Security
Machine vs. machine
Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….
Driving Innovation & Growth
The growth of unstructured information inside the enterprise is staggering. In fact, experts estimate that over 80 percent of data in organizations is unstructured and…
How Digital Certificates Help Ensure the Security of EDI Data
When you exchange EDI documents via the Internet, the security of your data is of vital importance. It is critical that only the intended recipient…
EIM Success Stories: Turning Information into Innovation
A major natural gas company is experiencing a higher level of internal control over its procure-to-pay process and an 85 percent success rate for vendor…
Which is Best for Your EDI Program? FTP, SFTP, FTPS, or AS2?
What are the most commonly used communications protocols? FTP (File Transfer Protocol) with VPN (Virtual Private Network) FTP was the first robust, reliable file transfer…
5 Considerations When Deciding on Internet Communications Protocols
In order for two computers to exchange files (internally or across the Internet) you will need file-handling software that follows certain communication rules (protocols). If…
NACHA Global Payments Forum 2013 – a GXS Waltz in Vienna
In a recent announcement GXS highlighted the reasons behind our new membership to the National Automated Clearing House Association’s Global Payment Forum. Last week, I…
AS2 or Traditional EDI – Which is Better?
Companies of all sizes have found significant cost savings by automating high-volume or time-consuming processes—B2B commerce is no exception. Automating the exchange of business documents…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.