 2:14:13 PM
-
-
|