Professional Services
-
Enrich EIM solutions with business intelligence
Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line.…
Read more -
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more -
NIST Privacy Framework – The Communicate function
In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this…
Read more -
Choosing the right supplier portal for vendor invoice management
Have you ever thought of improving the end-to-end process of vendor invoice management (VIM) by making it digitized and collaborative? It’s now possible for your…
Read more -
How to implement a new software system
The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and…
Read more -
Remote Nunavik villagers connected by timely translation
Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages:…
Read more -
Document access control
Access scenarios today are more complex than ever, thanks to the increased need for mobility, usability and flexibility. Think, for…
Read more -
What is software implementation?
Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the…
Read more -
NIST Privacy Framework – Control
In our first two blogs for the NIST Privacy Framework, we discussed the Identify and Govern functions. In this segment, our focus is on the Control function…
Read more -
How intelligent forms automation can help replace legacy applications
In 2020, organizations moved from mostly in-office employees to hybrid working models and full remote working. As part of this…
Read more -
Avoiding four common pitfalls when moving to the cloud
As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how…
Read more -
Running a resilient EIM platform
Information is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely…
Read more -
Maximize ROI by optimizing digital asset management productivity
Over the years, Digital Asset Management (DAM) has transformed from a digital media storage hub to a solution with the addition…
Read more -
NIST Privacy Framework – Governance, risk management and compliance
In this blog, we will focus on the importance of Governance, Risk Management, and Compliance (GRC) programs within the NIST…
Read more -
Getting the best performance from your Digital Asset Management system
Performance is an essential component when implementing any solution and is critical for acceptance by the end users, administrators, consumers,…
Read more -
4 key areas for successful information management transformation
Enterprise technology and digital transformation programs are notoriously challenging. A recent Harvard Business Review (HBR) article stated: “Success requires bringing together…
Read more -
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data…
Read more -
Automation in OpenText Media Management
When managing a Digital Asset Management (DAM) system, many administrators quickly find that the management part is the hardest to…
Read more -
Leveraging cloud technologies for OpenText Enterprise Content Services (ECS) software
For many of us, moving to the cloud invokes memories of moving to virtualized environments many years ago. We had…
Read more -
An approach towards application containerization
Organizations are slowly moving towards containerizing their existing software applications that are developed on varying platforms and technologies. But a…
Read more