Professional Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

July 19, 2024 4 minute read
NIST Privacy Framework – A focus on the identify function

NIST Privacy Framework – A focus on the identify function

Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…

5 minute read

Automation in OpenText Media Management

Automation in OpenText Media Management

When managing a Digital Asset Management (DAM) system, many administrators quickly find that the management part is the hardest to get right. In addition to…

3 minute read

Leveraging cloud technologies for OpenText Enterprise Content Services (ECS) software

Leveraging cloud technologies for OpenText Enterprise Content Services (ECS) software

For many of us, moving to the cloud invokes memories of moving to virtualized environments many years ago. We had to leave behind some of…

4 minute read

An approach towards application containerization

An approach towards application containerization

Organizations are slowly moving towards containerizing their existing software applications that are developed on varying platforms and technologies. But a few questions arise when we…

6 minute read

Becoming a fully digital finance organization

Becoming a fully digital finance organization

Twitter recently announced that employees could now work from home on a permanent basis if they so choose, as did Square. OpenText™ has also moved…

3 minute read

Feature engineering in machine learning – part 3

Feature engineering in machine learning – part 3

In the first part of this series, we covered different types of data in Machine Learning, their mathematical interpretation and how to use it in…

5 minute read

5 considerations when decommissioning legacy applications

5 considerations when decommissioning legacy applications

Today, almost every large organization has a number of legacy applications that it would like to decommission. However, even if an application is no longer…

4 minute read

Understanding the ethics of AI

Understanding the ethics of AI

In 2018, Elaine Herzberg was killed in what is believed to be the first pedestrian fatality by an autonomous vehicle.  The incident caught the world’s…

6 minute read

5 best practices to maximizing your EIM investment

5 best practices to maximizing your EIM investment

As the volume and variety of data in every business explodes, Enterprise Information Management (EIM) solutions are becoming an increasingly vital part of the IT…

4 minute read

Benefits of OpenText Magellan for the aviation industry

Benefits of OpenText Magellan for the aviation industry

The airline industry has been growing at an outstanding rate with an annual growth rate about 6% worldwide in passenger load for the past decade….

5 minute read

Feature engineering in machine learning – Part 2

Feature engineering in machine learning – Part 2

This blog is part two in a three-part series, and provides explanations about simple feature engineering methods. In part 1 of this series, we covered…

5 minute read

5 steps to business resilience through virtual learning

5 steps to business resilience through virtual learning

Many areas are currently being disrupted by the COVID-19 pandemic but workplace learning and training have been particularly affected. Many classroom-style courses have been canceled…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up