Services
-
Optimize your skills with OpenText certification
In recent years, the concept of “lifelong learning” has increased in importance for individuals and enterprises alike. Highly skilled and…
Read more -
Out with the old, in with the new
The challenges of a global market and international competition with ever shorter innovation cycles are omnipresent. Global interactive networking paves…
Read more -
Log4j vulnerability explained and how to respond
On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge.…
Read more -
Learning Management Systems and Life Sciences Quality & Manufacturing solutions – better together!
OpenText™ Documentum™ for Quality & Manufacturing (Q&M) solutions are widely used in Life Sciences companies to create, maintain, and revise…
Read more -
Addressing the demand for qualified SAP SuccessFactors cloud practitioners
Companies are increasingly leveraging the cloud to power modern work. Currently, the market for cloud computing is USD $371.4 billion…
Read more -
Catching threats in minutes, not days with OpenText MDR – Part 2
We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations,…
Read more -
Extend Magellan with transformers
Under the umbrella that is Artificial Intelligence (AI), Natural Language Processing (NLP) has come a long way from symbolic AI…
Read more -
7 steps to faster value realization
According to Harvard Business Review, although 95% of businesses rank digital transformation as a priority, only 1 in 5 leaders…
Read more -
Unlock insights from dark data with semantic search
“Data is the new oil – and that’s a good thing.” Today, organizations store vast amounts of institutional knowledge in…
Read more -
De-risk your cybersecurity program
Cyber resilience is no longer optional, it is an essential component of Information Management to protect the most valuable assets:…
Read more -
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute…
Read more -
Catching threats in minutes, not days with OpenText MDR – Part 1
Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next…
Read more -
Decomposing the database for microservices
There are many ways to extract functionality into microservices. However, we need to address the elephant in the room—namely, what…
Read more -
Moving from monolith to microservices
We are on the cusp of a revolution in application architecture. According to IDC (International Data Corporation), by 2022, 90…
Read more -
The benefits of viewing OpenText Documentum Groups, Roles & Users in a Tree
OpenText™ Documentum™ Web clients have ‘Content Trees’ to access Cabinets, Folders, and Documents. However, Documentum Groups, Roles, & Users are…
Read more -
Three MDR strategies for government CISOs to quickly detect and respond to threats
The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that…
Read more -
Performance considerations for cloud services provisioning: Value-added services
In our first blog, I discussed performance parameters for cloud services that were specific to infrastructure. Apart from infrastructure services,…
Read more -
Performance considerations for cloud services provisioning: Infrastructure services
In the competitive business world, the responsiveness of business applications plays a vital role in business success. As volumes of…
Read more -
Cloud ERP evolution shifts the focus onto integration
Back in 2014, SAP declared that monolithic enterprise resource planning (ERP) systems were dead and would be replaced by “post-modern”…
Read more