Services
-
Enrich EIM solutions with business intelligence
Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line.…
Read more -
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more -
NIST Privacy Framework – The Communicate function
In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this…
Read more -
Choosing the right supplier portal for vendor invoice management
Have you ever thought of improving the end-to-end process of vendor invoice management (VIM) by making it digitized and collaborative? It’s now possible for your…
Read more -
How to implement a new software system
The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and…
Read more -
Remote Nunavik villagers connected by timely translation
Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages:…
Read more -
Document access control
Access scenarios today are more complex than ever, thanks to the increased need for mobility, usability and flexibility. Think, for…
Read more -
What is software implementation?
Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the…
Read more -
3 ways to bridge the cloud skills gap
The benefits of moving to the cloud are established—it’s no longer a matter of if but of how and when…
Read more -
Optimizing performance for your EIM platform
Slow and inconsistent performance can be a barrier to user adoption and achieving the desired outcomes for a solution. Even…
Read more -
8 tips for fostering user centricity in content services
A prime measure of the success of a content management platform is its effectiveness in accelerating and improving the efficiency…
Read more -
Achieving seamless eDiscovery
Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline…
Read more -
Digitalization in procurement
A recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Solutions in…
Read more -
NIST Privacy Framework – Control
In our first two blogs for the NIST Privacy Framework, we discussed the Identify and Govern functions. In this segment, our focus is on the Control function…
Read more -
How intelligent forms automation can help replace legacy applications
In 2020, organizations moved from mostly in-office employees to hybrid working models and full remote working. As part of this…
Read more -
Leveraging an ‘Express Lane’ approach to trading partner onboarding
If 2020 was the year of supply chain disruption, then 2021 will be the year of supply chain restructuring and transformation. Supply…
Read more -
SolarWinds: Threat hunt to contain and eradicate
As the cyberattack story continues to unfold around the SUNBURST and SUPERNOVA malware distributed through a compromised SolarWinds software update,…
Read more -
Avoiding four common pitfalls when moving to the cloud
As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how…
Read more -
How change management, adapting and adoption became a daily task
COVID- 19 forced change on us quickly and dynamically. It took away our freedom to roam about, visit places and people, and be socially active. It…
Read more -
Reacting to COVID-19 based on a data driven strategy
When COVID-19 entered our lives, companies were worried about how it would impact their business. As the year progressed the…
Read more