{"id":31911,"date":"2019-09-30T03:59:00","date_gmt":"2019-09-30T07:59:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31911"},"modified":"2019-09-30T03:59:00","modified_gmt":"2019-09-30T07:59:00","slug":"content-services-platforms-enable-multi-context-records","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/30\/content-services-platforms-enable-multi-context-records\/","title":{"rendered":"Content services platforms enable multi-context records"},"content":{"rendered":"\n<p>By  <a href=\"https:\/\/www.techtarget.com\/contributor\/Laurence-Hart\">Laurence Hart<\/a>  &#8211; In a mature information program, information is directly accessible in every system in which people are working. But, to support this, information must be available in multiple contexts.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/09\/meeting-2890414__340.jpg\" alt=\"\" class=\"wp-image-31912\" width=\"324\" height=\"188\"\/><\/figure><\/div>\n\n\n\n<p>For example, a bank can access your personal information through both your savings account and credit card account. A loan officer may use information from both accounts, as well as the shared information, while processing your mortgage application.<\/p>\n\n\n\n<p>The same should be true of your content. All&nbsp;<a href=\"https:\/\/searchcustomerexperience.techtarget.com\/feature\/Businesses-use-AI-to-improve-customer-experience\">mortgage application<\/a>&nbsp;documents should be readily accessible to you and the bank when you apply for a car loan. Not all of the mortgage information is relevant for the car loan, but your latest tax return showing your income is.<\/p>\n\n\n\n<p><strong>Content services<\/strong> implementation can, and should, support these types of scenarios. When properly modeled and executed, <strong>content services<\/strong> enhance information reuse and provide businesses with the most contextually relevant information.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/searchcontentmanagement.techtarget.com\/tip\/Content-services-platforms-enable-multi-context-records&amp;ct=ga&amp;cd=CAEYACoUMTExODQ3Mzg5MTU2MjU5MzkzMzcyGjQwNDMwNWJiNTFkYzJlNmU6Y29tOmVuOlVT&amp;usg=AFQjCNEZaVVVnDbO2MTII_V6PwBoeg97xQ\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Laurence Hart &#8211; In a mature information program, information is directly accessible in every system in which people are working. But, to support this, information must be available in multiple contexts. For example, a bank can access your personal <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/30\/content-services-platforms-enable-multi-context-records\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[658],"tags":[659],"class_list":["post-31911","post","type-post","status-publish","format-standard","hentry","category-content-services","tag-content-services"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31911"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31911\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}