Put Order and Information into File Names

Unless you place your faith in internal search engine software or document databases to track your work, consider a relatively low-tech enhancement to your work methods. I promise it will pay big dividends.

Consider how you name your files and folders. Have you missed an opportunity to clear the clutter and make your work more accessible? When you look at file names within a folder, do they sing out to you with sweet meaningfulness, or are they a cacophonous jumble of confusing heiroglyphics?

The eye likes symmetry. The mind loves order. When you create files and they pile upon one another over time, does their accumulation reflect a master plan or a disaster unplanned? When you view your list of files, is your eye happy, your mind content?

Basically, filenaming is an unrecognized art. Most of us are left to our own devices to figure it out. The good news: with some thought, you can be the artist of a system which will resonate with function.

Let's start by considering the basis upon which files should be ordered. I will jump to the punchline and say it out loud: chronologically. To order files chronologically, have the filename start with a datestamp prefix such as YYYYMMDD- or YYMMDD. If you do this, your files will always sort themselves chronologically and you will have no trouble finding the latest and greatest work within a folder.

What you do following the datestamp prefix depends upon how the file will be used. If the file travels to someone else as an email attachment and then returns back to you after some sort of review, I recommend having the second portion of your filename be a locator.

The locator can be a 3-5 character abbreviation which will give you a solid hint about where the file needs to be refiled upon its return. You develop the locator so that you and others in your group recognize it as an abbreviation for a project. When they see the datestamp prefix and locator, they will already have much information about the contents of the file.

After entering the datestamp prefix and locator, now you can write a nice, meaty descriptive text (descriptor). Use as many characters as you like, just beware that beyond a certain length, the filename will be truncated during display, and you will lose, rather than gain information. Consider 30 characters to be a maximum filename size.

Subtracting 7 characters for the date stamp and 3-5 characters for the locator, this gives you 18-20 characters to tell your story. The way to know if you are doing a bad job with descriptors, is when you see the identical descriptor in multiple files. Don't repeat descriptive text unless you specifically want to highlight the similarity between the two files.

Tip: NO spaces in names of files or folders. Spaces are not FTP-friendly and you may be FTP-ing sooner than you think.

Tip: NO unnecessary capital letters and DEFINITELY NO TEXT WITH ALL CAPS. It's not only irritating, but it also takes away a useful tool, that of using upper and lower case text for better conveying your message.

Tip: Find a style and stick with it. For example, if you like the looks of hyphens separating datestamp, locators and descriptors, then do it that way every time. If using underscore between words in the descriptor feels right, then make it a habit. Even artists can have discipline, you know.

Tip: Use language to the greatest extent possible. In other words, use words more than acronyms. Cutsey corporate acronyms, after the first dozen or so, get pretty boring.

Examples of good file names:
050727-par-FieldTesting.doc
2004-o4-21-oak-Access_to_site.xls
Bad file names:
article.doc (too vague - what article? )
Work Project.xls (too general - what work project? when? )

Copyright 2005 Mark Meshulam

A versatile denizen of Northbrook, IL, USA, Mr. Meshulam is an owner of a productivity software company (http://www.poingo.com), a construction company (http://www.poingo.com), and a document scanning/reprographics company (http://www.poingo.com). His software product Poingo Email Printer has a feature which adds timestamps to filenames.

house refresh service Morton Grove ..
In The News:

Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods.
Scientists from Duke, Harvard, and the University of Otago have unveiled a game-changing tool called DunedinPACNI. It uses a single AI brain scan to reveal how fast a person is biologically aging.
A disturbing wave of fake agent phone scams is sweeping across the United States, catching people off guard and draining their savings.
Emojis aren't just playful add-ons; they're powerful tools for building stronger connections in our increasingly digital world.
Google has taken a major step toward the future of clean energy by partnering with Commonwealth Fusion Systems (CFS), an MIT spin-out working to build one of the world’s first commercial fusion reactors.
If you create and share art online, you might have seen messages warning that Facebook's parent company, Meta, claims the right to use or even sell anything you post, whether it's pictures, poems, or artwork.
Cybercriminals hit Qantas in a major data breach that exposed information from up to six million customers.
Having reliable, loud, and timely emergency alerts on your phone or device is important because when severe weather strikes, every second counts.
Here's how your daily brew is becoming the foundation for greener buildings.
Artificial intelligence (AI) and large language models (LLMs), such as ChatGPT, are transforming how we learn. But what does this mean for AI and learning retention?
Modern AI data centers use much more electricity than traditional cloud servers. In many cases, the existing power grid cannot keep up. One innovative solution is gaining traction: repurposed EV batteries for AI data centers.
Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars.
Researchers are now showing us that old smartphones as data centers could be the next big thing in sustainable tech.
Scientists have created micro-robots for sinus infection treatment that can enter the nasal cavity, eliminate bacteria directly at the source, and exit without harming surrounding tissue.
Let's examine how your data is collected in everyday life, who is buying and selling it, what happens to it afterward, and, most importantly, what you can do to protect yourself.
Researchers at the University of Sheffield in the U.K. developed small robots called "Pipebots" that can travel inside water pipes to find and potentially repair leaks, all without any excavation.
A groundbreaking new study has uncovered disturbing AI blackmail behavior that many people are unaware of yet.
Four teams of autonomous humanoid robots competed in China's first AI soccer tournament, demonstrating advanced capabilities in ball detection and independent decision-making.
The ID. Buzz autonomous van features self-driving technology with 13 cameras, nine LiDAR units and five radars after Volkswagen partnered with Hamburg and Uber for 2026 deployments.
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and implement 10 protective measures.
French startup Pazzi Robotics created an AI-powered pizza robot that made pies in under five minutes without human help, but it closed in 2022 despite patents and expert partnerships.
Reclaim your time from big tech with effective screen time reduction strategies for iPhone and Android, featuring steps to limit app usage and create phone-free zones.
Amazon Prime Day shoppers face threats from 120,000-plus scam websites as cybercriminals prepare phishing traps and malware ahead of the July sales event.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
The AEON humanoid robot tackles labor challenges with Nvidia AI, Microsoft Azure cloud and advanced spatial awareness, working alongside industry leaders Schaeffler and Pilatus.

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

Flow Text Around a Graphic in Microsoft Word

Flow Text Around a GraphicQuestion: I have inserted a photo... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

EDTV: What You Should Know Before You Make That Purchase

Enhanced Definition Television ? also known as EDTV ? is... Read More

Maintain Your Computer ? Keep Your Business Running

Maintaining your computer is extremely important ? especially if you... Read More

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Help, I Need a New HDTV! (Part 5 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

Does Microsoft Show Hackers How To Attack?

After another security hole recently surfaced in Microsoft's Windows operating... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Basic Computer Maintenance

One of the most common questions computer users ask is,... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

Why Build Your Own Gaming Computer?

The best way to get the gaming computer that you... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Buying a Home Theater Receiver

Buying a receiver is one of the most important decisions... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

cleaning service near Mundelein ..