Professional Services
Enhancing Security Operations with OpenText Cybersecurity Services
In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…
• 5 minute read
Decomposing the database for microservices
There are many ways to extract functionality into microservices. However, we need to address the elephant in the room—namely, what do we do about our…
• 5 minute read
Moving from monolith to microservices
We are on the cusp of a revolution in application architecture. According to IDC (International Data Corporation), by 2022, 90 percent of all new applications…
• 4 minute read
Performance considerations for cloud services provisioning: Value-added services
In our first blog, I discussed performance parameters for cloud services that were specific to infrastructure. Apart from infrastructure services, though, cloud providers also provide…
• 3 minute read
Performance considerations for cloud services provisioning: Infrastructure services
In the competitive business world, the responsiveness of business applications plays a vital role in business success. As volumes of business users and transactions grow,…
• 4 minute read
Managing your digital assets
You’ve no doubt spent lots of time and money creating and curating high-quality digital assets. Now the question is: How do you manage the growing…
• 2 minute read
Regain control over your corporate data
In today’s global economy, business success and growth are affected by rapid changes in market requirements, short innovation cycles and rising demands for internal and…
• 3 minute read
How to effectively deliver virtual training
COVID-19 has significantly altered how we deliver and consume training. With companies moving to remote work, many employees are now balancing work and responsibilities at…
• 3 minute read
Enrich EIM solutions with business intelligence
Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…
• 5 minute read
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…
• 6 minute read
NIST Privacy Framework – The Communicate function
In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this segment, I’m going to focus…
• 4 minute read
Choosing the right supplier portal for vendor invoice management
Have you ever thought of improving the end-to-end process of vendor invoice management (VIM) by making it digitized and collaborative? It’s now possible for your suppliers to take an active role in…
• 3 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.