AU2012276286A1 - Information management systems and methods - Google Patents

Information management systems and methods

Info

Publication number
AU2012276286A1
AU2012276286A1 AU2012276286A AU2012276286A AU2012276286A1 AU 2012276286 A1 AU2012276286 A1 AU 2012276286A1 AU 2012276286 A AU2012276286 A AU 2012276286A AU 2012276286 A AU2012276286 A AU 2012276286A AU 2012276286 A1 AU2012276286 A1 AU 2012276286A1
Authority
AU
Australia
Prior art keywords
information
data storage
tender
request
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2012276286A
Inventor
Bernard BLAKE
Oliver FURNISS
Leigh JASPER
Benjamin Lehman
Justin MCKINLAY
Robert PHILLPOT
Nicholas STRYBOSCH
Renato ULPIANO
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aconex Ltd
Original Assignee
Aconex Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aconex Ltd filed Critical Aconex Ltd
Publication of AU2012276286A1 publication Critical patent/AU2012276286A1/en
Priority to AU2017203170A priority Critical patent/AU2017203170A1/en
Priority to AU2017204903A priority patent/AU2017204903A1/en
Abandoned legal-status Critical Current

Links

Description

I nformation management systems and methods
Background of the invention:
One of the most valuable elements of any business is the accumulated experience, knowledge and relationships held by the people that operate the business. Those elements comprise significant and valuable know-how regarding how to operatethe business, but also usually provide a significant competitive advantage in sourcing information and leads for new potential customers and suppliers.
When the operator of a business leaves, often the accrued experience and relationships also leave- it's unusual for such things to be documented and even if they were, usually very difficult to hand over. Further, when a new business is established, without retaining a person with accrued knowledge or relationships, there is no current efficient method to acquire such experience.
This issue is particularly relevant to small businesses who deal with many different suppliers, such as construction suppliers who often engage subcontractors to do discrete works on an ad hoc basis. Without established relationships it can take significant trial and error to find a stable, reliable and good quality team of sub-contractors to cover each aspect of the required scope of works. Further, businesses with significant relationships often receive many more referrals and. without experience and established relationships it is difficult to obtain significant referrals.
I nformation management systems comprising software applications may be useful in creation, management and use of such information. Such applications however have become increasing complex, providing the user with many different configuration options. However the increasing complexity and number of options has meant that software can be
increasingly difficult and time consuming to use. Even for expert users who understand the different options and arefamiliar with the way in which they are presented by thesoftware, the number of different options can mean that simpletasks or configurations can take longer to completeor set-up than might be possiblethrough a bespoke approach.
There are a number of known methods to address this issue. For example, some software vendors produce different versions of the same software, one version being aimed at novice users (presenting only those options a novice user is likely to be interested in) and another being aimed at expert users (presenting all available.options). However this method does not successfully address the issues that sometimes it is more efficient even for expert users to use a more streamlined interface for simpletasks. Another commonly used method is to provide a number of pre-configured templates for different tasks or environments, which theuser can select. In thisway an expert user may select a complex configuration when required to complete complex tasks and a simple template when required for simpletasks. However this method is usually not suitablefor novice users who are not sufficiently experienced to determine which pre-configured template to select. Further, this method relies on appropriatetemplates being constructed before time.
Such software applications could operate locally on the client or be hosted on a network (often ref erred to as "software as a service" or "cloud computing"). Hosted applications are becoming more popular as network performance improves and bandwidth cost reduces in many locations around the world. They provide significant benefits in that processing can be done centrally, significantly reducing the local client requirements and enhancing access by remotely located end users.
However, in some geographies and circumstances hosted applications (particularly those which are data intensive) are not desirabledueto no network connectivity, slower network connectivity than required or desirable or relatively expensive bandwidth.
These issues are particularly acute for, as one example, companies involved in construction projects. Such projects typically involve a number of different remotely located parties (some of whom may not have any, consistent, fast or commerciall cost effective I nternet access) and a number of large data intensive documents (such as CAD drawings). Some particularly large construction projects are undertaken in geographies where I nternet access is relatively expensive.
Further, modern features of hosted applications such as messaging, centrally controlled security roles and permissions and managing multipledocument revisions across multiple party edits do not translate or translate appropriately to locally hosted applications.
The reference to any prior art in this specification is not, and should not betaken as, an acknowledgement or any form of suggestion that the prior art forms part of the common general knowledge.
Summary of the invention:
According to one aspect of the invention there is provided a system for managing
information comprising a data comparison module and optionally a communications module wherein the data comparison module enables refinement of information queries without the need to undertake one or more of rebuilding, re-categorizing or re-indexing the information and wherein the communications module facilitates communication between participants in the system.
The system may be adapted for handling tender information and / or sharing information between a customer and a supplier and it may be adapted to create a request for tender from a set of information. Information relevant to a request for tender may be interactively displayed to an end user. The information may also include potential recipients of a request for tender.
A potential supplier may be selected in any suitable way, for example: automatically from a database or interactively by a user.
Information may be selectively shared between a customer and a supplier and it may be automatically validated against a database which is optionally authoritative.
In the present system, a tenderer may respond to a request for tender and one or more . documents may be created from information stored or exchanged between parties in the system.
Documents may be of any suitable type, for example contractual, architectural, project management or other documents.
I n one embodiment, a data comparison module comprises of local data storage, remote data storage and a user interface. Optionally, the user interface may provide a system for creating atemplate comprising a criteria analyser to analyse one or more operational criteria and thereby enable creation of one or more suitable templates.
In one aspect of the invention there is provided a method for managing information comprising receiving an information query, refining the information quay without undertaking one or moreof rebuilding, re-categorizing or re-indexing the information; and optionally facilitating communication between a plurality of participants in an associated information management system.
The system may also handle tender information and / or sharing information between a customer and a supplier and it may create a request for tender from a set of information. Information relevant to a request for tender may be provided in any suitable form, for example it may be interactively displayed to an end user. The information may include potential recipients of a request for tender and a potential supplier may be selected in any suitable way, for example, automatically from a database or interactively by a user.
The method of this aspect may allow information to be selectively shared between a customer and asupplier. The information may also be validated, for example automatically validated against a database which is optionally authoritati ve. One or moredocuments may be created from information stored or exchanged between parties in thesystem.
I n another aspect of the invention there is provided an information management system comprising a local data storage, a remote data storage, and a user interface for requesting information wherein one or more methodologies may be used to access the information depending on thecontext. I n another, there is provided an information management system comprising a local data storage, remote data storage, and a user interface for requesting information wherein transfer of information between the remote data storage and local data storage is proactively managed according to one or more criteria
I n some embodiments, at least one copy of a document stored on the remote data storage may also be stored on a local data storage. A document may be stored in the local data storage based on one or more criteria, which may bedynamically adjusted. Authentication and / or security parameters which for example may be stored on the remote data storage may be used to determine whether an end user may access particular information, such as a document.
Documents may be copied in any suitable way, for example they may be proactively copied to the local data storedepending on oneor more parameters, which may bedynamically adjusted,
A communications component may also be provided to communicate with another system to deliver adocument to a user interface via a preferred path depending on oneor more set criteria, which may be optionally dynamically adjusted. Thesystem may also enable or provide offline access to information through a standardised interface.
In another aspect there is provided an information management method comprising the steps of: receiving a request for information from a remote data storage, analysing the context of the request and based on the analysis, selecting an information transfer methodology. Another aspect provides an information management method comprising the steps of: receiving a request for information from a remote data storage, analysing the request and proactively managing transfer of information based on one or more criteria.
The method may includethestep of storing on a local data storage at least one copy of a document stored on the remote data storage. There may be an additional step of selectively storing adocument in the local data storage based on oneor more criteria, which may be dynamically adjusted. Authentication and / or security parameters which may be stored on the remotedata storage may be used to determinewhether an end user may access particular information, such as a document. Documents may be copied in any suitable way, for examplethey may be proactively copied to a local data store depending on oneor more parameters, which may be dynamically adjusted. The method may also comprise communicating with another system to deliver a document to a user interface via a preferred path depending on one or more criteria, which may bedynamicalty adjusted. The method may also provide offline and optionally read-only accessto information through astandardised interfaceto enable access, for example, if the remote system is inaccessible.
Another aspect is a system for creating a request for tender from a minimum set of information. Additional information may optionally beobtained regarding the tender from a database and information relevant to a request for tender may be interactively displayed to an end user. Any suitable types of information may be used, including potential recipients of the request for tender
In one embodiment of this aspect, thedatacomparison module comprises of local data storage, remote data storage and a user interface. Optionally, the user interface may provide a system for creating atemplate comprising a criteria analyser to analyse one or more operational criteria and thereby enable creation of oneor more suitable templates.
In another aspect of the invention, there is provided a system or method for the sharing of information between customers and suppliers comprising a data comparison moduleto enable refinement of information queries without the need to undertake one or more of rebuilding, re-categorizing or re-indexing the information. In some embodiments, information may be selectively shared between customers and suppliers. In some embodiments, shared information may be automatically validated against an authoritative database. In some embodiments, tenderers may respond to requests for tender - for example via a communications module.
I n some embodiments, packages of contractual documents are created from information stored or exchanged between the contracting parties in thesystem.
In some aspects, the present invention may provide one or moreof:
(a) a method of recording, organising and sharing business knowledge while retaining confidentiality and privacy;
(b) a convenient method for using shared knowledge to assist a customer to create an invitation to tender, including using accrued experience to create price quotes and shortlistsof potential suppliers;
(c) a convenient method for a customer to create and deliver invitations to tender to potential suppliers; (d) a convenient method for suppliers to be notified regarding and to receive invitations to tender from potential customers;
(e) a convenient method for suppliers to review invitations to tender as compared to previous invitations to tender and aspects of accrued knowledge, including pricing, other suppliers and regulatory information;
(f ) a convenient method for suppliers to respond to invitations to tender , whether to request further information, reject the invitation or respond to the invitation with a tender; and
(g) aconvenient method to create contractual documentation from information
contained within the system, and optionally including information from responses to a tender
Another aspect of the invention is a data comparison system comprising local datastorage, remote data storage, and a user interface for requesting information wherein transfer of information between the remote data storage and local data storage is proactively managed according to one or more criteria. A further aspect of the invention is a method of information management comprising the steps of requesting information from remote data storage, analysis of the information transfer context and choice of an information transfer methodology
I n some embodiments, the system uses authentication and security parameters stored on the remote data storage to determine whether an end user can access a particular document. Documents may also be proactively copied to the local data store depending on certain parameters, which may bedynamically adjusted in some embodiments.
In another aspect, there is provided a system for providing offline access to data through a standardised interface.
I n some embodiments, the present invention addresses issues in access to remotely stored electronic data by blending different types of access methodologies seamlessly depending on the characteristics of the end user and their situation while at the same time managing issues such as security and document revisions.
The user interface d accordance with the present invention provides a system for creating a template comprising a criteria analyser to analyse one or more operational criteria and thereby enable creation of one or more suitable templates.
I n a further aspect of the invention, there is provided a system for creating a template comprising a criterion analyser to analyse one or more criteria and thereby enable creation of oneor more suitabletemplates. Theterm 'template' as used herein is used broadly to describe an interface for human use.
The system may also comprise a template element store, an element selector and a rendering engine, wherein the element selector selects one or more template elements based on output from the criterion analyser for rendering by the rendering engine. I n some instances, an element is selected based on relevance to one or more of information provided by a user or information derived from information provided by an end user. Elements may comprise any suitable thing, for example, they may comprise configuration information for a software application and / or components of one or more documents.
I n one aspect of the invention, there is provided a method for creating atemplate comprising analysing one or more criteria and creating one or more suitable templates. The method may comprise the steps of storing a template element in a template element store, selecting an element from the template element store based on output from the criterion analyser and rendering a tempi ate from oneor more selected template elements. An element may e selected based on relevance to ether information provided by a user or information derived from information provided by an end user. Elements may comprise any suitable thing, for example they may comprise configuration information for a software application and or components of oneor more documents.
The current invention provides a convenient system for dynamically identifying and creating an optimal template configuration required by the end user based upon a minimal set of input parameters. Further, the current invention provides for a convenient method of sharing and updating individual template elements, which are dynamically used by the system where required to create an optimal outcome.
I n a further aspect, there is provided an information management system comprising a data comparison module, a local data storage, a remote data storage, a user interface for requesting information, optionally a communications module and optionally a criterion analyser to analyse one or more criteria and thereby enable creation of one or more suitable templates wherein: the data comparison module enables refinement of information queries without the need to undertake one or moreof rebuilding, re-categorizing or re-indexing the information; the communications module facilitates communication between participants in the system ; one or more methodologies may be used to access the information depending on the context; and transfer of information between the remote data storage and local data storage is proactively managed according to one or more criteria
I n another aspect, there is provided a method for managing information comprising:
receiving an information query; refining the information query without undertaking oneor moreof rebuilding, re-categorizing or re-indexing the information; analysing the context of the request and based on the analysis selecting an information transfer methodology;
analysing the request and proactively managing transfer of information based on one or more criteria; optionally creating a template by analysing one or more criteria and creating one or more suitable templates; and optionally facilitating communication between a plurality of participants in an associated information management system.
Throughout this specification (including any claims which follow), unless the context requires otherwise, the word 'comprise', and variations such as 'comprises' and 'comprising', will be understood to imply the inclusion of a stated integer or step or group of integers or steps but not the exclusion of any other integer or step or group of integers or steps.
Brief Description of Drawings
Figure 1 shows atypical embodiment of one aspect of the invention in a client server architecture
Figure 2 shows in one aspect of the invention an example search for a supplier based on key attributes
Figure 3 shows in one aspect of the invention an example of a real-time search for supplier based on key attributes and display of further key attributes derived from the data aggregation module
Figure 4 shows in one aspect of the invention an example for creation of an invitation to tender to an external party
Figure 5 shows in one aspect of the invention a search for invitations to tender
Figure 6 shows in one aspect of the invention an exemplary software application that can be used in the current invention
Figure 7 shows in one aspect of the invention an example of a template creating user interface
Figure 8 shows in one aspect of the invention an example of the user interface in accordance with the invention
Figure 9 shows another embodiment of the user interfacein accordance with the invention
Detailed description of exemplary embodiments: It is convenient to describe the invention herein in relation to particularly preferred embodiments relating to businesses in the building and construction industry. However, the invention is applicableto awide range of industries and it is to be appreciated that other constructions and arrangements are also considered as falling within the scope of the invention. Various modifications, alterations, variations and or additions to the construction and arrangements described herein are also considered as falling within the ambit and scope of the present invention.
I nformation management System
I n this example embodiment, the system comprises the following modules:
(a) data aggregation module;
(b) data comparison module;
(c) communications module; and
(d) user interface module.
A data aggregation module may be a conventional electronic data store (such as acomputer database or file system) and is used by the system to store and retrieve information.
The data comparison module operates comparison functions on thedatasuch that it aggregates relevant data from the data aggregation module. For example, thedata comparison module may request all suppliers in a geographic area from the data aggregation module, but apply a filter combining data from external sources to narrow the returned dataset to be more relevant to the requested data I n this way optimisations and queries can be modified in near real-time and continuously refined and added to using new data sources without rebuilding, re-categorising or re-indexing the entire system and optionally without rebuilding, re-categorising or re-indexing components of the system.
The communications module facilitates communication between participants in the system. The communications module can be implemented using a conventional communication protocol and optionally records information in relation to communications via a
communications log available in thesystem.
The user interface module is used to display information and receive input (including requests) from the end user. It isconvenient to desaibethe user interface module as being a website, though any convenient method of display and input could be used. In atypical embodiment information accessible to the data aggregation module, data comparison module and communication module might be stored in electronic form in a . remote database such as a server accessible by a computer on a network or through any hosted interface. Remote access to the information (here, documents) is provided through a user interface layer separatefrom the remote data store which accesses information stored in the remote data store over the network using any suitable method.
Again it is convenient to envisage the modules to be configured in a conventional arrangement for a website, but other arrangements of the modules would also operate as desired (such as all modules being located on a client computer and operating in a peer-to- peer environment via the data comparison module).
Access to Electronic information
I nformation pertaining to the business can be stored in an electronic form which can be accessed locally or by means of a computer on a network or through a hosted application. In one preferred embodiment information such as a set of documents is stored in electronic form in a remote database such as a remote data store in a suitable electronic file format. Remote access to the information (here, documents) is provided through a user interface layer separatefrom the remote data store which accesses information stored in the remote data store over the network using any suitable method.
The user interface layer can optionally access the information in the remotedata store indirectly by requesting the information from an intermediate software application rather than the remote data store.
In some embodiments, there is provided an information management system comprising a local data storage, a remote data storage, and a user interface for requesting information wherein one or more methodologies may be used to access the information depending on the context. I n some embodiments, there is provided an information management system comprising a local data storage, remote data storage, and a user interface for requesting information wherein transfer of information between the remote data storage and local data storage is proactively managed according to one or more criteria
In some embodiments the remote system is able to still maintain an audit trail of the access viathe local system and in some embodiments the local system is able to support multiple users without compromising security. Theskilled addressee will appreciate that in some configurations, the data transfer ratefrom the remote data store is noticeably slower than the local data store and thereby particularly understand various benefits of the invention in that light.
For ease of reference, the exemplary software application described herein is referred to as 'Blinky' (See Figure 6). The user interface layer may be configured so that, using a series of probing network requests, it may attempt to discover the existence of a software application such as Blinky and automatically configure itself to use a conveniently located installation.
I n this preferred embodiment the software application, Blinky is located within the local network of the relevant end user such that access to Blinky is sufficiently fast and cost effective in accessing and delivering data In some embodiments, the software application has a local data store in which it can retain a copy of information such as one or more documents.
As a non-limiting example, an end user may access a stored electronic document in the following way (Figure 6).
1. The end user navigates to the document in the user interface and uses any convenient method to request thedocument;
2. Assuming the user interface is configured to use Blinky (having either been manually configured or through an automatic configuration process), it requests the document from Blinky;
3. Blinky checksto see if thedocument is in the local data store;
4. If thedocument is in the local data store:
a. Blinky requests the version information from the remote data store; b. If thedocument exists in the remote data store and is the same version as the local data store version then:
i. Blinky requests security information from the remote data store
regarding the document ;
1. If the user requesting the information is permitted to access thedocument, Blinky sends the document to theuser interface that requested the document from the local data store without requesting the full document from the remote data store;
2. Otherwise, Blinky returns an appropriate "not authorised" error. c. Otherwise
i . Blinky requests the document from the remote data store using the security credentials of the user ;
ii. If the remote data store returns a document, Blinky stores that
document in the local data store and serves it to the user interface that requested the document;
iii. If the remote data store returns an error in any of the above steps (either no document exists or the end user is not authorised), Blinky passes the error through to the end user.
5. Otherwise
a Blinky requests the document from the remote data store using the security credentials of the user;
b. If the remote data store returns a document, Blinky storesthat document in the local data store and serves it to the user interface that requested the document;
c. If the remote data store returns an error in any of the above steps (either no document exists or the end user is not authorised), Blinky passes the error through to the end user.
I n this way Blinky is able to quickly and cost effectively deliver documents to the end user.
As a further non-limiting example, an end user may access a stored electronic document in the following way.
1. The end user navigated to the document in the user interface and uses any
convenient method to request the document with a particular set of attributes;
2. Assuming the user interface is configured to use the local datastore (having either been manually configured or through an automatic configuration process), it requests the document from the local datastore;
3. If adocument potentially matching the request is located in the local data store: a. The local data store requests additional information from the remote data store, which may include version information and other attributes;
b. If thedocument exists in the local data store and hasthesamematching
attributes as the remote data store, then: i. The local data store sends the user's security information with a request to access the document;
ii. If the remote data store confirms the user is permitted to access the document:
1. The remote data store assumes the user has accessed the
document and updates an audit log to reflect that operation
2. The local data store sends the document to the user interface that requested the document from the local data store without requesting the full document from the remote data store; iii. Otherwise,
1. The remote data store records in the audit log an unauthorised access by the user that was rejected
2. The local data store returns an appropriate "not authorised" error to the user i nt erf ace.
If there was no matching document, or the document was found to have different attributes
a. The local data store requests the document from the remote data store using the security credentials of the user;
b. If the remote data store authorises the user to access that document:
i. The remote data store will update the audit log to record the user has downloaded the document
ii. The local data storewill then be able to retrieve that document from the remote data store, store the document and serve the document to the user interface. (The system may for example stream the document to the user as it is downloaded, in such cases it does not have to wait until the entire document is stored locally before sending it to the user.)
c. Otherwise
i. If thedocument exists but the user was not authorised to accessthe document, the remote data store updates the audit log to reflect there was an unauthorised attempt ii. The remote data store responds with an appropriate error which the local data store passes onto the end user.
I n this way the Local Data Store is able to quickly, securely and cost effectively deliver documents to the end user.
In some embodiments, the invention may determine whether document requests are for static documents or dynamic interaction with an application. If a request is for adynamic interaction, the request is passed through to the remote application rather than being dealt with by the software application (such as Blinky).
I n some embodiments, a software application may pro-actively download documents which are more likely to be requested by end users. For slower network connectivity, this can avoid delays when a document is first requested. Likelihood of requesting a document can be determined in any suitable way, including for example:
1. Heuristic categorisation of documents
2. Measuring historical document frequency
3. ' Measuring historical document frequency by type
4. End User characteristics and document types (for example, on a construction project an engineer is likely to access particular documents which are different from the documents accessed by a construction contractor)
5. End User interaction (for example, the software application may proactively download documents which are currently displayed as an option for access by the end user, which is particularly helpful to reduce latency where a network connection is slow but bandwidth is inexpensive)
6. Time and date (for example, the software application may refresh large
documents outside of working hours)
In order to sustain end user performance, pro-active downloading of documents can be throttled or turned off depending on a number of criteria, including for example:
1. The current document request load
2. The current bandwidth utilised by interactive tasks (so as to promote interactive response times rather than downloading documents) 3. The current document fault rate (that is, the number of times the software application needsto request adocument from the remote data store)
4. Where bandwidth costs are prohibitive (for example, it could be turned off
entirely or only operated during "off-peak" hours to reduce cost)
5. Time and date schedules
I n order to predict whether to access and proactively download a particular document; a document cost may negotiated between the local document store and remote document store. This negotiation is unique to each installation and can be refreshed multiple times per day if circumstance change. The local document store and the remote document store each contribute characteristics regarding the document to the negotiation, including for example:
1. The size of the document (remote document store)
2. The speed of the internet connection (local document store)
3. Thecost of bandwidth (local document store)
4. The frequency of accessing that document by others outside the local network (and thereby measure the likelihood of there being a conflict in document revisions) (remote document store)
5. The frequency of access to that document within the local network (local
document store)
If the negotiated document cost meetscertain criteria (which may be expressed as a multidimensional threshold) then the document is marked as a candidate for pro-active download.
In addition, such metrics are used to determine when adocument should be pushed back up to the remotedata store, including the likelihood that another revision will be made locally before another revision is made in adifferent remote location.
As a further optional feature, the invention may store a hash table of common content (when viewed in a binary manner or at a higher level) between documents locally and only transmit an encoded copy of the document between the remote and local document store. This is particularly useful when a number of similar documents are used by the local document store.
I n some embodiments, if the local data store has an older version of the document, the remote data store could send only the differences between the two versions. I n some embodiments, the invention may also reconcile documents which have been simultaneously downloaded to multiple local data stores, enabling multiple installations to work together. This is important where the invention is embodied in a network device which is portable and may already have a number of documents in its local document store.
Working together, such implementations can be used remotely, then attached to the same network seamlessly taking advantage of the aggregated documents in each respective local document store. Multiple installations may for examplework together in thefollowing way (using Bl inky as an example):
1. When a Blinky installation is activated it first attempts to discover other Blinky
installations using known techniques for sending network broadcast messages.
2. if no other Blinky installation isdiscovered, Blinky continues to operate in standalone mode.
3. If another Blinky installation is discovered, the Blinky installations record the
existence of each other on the local network.
4. On discovery, each Blinky installation exchanges with the other a list of the
documents in the local document store.
5. When adocument is requested from one Blinky installation, it performsthe normal operations regarding security and whether the document exists in the local document store. If at any stage a Blinky installation requires access to the document from the remote document store, the Blinky installation consults the list of documents stored in local Blinky installations and, if adocument exists, download it from the local Blinky installation rather than the remote document store.
I n some embodiments, multiple installations may for examplework together in thefollowing way (also using Blinky as an example):
1. When a Blinky installation is activated it first attempts to discover other Blinky
installations using known techniques for sending network broadcast messages.
2. If no other Blinky installation is discovered, Blinky continues to operate in standalone mode.
3. If another Blinky installation isdiscovered, the Blinky installations record the
existence of each other on the local network.
4. When adocument is requested from one Blinky installation that does not have the correct document, the request could be broadcast to other Blinky installations to determine if the document is already held locally in another data store. If another local data store does hold the document, the end user request can be redirected to the other local data store, which would still perform the same authentication checks, but would avoid copying the file from the remote data store.
A system according to the invention may also contemplate operating modes where network connectivity is not available, either for short or longer periods.
In the case of short periods of disconnected operation, the system may for example function as normal ; however requests for documents from the remote data store may in this instance return an error indicating that those documents are currently not available.
A disadvantage of some such approaches is that it may not be possible to access remotely hosted elements of the user interface without network connectivity. I n such cases the system can operate a "local copy" system. Local copy is a logically separate operating mode from that exemplified herein as Blinky in that local copy is a complete copy of the remote document store on a local computer together with a modified user interface module which looks similar to the complete user interface module, but is simpler and provides only for read access.
User Interface
I n some preferred embodiments, the system comprises at least five components (Figure 7).
(a) Operational Criteria
(b) A Resolution Engine
(c) A Template Store (containing Template CkDmponents described in a Description Language)
(d) A Statistical Analytic Resolver (containing zero or more Weighting Models)
(e) A Rendering Engine
I n these embodiments, each of the five components are used, for example, either in parallel or in a particular, order, and for example in series, to resolve an optimal configuration of Template Components for implementing Operational Criteria based on a number of input parameters.
Operational Criteria The intent of the system is to create an optimal template based on the I nput Parameters provided. The Operational Criteria define the criteria for determining whether a particular template is the optimal implementation.
For example, one optimal implementation may be to ensure that use is made of all I nput Parameters provided by the end user, and such a requirement would be recorded in the Operational Criteria An example alternative optimal implementation may be one which uses all parameters, whether they were provided by the end user or resolved using another method (such as by the Resolution Engine). A further exampleof an Operational Criterion is one that produces a template with the least number of steps to completion. Any number of different criteria can be used as Operational Criteria.
In some embodiments, if no Operational Criteria are provided, the system will produce all possible templates based on the Template Store and the I nput Parameters.
Resolution Engine
I n some embodiments, a Resolution Engine is used to expand the I nput Parameters to include information which was not first entered by an end user. Such further information may be obtained from public and / or private information stores, such as company registers, internal documents, etc.
For example, if the name of the end user is passed into the Resolution Engine, the engine may for examplequery publicand / or privatedatabasesto determinethe industry in which the end user works, the typical projects in which the end user is involved and the
geographical regions in which it is involved. All of that information would then be added to the I nput Parameters first provided by the end user (but marked as being resolved from the Resolution Engine) for further use by the system.
Template Store
Some embodimentsoomprise aTemplate Storewhich is a storage system (such as adatabase or computer file system) which contains Template Components. Each Template Component is described in a Description Language.
Template Components (or Template Elements) I n some embodiments, Template Components may contain disaete elements of adocument or project configuration.
A Template Component (or Template Element) may be characterised by a number of required input parameter conditions and input parameter information, each with different weightings based on importance to the Template Component. Further, each Template Component may name zero or more dependant Template Components as either being optional or required for the current Template Component.
As one example in the context of adocument management system, theremay be Template Components for the following elements of the system .
1. Email format for change requests
a. Required input parameter conditions: there is a project definition, the project definition can be modified, communication can be by email
b. Input parameter information: none
c. Dependant Template Components: none
d. Template Component: the format for the change request email
2. Regulatory requirements for construction projects in the Middle East
a. Required input parameter conditions: project is a construction project, location is Middle East ( b. I nput parameter information: none
c. Dependant Template Components: none
d. Template Component: regulatory business rules for construction projects
3. Currency conversion from USD to AUD
a. Required input parameter conditions: project has a cost; location is United
States; location is Australia
b. I nput parameter information: none
c. Dependant Template Components: none
d. Template Component: regulatory business rules for construction projects
Description Language I n some embodiments, each Template Component isdescribed using a Description
Language. The Description Language can beany computational language, but is preferably a language that supports conditional and branching constructs.
The Description Language optionally supports constructs that describe tasks that must be done in serial and tasks that may be done in parallel.
The Description Language must contain constructs which instruct the Rendering Engineto obtain further input from the user. Such constructs would ideally be implemented in a high level language, which might include HT L, XML or similar mark-up.
A Statistical Analytic Resolver
I n some embodiments, a Statistical Analytic Resolver is used to create a linear equation of parameters provided and, using regression analysis and applying the weighting model, to select an optimal combination of Template Components to achieve the Operational Criteria
Weighting Model
In some embodiments, a Weighting Model describes the importance of different factors in selecting the Template Components.
Rendering Engine
I n some embodiments, a Rendering Engine provides a means for executing a Description Language, displaying requests for further information and results and for interfacing with external systems which make use of the resulting template or configuration information.
An example embodiment
In a simple embodiment, the system may for example comprise:
(a) The I nput Parameters,
(b) One Template Component,
(c) which is described using the Description Language,
(d) and stored in the Template Store. I n such a case the system might for example simply invoke the one Template Component, there being no other choices (Figure 8).
Other simple embodiments of the system involve multiple Template Components, but each within discrete areas which do not overlap. In these cases, depending on the input from the end user, a single Template Component would be selected end execute.
In still further simple embodiments a number of pre-configured templates could be stored as Template Components and the end user could select from one of the Template Components. In the context of a construction project, such templates could represent different projects, including:
0 Construction - Residential
0 Construction - Commercial
0 Construction - General
0 Infrastructure - Road
0 I nfrastructure - Rail
0 I nfrastructure - Airport
0 Infrastructure - General
0 Engineering- Mining
0 Engineering- Gas
0 Engineering- General
Once a template has been selected, a Rendering Engine may step through each element of the template, requesting further information from the end user where necessary. Such steps might include:
Project Details
o Name, Location
o Invite users to project
Mail Types
o Assign to correct org roles
Entered attribute values * o M andatory vs. non-mandatory
What formswill be used for what mail types
o Confirm the form process is correct for the project
Document Types
o Assign types to correct org roles
Document Fields
o Confirm field name
o Confirm enabled fields
o Confirm mandatory fields
o Enter field values
Confirm access control groups
o Assign users to groups
Confirm access control rules
o Assign permission to rules
Confirm document numbering scheme setup
o Assign document types to schemes
Confirm workflow templates
o Assign steps to users
A more∞mplex embodiment
A more complex embodiment (Figure 9) might for example comprise:
(a) I nput Parameters
(b) Operational Criteria
(c) A Resolution Engine
(d) A Template Store (containing Template Components described in a Description Language)
(e) A Statistical Analytic Resolver (containing zero or more Weighting Models) (f) A Rendering Engine
Prior to the system being used by an end user the Operational Criteria are optimally established, in this casefor example pur poses we will use an Operational Criteria as being the optimum template based on all information provided by the system.
Also prior to the system being used theTemplate Store is optimally loaded with a number of Template Components, described in the Description Language and containing the various required input parameters conditions, input parameter information, dependant Template Components.
The system is started by passing to the Resolution Enginethe minimum configuration parameters which are provided by the end user. In this example, the end user will pass in thecompany name (XYZ), the project location and that it would liketo build a project.
The Resolution Engine takesthe input parameters and attempts to collect further information based on thefirst set of parameters. The Resolution Engine consults a number of data sources, including private and public information storesto obtain further
information based on the parameters passed in ("Additional Parameters"). In this example, the parameters are expanded in the following way:
1. Company name -> industry (from a private database)
-» home location (from a public database)
-» number of employees (from a private database)
-> types of projects completed (from a private database)
2. Project location -> industry (from a private database)
-> types of projects anticipated (from a private database)
The original parameters together with the Additional Parameters are passed into the Statistical Analytic Resolver (SAR). The SAR compares each of the original Input
Parameters and Additional Parameters identified by the Resolution Engine to each of the required input parameters conditions for each Template Component in theTemplate Store. The system then uses regression analysis to identify the optimal set of Template Components which satisfy the Operational Criteria taking into account the required input parameter conditions.
I n this exampletheparameters might match various Template Components, including a document library, email change control process, currency conversion and regulatory reporting component relevant to the location. Each of those components are compiled into an equation and the resolution of each is compared to the operational aiteria, which in this case is a template based on all information provided by the system.
Once the optimal set of linear equations isdetermined and the Template Components are collected and ordered based on interdependency, the various componentsof that equation are then delivered to the Rendering Engine. The Rendering Engi ne will execute each of the Template Components using the Description Language defined within each component. Where parameters are required that are not part of the parameter set (either from the original parameters or the Resolution Engine parameters), there are conflicts in parameters which cannot be resolved or actions are required from the user, the Rendering Engine will display each of those issues to the user for resolution, either in the order defined by the Description Language or in the most efficient manner. Where possible, the Rendering Engine may providetheability to delay further resolution of requested information until a later date.
End users of the system
Typically end users of the system can be classified into two groups - customers (those looking seeking the services of others by tender) and suppliers (those looking to provide services to others).
1 - Customers
A customer looking to source the services of third parties would typically create an account on the system by first accessing the user interface module which, where the system is embodied in awebsite, would be via a computer web browser. Creating an account may requirethecustomer to input a minimum amount of information in order to uniquely identify the customer within the system and provide a desirable level of security. In one embodiment such minimum information would be a username (which must be unique) and password (which need not be unique). In another preferred embodiment the information required to create an account might includethefollowing.
• Organization Name
• Company or business registration number
• Trading Name
• Full name of the account holders (first and last name may be entered into separate fields)
• Telephone contact number • Email address (which is used as the unique username)
• Password
• Correct entry for a human challenge problem, such as recapture
The customer account information is stored in thedata aggregation module and
conventional access to customer account information is provided by logging into and out of the system viathe user interface module.
After the customer account is created the user interface module then displays a number of options to the customer, including the ability to further customise the account information by changing, deleting or adding data, undertake research by querying the data aggregation module and data comparison module or create an invitation to tender.
(a) Undertake research using thedata aggregation module and data comparison
module
The data aggregation module contains information which is maintained by the system. This information includes information regarding each customer and supplier and any interactions between them. The information also contains information which is relevant to end users, such as pricing guides for work and materials. Finally, the data aggregation module also contains historical information regarding customers and suppliers, which is described in more detail below.
The data comparison module is an intermediate stage between the data aggregation module, external data sources and the end user query. Where information is not currently stored in the correct format to efficiently process a query submitted by an end user, or where the query resultscompiledata from thedata aggregation module and an external data source, thedata comparison module manages the interconnection of those data sources and execution of the query.
The data comparison module can also be optionally conf igured not to display (but may use in its calculation) any information which is confidential.
Research can be conducted by passing queries to the data comparison module (which can be pre-formatted or can be constructed by the end user) and retrieving the results. An example of such a query may be to consider average tender pricing for work fitting a particular description.
Further, customers and suppliers may elect to contribute information about themselves to thedata aoareaation modulefor inclusion in auerv results. ExamDles of such information include compliance statements, insurance certifications, references, OHS accreditations, standard rates and list of completed projects.
(b) Create an invitation to tender
One example use of the system is to invite suppliers to tender for work to be performed for customers. The system enables the creation of an invitation to tender (including pricing and timetable information) using the benefit of information from the data aggregation module and data comparison module. I n this way, customers have the benefit of retained knowledge and relationships without necessarily having to develop them themselves.
In one implementation, to create an invitation to tender the customer navigates to the system website, creates an account or logs into an existing account using the end user interface and selects "Manage Tenders Out" and then "Create Tender". The system then requests from the customer a number of details, typically including the tender title, opening and closing dates of the tender process, the estimated value of the tender, location of the work and contact details of a person to discuss the tender. A typical example may include the following information - "construction of a residential house", "Glen Iris, Victoria, Australia", "June". The information entered at this stage is referred to as the "key attributes" of the invitation.
The key attributes are interactively passed to the data comparison module as they are being entered by the customer. The data comparison module queries each of its available data sources (whether the data aggregation module or external databases) and compares each of the data elements which have sufficiently similar key attributes (based on simple matching, heuristic or regression analysis algorithms). The data comparison module then returns the similar results organised by similar key attributes.
The user interface module then displays the results as guidance on key attributes (for example, matches on "Glen Iris, Victoria, Australia" and "construction of a residential house" may have a strong connection with "November" rather than "June") and may suggest other information which may not be apparent to the customer when planning the tender (such as the average invitation to tender price for similar projects, or the typical types of work packages each tender is divided into).
Examining each of the work packages presented by the data comparison module it is possible to compare key attributes between the current tender and others, for example comparing tender pricing between similar projects and inform likely cost of thecurrent project. The customer can then prepare the invitation to tender using thefu!l suite of information available to it. Further details can be incorporated using any suitable data capture technique (including free-form text box, electronic document upload or structured forms).
Each tender is then optionally divided into packages, each package representing either the entire projed scopeof adiscretework element. I n thecurrent example of a residential house construction work packages might indude eledrical, concreting and plumbing amongst others. A list of typical packages and typical costs assodated with each work package based on the key attributes is displayed to the customer as guidance in preparation of each work package. The customer can also assodate and optionally upload eledronic documents to the system for each work package.
As each work package is prepared a shortlist of potential suppliers is displayed to the end user, which can be ordered and/ or filtered by various attributes, induding whether the supplier is part of the customer's network, whether thecustomer has dealt with thesupplier before, a satisfadiori rating as rated by the customer, a satisfadion rating as rated by others that have dealt with thesupplier, availability based on the supplier's accepted and/ or recorded commitments, location, legal or regulatory daims against the entity, finandal standing, delivery on budget, delivery on time and any other attribute. I n this way a customer has access to potential suppliers and signif icant details about each supplier's appropriateness for a particular job.
Once the work package is complete, it can be sent to each relevant supplier by means of seleding them using the user interface module and passing them, together with the information to send, to the communications module. Suppliers can be seleded based on individual name, general criteria or custom assigned criteria created by thecustomer (such as a group of suppliers) .
I n addition to those suppliers already listed in the system, it is possible to send the invitation to suppliers not listed in the system. The system provides for such notification via conventional communication systems such as email and SMS and provides a not ice that there is an invitation to tender waiting in the system and the supplier should create an account in order to view and respond to it. Such general links to can also be advertised on a non-spedf ic basis (such as in a newspaper) so that a customer can advertise a link to a particular tender and anyonewishing to view and/or respond to the invitation can use the link to create an account and obtain the required access.
Further, it is optionally possibleto mark an invitation to tender or work package as "public" , meaning that it will be displayed in various public directories and proactively suggested to suppliers for review and response. 2 - Suppliers
A supplier looking for work would typically createan account on the system by first accessing the user interface module which, where the system is embodied in awebsite, would bevia a computer web browser. Smilar to a customer, creating an account involves entering at least sufficient detail to identify the supplier, such as a unique username and password (which doesn't need to be unique). Optional more specific information regarding the supplier could also be entered. Examples of such information include compliance statements, insurance certifications, references, OHS accreditations, standard rates and list of completed projects and such information could optionally be marked as private and not shared with others in the system unless expressly made available.
Each supplier account has a "home dashboard" which displays information relevant to that particular supplier as stored in or availableto thesystem. Such information may be confidential or publicly available.
(a) Search for Invitation to Tender
Oneoption availableto a supplier isto search thesystem for public invitations to tender which match a certain aiteria. The search can be natural language based (such as "plumbing jobs in Adelaide") or based on keywords in particular fields. Such a search will return results which can be ordered and/ or classified on the basis of any number of attributes (such as location, cost, work category, etc).
(b) Notification of an Invitation to Tender
There are two types of notifications of invitations to tender - proactive and reactive.
Proactive
I n addition to relatively static attributes, other attributes such as an availability diary and default cost estimates for types of work may also be included in a supplier's profile.
For invitations which aredesignated as public the system will compare criteria, including optional criteria, from each supplier and proactively display those invitations which most closely match the supplier's key attributes. The supplier is then able to order and/ or filter the list based on any of the included criteria. Where selected by the supplier, the supplier may also auto accept invitations to tender and bid default amounts based on certain criteria.
Further, where selected by the supplier, the supplier may share previously, private information with acustomer.
Reactive
When acustomer invites a specific supplier to tender for a work package the supplier is notified of the invitation via the communications module using any conventional communications method (such as email or SMS) together with a messagedisplay in the user interface module.
(c) Responding to an Invitation to Tender
There can be three responses to an invitation to tender - Accept, Decline or Request Further Information.
Request further information
First, a supplier may request further information, such as more specific details to better define the requested work. I n this case, the request is sent from the supplier to the customer using the system (the message is tracked in the system but may be notified to the customer using any suitable means of communication, including email, SMS or via the system user interface). Additional documents may be included in the request for further information.
The customer may respond to the request directly to the supplier via a private response or to all suppliers as an updateto the invitation to tender.
Decline
The supplier may elect not to be involved in the tender. Declining the invitation optionally requests an reason from the supplier. The invitation will be marked as declined and can be viewed by the supplier in the declined group.
Accept The supplier can accept the invitation to tender by submitting a tender proposal. Thetender proposal can include a number of documents attached in support of the proposal. Each submission is optionally time stamped and digitally signed.
Moving from the tender process to contract
Once a tender has been accepted, the parties then need to migrateto acontract. Typically this involves the exchange and formal compilation of a number of documents, someof which are standard across all tenders. In this case the system can compile each document relevant to the particular tender (for example, communication, documents marked as being relevant and standard documents shared by either the customer or supplier) into a standard for contract template or completed contract.

Claims (52)

Claims
1. A system for managing information comprising a data comparison module and
optionally a communications module wherein the data comparison module enables refinement of information queries without the need to undertake one or more of rebuilding, re-categorizing or re-indexing the information and wherein the
communications module facilitates communication between participants in the system.
2. A system according to claim 1, adapted for handling tender information and / or sharing information between acustomer and asupplier.
3. A system according to claim 2, adapted to create a request for tender from a set of
information.
4. A system according to claim 2, wherein information relevant to a request for tender is interactively displayed to an end user.
5. A system according to claim 2, wherein the information includes potential recipients of a request for tender.
6. The system according to claim 2, wherein a potential supplier may be selected
automatically from adatabase.
7. The system according to claim 2, wherein a potential supplier may beselected
interactively by a user.
8. The system according to claim 2, wherein information may be selectively shared between a customer and a supplier.
9. The system according to claim 2, wherein shared information may be automatically
validated against a database which is optionally authoritative.
10. The system according to claim 2, wherein a tenderer may respond to a request for tender.
11. A system according to claim 2, wherein one or more documents are created from
information stored or exchanged between parties in the system.
12. A system according to claim 11, wherein the documents are contractual documents.
13. A method for managing information comprising:
receiving an information query;
refining the information query without undertaking one or more of rebuilding, re- categorizing or re-indexing the information; and
optionally facilitating communication between a plurality of participants in an associated information management system.
14. A method according to claim 13, comprising the step(s) of handling tender information and / or sharing information between a customer and a supplier.
15. A method according to claim 14, comprising the step of creating a request for tender from a set of information.
16. A method according to claim 14, wherein information relevant to a request for tender is interactively displayed to an end user.
17. A method according to claim 14, wherein the information includes potential recipients of a request for tender.
18. The method according to claim 14, wherein a potential supplier may be selected
automatically from a database.
19. The method according to claim 14, wherein a potential supplier may be selected
interactively by a user.
20. The method according to claim 14, wherein information may be selectively shared
between a customer and a supplier.
21. The method according to claim 14, wherein shared information may be automatically validated against a database which is optionally authoritative.
22. The method according to claim 14, wherein a tenderer may respond to a request for tender.
23. A method according to claim 14, wherein one or more documents are created from
information stored or exchanged between parties in the system.
24. A method according to claim 23, wherein the documents are contractual documents.
25. An information management system comprising a local datastorage, a remote data storage, and a user interface for requesting information wherein oneor more methodologies may be used to access the information depending on the context.
26. An information management system comprising a local data storage, remotedata
storage, and a user interface for requesting information wherein transfer of information between the remote data storage and local data storage is proactively managed according to oneor more criteria.
27. The system according to either claim 25 or claim 26 wherein at least one copy of a
document stored on the remote data storage is stored on a local data storage.
28. The system according to either claim 25 or claim 26 wherein a document is stored in the local data storage based on one or more criteria, which may be dynamically adjusted.
29. The system according to any one of either claim 25 or claim 26 comprising using authentication and / or security parameters stored on the remote data storage to determine whether an end user may access particular information, such as a document.
30. The system according to either claim 25 or claim 26 wherein the documents are
proactively copied to the local data store depending on one or more parameters, which may be dynamically adjusted.
31. Thesystem according to either claim 25 or claim 26 comprising a communications
component to communicate with another system to deliver adocument to a user interface via a preferred path depending on one or more set criteria, which may be optionally dynamically adjusted.
32. A system for providing offline access to information through astandardised interface wherein offline access is enabled via a system according to either claim 25 or claim 26.
33. An information management method comprising the steps of: receiving a request for information from a remote data storage, analysing the context of the request and based on the analysis, selecting an information transfer methodology.
34. An information management method comprising the steps of: receiving a request for information from a remote data storage, analysing the request and proactively managing transfer of information based on one or more criteria.
35. The method according to either claim 33 or claim 34 comprlsing thestep of storing on a local data storage at least one copy of adocument stored on the remote data storage.
36. The method according to either claim 33 or claim 34 comprlsingthestep of selectively storing a document in the local data storage based on one or more criteria, which may be dynamically adjusted.
37. The method according to either claim 33 or claim 34 comprising the step of using
authentication and / or security parameters stored on the remote data storage to determine whether an end user may access particular information, such as a document.
38. The method according to either claim 33 or claim 34 comprising the step of proactively copying a document to a local data store depending on one or more parameters, which may be dynamically adjusted.
39. The method according to either claim 33 or claim 34 comprising the step of
communicating with another system to deliver adocument to a user interface via a preferred path depending on one or more criteria, which may be dynamically adjusted.
40. A method for providing offline access to information through a standardised interface comprising enabling access via a method according to either claim 33 or claim 34.
41. A system for creating a template comprising a criterion analyser to analyse one or more criteria and thereby enable creation of oneor more suitable templates.
42. A system according to claim 41 comprising a template element store, an element selector and a rendering engine, wherein the element selector selects oneor moretemplate elements based on output from the criterion analyser for rendering by the rendering engine.
43. A system according to claim 41 wherein an element is selected based on relevance to either information provided by a user or information derived from information provided by an end user.
44. A system according to claim 42 wherein elements comprise configuration information for a software application.
45. A system according to claim 42 wherein elements comprise components of oneor more documents.
46. A method for creating atemplate comprising analysing oneor more criteria and creating one or more suitable templates.
47. A method according to claim 46 comprising the steps of storing atemplateelement in a template element store, selecting an element from the template element storebased on output from the criterion analyser and rendering a template from oneor moreselected template elements.
48. A method accordingto claim 46 comprising the step of selecting an element based on relevance, to either information provided by a user or information derived from information provided by an end user.
49. A method according to claim 47 wherein elements com prise configuration information for a software application.
50. A method accordingto claim 47 wherein elements comprise components of one or more documents.
51. An information management system comprising a data comparison module, a local data storage, a remote data storage, a user interface for requesting information, optionally a communications module and optionally a criterion analyser to analyse one or more criteria and thereby enable creation of oneor more suitable templates wherein: the data comparison module enables refinement of information queries without the need to undertake one or more of rebuilding, re-categorizing or re-indexing the information; the communications module facilitates communication between participants in the system; one or more methodologies may be used to accessthe information depending on the context; and transfer of information between the remote data storage and local data storage is proactively managed according to one or more criteria.
52. .A method for managing information comprising:
receiving an information query;
refining the information query without undertaking one or moreof rebuilding, re- . categorizing or re-indexing the information;
analysing the context of the request and based on the analysis selecting an information transfer methodology;
analysing the request and proactively managing transfer of information based on one or more criteria;
optionally aeating a template by analysing one or more criteria and creating one or more suitabletemplates; and
optionally facilitating communication between a plurality of participants in an associated information management system.
AU2012276286A 2011-06-30 2012-06-29 Information management systems and methods Abandoned AU2012276286A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2017203170A AU2017203170A1 (en) 2011-06-30 2017-05-12 Improved Information management systems and methods
AU2017204903A AU2017204903A1 (en) 2011-06-30 2017-07-16 Further improved Information management systems and methods

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US61/503,542 2011-06-30
US61/503,530 2011-06-30
US61/504,309 2011-07-05

Related Child Applications (2)

Application Number Title Priority Date Filing Date
AU2017203170A Division AU2017203170A1 (en) 2011-06-30 2017-05-12 Improved Information management systems and methods
AU2017204903A Division AU2017204903A1 (en) 2011-06-30 2017-07-16 Further improved Information management systems and methods

Publications (1)

Publication Number Publication Date
AU2012276286A1 true AU2012276286A1 (en) 2013-12-05

Family

ID=

Similar Documents

Publication Publication Date Title
US20140129585A1 (en) Information management systems and methods
US20200201888A1 (en) Data processing systems for generating and populating a data inventory
US20200042738A1 (en) Data processing systems for generating and populating a data inventory
US7523133B2 (en) Data model and applications
US10366352B2 (en) Method and system for communicating vehicle repair information to a business-to-business rental vehicle reservation management computer system
US20070251988A1 (en) Field servicing
US9053136B2 (en) Systems and methods for identifying contacts as users of a multi-tenant database and application system
US20110276583A1 (en) Automatic role determination for search configuration
US11093630B2 (en) Determining viewable screen content
US20190377798A1 (en) Topic based conversation retrieval
US20210224300A1 (en) Centralized cloud service management
US20150074078A1 (en) Providing enhanced connection data for shared resources
US20190266572A1 (en) Systems and methods for generating and transmitting targeted data within an enterprise
US11475064B2 (en) System and method in a database system for creating a field service work order
JP2007272518A (en) Customer database management device and customer database management program
CA3224565A1 (en) Multi-platform application integration & data synchronization
US20220058233A1 (en) System and method providing data management and sharing over communication network
US11870635B2 (en) System and method for integration of dynamic embedded process communications
US20180144407A1 (en) Supplemental electronic note data message distribution in near real-time
Hofman Federated platforms for seamless interoperability in the Physical Internet
AU2017204903A1 (en) Further improved Information management systems and methods
US20220129837A1 (en) Data processing systems for generating and populating a data inventory
US20200081727A1 (en) A method and a system for hosting multiple multi-tenant applications
US10798208B2 (en) Availability data caching in meeting systems
JP2009251935A (en) Building management information-sharing system