Put Order and Information into File Names

Unless you place your faith in internal search engine software or document databases to track your work, consider a relatively low-tech enhancement to your work methods. I promise it will pay big dividends.

Consider how you name your files and folders. Have you missed an opportunity to clear the clutter and make your work more accessible? When you look at file names within a folder, do they sing out to you with sweet meaningfulness, or are they a cacophonous jumble of confusing heiroglyphics?

The eye likes symmetry. The mind loves order. When you create files and they pile upon one another over time, does their accumulation reflect a master plan or a disaster unplanned? When you view your list of files, is your eye happy, your mind content?

Basically, filenaming is an unrecognized art. Most of us are left to our own devices to figure it out. The good news: with some thought, you can be the artist of a system which will resonate with function.

Let's start by considering the basis upon which files should be ordered. I will jump to the punchline and say it out loud: chronologically. To order files chronologically, have the filename start with a datestamp prefix such as YYYYMMDD- or YYMMDD. If you do this, your files will always sort themselves chronologically and you will have no trouble finding the latest and greatest work within a folder.

What you do following the datestamp prefix depends upon how the file will be used. If the file travels to someone else as an email attachment and then returns back to you after some sort of review, I recommend having the second portion of your filename be a locator.

The locator can be a 3-5 character abbreviation which will give you a solid hint about where the file needs to be refiled upon its return. You develop the locator so that you and others in your group recognize it as an abbreviation for a project. When they see the datestamp prefix and locator, they will already have much information about the contents of the file.

After entering the datestamp prefix and locator, now you can write a nice, meaty descriptive text (descriptor). Use as many characters as you like, just beware that beyond a certain length, the filename will be truncated during display, and you will lose, rather than gain information. Consider 30 characters to be a maximum filename size.

Subtracting 7 characters for the date stamp and 3-5 characters for the locator, this gives you 18-20 characters to tell your story. The way to know if you are doing a bad job with descriptors, is when you see the identical descriptor in multiple files. Don't repeat descriptive text unless you specifically want to highlight the similarity between the two files.

Tip: NO spaces in names of files or folders. Spaces are not FTP-friendly and you may be FTP-ing sooner than you think.

Tip: NO unnecessary capital letters and DEFINITELY NO TEXT WITH ALL CAPS. It's not only irritating, but it also takes away a useful tool, that of using upper and lower case text for better conveying your message.

Tip: Find a style and stick with it. For example, if you like the looks of hyphens separating datestamp, locators and descriptors, then do it that way every time. If using underscore between words in the descriptor feels right, then make it a habit. Even artists can have discipline, you know.

Tip: Use language to the greatest extent possible. In other words, use words more than acronyms. Cutsey corporate acronyms, after the first dozen or so, get pretty boring.

Examples of good file names:
050727-par-FieldTesting.doc
2004-o4-21-oak-Access_to_site.xls
Bad file names:
article.doc (too vague - what article? )
Work Project.xls (too general - what work project? when? )

Copyright 2005 Mark Meshulam

A versatile denizen of Northbrook, IL, USA, Mr. Meshulam is an owner of a productivity software company (http://www.poingo.com), a construction company (http://www.poingo.com), and a document scanning/reprographics company (http://www.poingo.com). His software product Poingo Email Printer has a feature which adds timestamps to filenames.

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Does Microsoft Show Hackers How To Attack?

After another security hole recently surfaced in Microsoft's Windows operating... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

Got Virus?

GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Healthy Webmasters Choose Ergonomic Computer Products

Webmasters usually sit at their computers much longer in a... Read More

An All Too Familar Pain

Lost & Found for the 21st CenturyIn today's hectic world... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Five Simple Steps to Speed up Your Computer

Most people download and save so much information on their... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

Connect Your IPAQ to Linux

Choose Not To ConformPalm pilots and pdas are constantly growing... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

Get Ahead When You Build Your Own Computer

If you've been kicking around the idea of building your... Read More

Bluetooth Technology: Tips for Buying Headsets or Headphones

The technological horizon has always got something new to offer,... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Digital Cameras: How Many Pixels Do I Need?

With the bewildering number of digital cameras on the market,... Read More

Is Your Web Browser Putting You At Risk?

It's free, it comes with Windows and it's used by... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

How To Become A True CCNA

I've worked my way from the CCNA to the CCIE,... Read More

Bluetooth Headphones For Your PDA

Nothing is worse than having to negotiate all kinds of... Read More

best value cleaning service Northbrook ..