2 days ago

    Why you need a top digital experience platform in 2021

    2 days ago

    Manufacturers unite: Driving safe operations, together

    4 days ago

    JBS Ransomware attack highlights need for early detection and rapid response

    6 days ago

    Top 5 differences between information assurance vs. cybersecurity

    RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
    Security

    RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

    The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
    NIST Privacy Framework – The Communicate function
    Services

    NIST Privacy Framework – The Communicate function

    In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this…
    What’s new in OpenText eDOCS CE 21.2
    Products

    What’s new in OpenText eDOCS CE 21.2

    Law firms and legal departments store thousands of matter-related documents for existing clients. When lawyers and their teams are pressured…
    Choosing the right supplier portal for vendor invoice management
    Services

    Choosing the right supplier portal for vendor invoice management

    Have you ever thought of improving the end-to-end process of vendor invoice management (VIM) by making it digitized and collaborative? It’s now possible for your…
    How to optimize HR’s effectiveness
    Services

    How to optimize HR’s effectiveness

    Improving efficiency is top of mind for many organizations today. Companies that haven’t yet digitized their HR business processes are…
    What’s new in OpenText Enterprise Applications
    Products

    What’s new in OpenText Enterprise Applications

    The latest announcement by OpenText™ of Cloud Editions includes some great updates across the OpenText enterprise applications ecosystem. Check out…
    How to implement a new software system
    Information Management

    How to implement a new software system

    The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and…
    The strategic value of low-code development
    Cloud

    The strategic value of low-code development

    With organizations continuing to push toward digital transformation, the developers and business analysts within these businesses hold the key to…
    4 reasons why technology is vital—during and after ‘unprecedented’ times
    Cyber Resilience

    4 reasons why technology is vital—during and after ‘unprecedented’ times

    Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around…
    CCaaS and speech analytics create a best-in-class contact center offering
    Products

    CCaaS and speech analytics create a best-in-class contact center offering

    Many companies today are transitioning from traditional on-premises telephony contact center solutions to cloud telephony solutions—better known as contact center…
    Remote Nunavik villagers connected by timely translation
    Services

    Remote Nunavik villagers connected by timely translation

    Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages:…
    IT teams want SaaS just as much as business users do
    Cloud

    IT teams want SaaS just as much as business users do

    For IT, the burden of information management can be heavy—especially across a large enterprise. If you’re facing the challenges of…
    The 3-minute test for energy companies
    Oil & Gas

    The 3-minute test for energy companies

    It’s been 25 years since Bill Gates declared, “Content is king.” And how right he was. Today, content truly reigns…
    How supply chains are shifting from global to local
    IoT & Supply Chain

    How supply chains are shifting from global to local

    Vaccine shortages in different parts of the world are a stark reminder of how global supply chains have been hit…
    Why upgrade from Webtop to Documentum D2?
    Products

    Why upgrade from Webtop to Documentum D2?

    There is such a thing as “too much of a good thing.” It’s a predicament many OpenText™ Documentum™ customers find…
    Banks are fighting a multi-front war on fraud
    Banking & Insurance

    Banks are fighting a multi-front war on fraud

    According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent…
    What’s new in OpenText Core Share and Core Signature
    Content Services

    What’s new in OpenText Core Share and Core Signature

    The latest announcement by OpenText of Cloud Editions includes some great updates to both OpenText™ Core Share and OpenText™ Core…
    5 ways to jumpstart digital process automation
    Cloud

    5 ways to jumpstart digital process automation

    Most organizations are on a path to digital transformation. This means they’re spearheading initiatives to elevate operations for improved business…
    Cutting the environmental costs of fax
    Fax

    Cutting the environmental costs of fax

    Fax remains the secure communications backbone for healthcare, finance, government and other industries around the world. Each year, fax machines…
    Why information assurance and security is important in 2021
    Security

    Why information assurance and security is important in 2021

    In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises…
    Back to top button