Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Once its assets are cataloged, the company, vendor, or its clients can search the database by name, keyword, date, etc.; view or download assets; convert files to different formats for repurposing; assign users to projects or jobs; set up routing and approvals; even integrate audio and video files. According to Lanigan, levels of privilege designated "read," "read only," and "administrative" typically are sufficient to preserve the integrity of the file.
0 Comments
View Comments
Related Content
Comments