Contents - Index


Understanding Network Structure



The Network Problem

Networks are typically a hierarchical structure of trees and folders, drives, directories and unc paths.  
  • Network security can be adapted to allow for security for specific drives and folders.  
    ·
  • If a user needs to access a file that is stored in the file that another user maintains, many times, that user will not have access to that file.  
    ·
  • Therefore, a copy of the file is typically made, and emailed to that user, or copied to their directory.
    ·
  • This instantly creates a revision problem, and many version of unwanted files are strewn around the network and on local PC.
    ·
    The User Problem
  • Many users are technically enabled, but not technically capable.
    ·
  • Many users create files in many applications and store them on their computer, without any regard of where they are placed and what they are called.
    ·
  • Many times users create multiple versions of the same file that are in multiple places, so it is very difficult to determine where the user has stored the file that was actually printed, or emailed to a client, employee or vendor.
    ·
  • Users tend to be inconsistent and even when given a home directory, they still insist on saving files to different places and to their local computer, desktop, My Documents, even floppy disks.
    ·
  • Users many times do not last forever on the same network, and either their job is changed, or the user who created the files that are required for their job has changed.  Files created and stored by a user who is no longer available almost always become worthless to the company and the system as a whole, unless another user goes through each and every file that is there, manually.  In this case, then that user is the only user with this valuable company information, and if their job changes, then the process would need to be performed not only for the latter user, but the original user as well.
    ·
    The Solution
  • GoldVisionPro™ was created with all of these factors in mind.  Now system administrators can pre-design directory structure, naming conventions, and user storage conventions for consistent backup and archive.
    ·
  • The user is now in control of allowing the valuable information that they work with on a day to day basis, that they can properly name, and file each item that they are working with, in a format that creates additional value to the company because they have created database resources in which can be shared, communicated and modified.
    ·

    Previous Step:  Hints and Tips about Setup


    SEE ALSO
    Administration Overview
    Linking Overview


    © 1999-2003 GoldVisionPro™ - All Rights Reserved.


    The GoldMine® Trademark is used by permission from FrontRange Solutions, Inc.