In the two years since OpenText™ acquired OpenText™ Captiva™ in 2017, the technology has continued to advance and become a strategic priority for companies and customers worldwide. According to Harvey Spencer Associates, the capture market is growing at over 10% annually, with the growth of the segment going hand-in-hand with the increase in digital transformation priorities across organizations. In their most recent work, Gain Process Efficiency Through Intelligent Capture, Harvey Spencer Associates defines capture as the fundamental starting point for any digital transformation initiative.
As Karen Shegda outlines in the whitepaper, capture is no longer a stand-alone solution. As OpenText Captiva continues to evolve, we’re innovating to connect captured content to digital business processes, including the ability to easily automate capture through machine learning to further reduce the need for manual sorting and data entry.
Advanced recognition and capture automation
As the whitepaper highlights, Advanced Recognition, or automated document classification and data extraction/OCR, is integral to any capture initiative. OpenText™ Capture Recognition Engine is a widely used and proven technology now included as the default OCR and ICR engine within Captiva, providing customers with advanced recognition and PDF capture capabilities, in addition to automated paper and fax processing.
Enterprise integration
Capture is only one piece of a complete process-automation solution, and seamless integration with content services, ECM and workflow technologies, including records and case management, is vital to enable organizations to optimize an information management lifecycle.
The newest release of Captiva features a proven REST-based integration to the OpenText™ Content Server platform and other core systems. To further facilitate the role of capture in an information management workflow, and particularly case management, Captiva includes CMIS output for out-of-the-box integration with content management platforms that support this industry standard.
In addition, Captiva integrates directly with multiple, enterprise-grade EIM, ECM, ERP and other LOB systems. As we continue to invest in enterprise-level integration and open APIs, Captiva is positioned to be the capture front-end to customer successes with mission critical, line of business applications, such as loan processing, claims management and customer on-boarding.
What’s next?
An important next step is furthering the integration of OpenText AI technology into Captiva. Captiva customers are already benefiting from the addition of AI technologies, most notably through the ability to leverage OpenText™ Magellan™ with Captiva. Organizations are realizing new levels of value by applying this contextual understanding to incoming documents, as well as augmenting existing classification and extraction rules to achieve even greater automation success. All this is playing a role in a growing segment of customers extending capture beyond the mailroom and leveraging its strengths alongside AI to automate larger enterprise processes.
As the capture, ECM and AI markets converge, OpenText is committed to building on and extending the Captiva platform, working with our customers and partners to implement the most effective technologies and solve an ever larger set of business challenges.
It’s 2019, yet the fact still remains: attackers can compromise a network in a matter of minutes, but only a fraction of breaches are discovered as quickly. Most breaches – 68% according to the latest Verizon Data Breach Investigations Report (DBIR) – go undetected for months. The graphic below from the DBIR provides a sobering look at just how wide the gulf is.
This means attackers are spending a great deal of time moving laterally through security environments, performing reconnaissance, escalating privileges with the objective of locating and ex-filtrating sensitive data.
Security, by its very nature, must be reactive. Security tools are based on what we see and learn about how attackers invade networks and endpoints. Most tools available today deliver endpoint detection and response (EDR) via a top-down approach focused on only the malware and files.
OpenText™ EnCase™ flips this on its head, offering a bottom-up approach to threat detection and response that leverages our forensic expertise and offers unobstructed insight into machines, data, and application interactions. OpenText built EnCase by starting at the bottom and reverse-engineering operating systems. This gives OpenText EnCase unhindered access to data, direct visibility into the movement of that data, and visibility into common hiding places for attackers. Forensic-level visibility is unique to EnCase and sets our solutions apart from other EDR tools.
Continuous monitoring and scale
So, if the goal is to detect compromises more quickly, how can that be done? Most EDR products offer some form of continuous monitoring – an always-on approach to collecting data for threat analysis. The benefit is obvious: with a real-time view of data, problems can be detected more quickly.
However, the draw backs of collecting all the data, all the time are equally obvious. Many common approaches to EDR build a full-scale replica of an organizations data. It’s easy to see how this may even be counter-productive at an enterprise scale of 100,000+ endpoints. Issues include:
Installation of oversized agents and/or multiple agents: Agents from some EDR vendors swell to as large as 2GB when continuously monitoring, which is too burdensome to be acceptable.
Unnecessary or excessive scanning: Is there really a threat model that requires continuously monitoring the marketing intern’s machine? Or does a scan per week do the trick? What about a high-value server or CXO machine?
Over-collection of data: Security teams are looking for the proverbial needle in a haystack. Continuous monitoring approaches that make the haystack larger aren’t helping – there is just too much noise and irrelevant data.
Scalability: Every enterprise CISO must ask, “will this work on every machine I want it to, across entire enterprise, without breaking anything?” If the answer is no, then this is not a solution that can effectively scale in an enterprise environment.
Now, compare these traditional approaches to the continuous monitoring available in OpenText™ EnCase™ Endpoint Security that boasts:
A small agent footprint via the enhanced EnCase agent. The enhanced agent is actually a stripped-down version of EnCase that uses a unique set of plugins to run tasks on the endpoint.
Custom global scan frequency and segregation, depending on your needs
Customizable filters to ensure we only collect the right data
We use a pull instead of push methodology when collecting, avoiding a burden on systems and end user performance. When an anomaly is detected, the enhanced agent generates an event and makes a request of the EnCase Endpoint Security server. It’s then added to the task queue and the first available IR person will reach out to the endpoint and pull the needed data. This prohibits the server from being inundated with requests.
The result is a solution with comprehensive visibility across the entire network that is easy to setup, run and maintain, with a consistently light footprint.
What this means for detection
Continuous monitoring is the first step to detection and response. Once teams have access to the data, EnCase Endpoint Security detects threats through various means, including:
User-Behavior Analytics
Threat Intelligence
SIEM alerts that need response and TI via integrations
Rules & policies OOTB, but includes the ability to build your own rules as well
Telemetry
Because of our forensic heritage and unique understanding of data relationships, we are in a prime position to analyze the factors above to detect unknown threats that evade commodity endpoint products. We can safely correlate, validate, and data-enrich previously uncorrelated:
security events
data movement
system activities
data types
This approach primarily focuses on detecting new, advanced, and previously unknown threats and malware.
Helping Incident Responders respond
The key to effective response is prioritization. Security teams are overwhelmed with alerts, and alert fatigue is a serious issue. Anytime a new detection technology is added, more alerts are created.
To help deal with this, teams have a single-pane of glass view within EnCase for enterprise-wide response. OpenText Encase correlates all security events & detections, whether it’s something that EnCase detected or if it’s an event that originated from your SIEM. Tier 1 analysts can sort the data however they would like, with most teams validating the critical alerts first and sending those to the Tier 2 analysts and investigators, and then working their way back to less-critical events.
In an overly-simplified example, the alert below has a threat intelligence score of 100. Meaning, EnCase looked at known databases, ran the suspected malware through a sandbox, and performed other additional endpoint analysis, and quickly generated a threat score. Threat scoring allows security teams to more quickly identify which alerts are critical, which are false positives, and the triage remediation accordingly.
After prioritizing alerts that require response, IR teams can then:
Isolate/quarantine infected endpoints (if needed)
Kill malicious processes
Examine memory and the registry, and if needed reset the registry keys
Delete files that created malicious processes
Look for morphed iterations (entropy) of any advanced or polymorphic malware
In a recent product review and webinar, Jake Williams (@MalwareJake) had this to say about OpenText EnCase Endpoint Security: “The range of features is impressive, but the flexibility of use in those features is the absolute killer feature of the application. Throughout the design, it is obvious that the people writing EES perform incident response themselves on a regular basis.”
So how do you evolve from detection to prediction?
The sheer scale of enterprise networks makes each unique. Like a fingerprint, every enterprise network is the only one of its kind.
Out-of-the-box solutions can detect threats. But more effectively closing the compromise to detection gap takes a combination of intelligent and connected technology and people, a posture of predictive security integrating artificial intelligence and machine learning.
OpenText™ Magellan™ is a flexible AI platform that combines open-sourced machine learning with advanced analytics and enterprise-grade business intelligence, to acquire, merge, manage and analyze enterprise data. With Magellan, security teams can deploy security-specific algorithms in order to draw insights from previously uncorrelated events and behaviors.
OpenText Magellan learns about the enterprise environment, data and preferences over time. It self-optimizes for increasingly better performance, and when coupled with EnCase Endpoint Security, security teams can find insights from data that is seemingly unrelated (to the human eye) – unlocking a posture of predictive detection and response.
For teams not ready to leverage AI and machine learning for predictive insights, OpenText™ EnCase™ Advanced Detection, which is a new detection module for EnCase Endpoint Security, is also available. EnCase Advanced Detection can further enhance the detection capabilities available in EnCase, as well as provide agentless capabilities.
EnCase Advanced Detection delivers:
Threat intelligence
Emulated sandbox
Binary file analysis
Machine learning
Partial hashing
Memory analysis
Active breach detection
User entity behavioral analytics
Threat-scored forensic artifacts
MITRE ATT&CK implementations
Signs of exfiltration and C2
At RSA, the OpenText team will be showcasing the combined suite of security solutions. OpenText believes that a custom deployment of the right technology will unlock a posture of predictive security for the Enterprise.
Visit us in the Moscone North Hall at booth #6353 during RSA 2019 for a demo.
Learn more
Join us at Enfuse 2019: book now to take advantage of the early bird rate.
Digital information is exploding across the enterprise. Integrating content services can dramatically improve efficiencies and achieve better business outcomes, connecting digital content to enterprise systems where business users can easily access and use it.
Content services build on your organization’s existing ECM platform to make it more flexible and holistic — creating information flows that maximize the performance of business processes. People and processes become more connected and productive, in ways that work for them, while increasing the amount of information that is brought under governance control.
The cost of not adopting new approaches to information management is easy to quantify. The digital transformation of enterprises and entire industries means that survival depends on effectively managing and extracting incremental value from an organization’s most valuable asset: Information.
Organizations can better understand this rapidly changing landscape and learn how to extract more value from content to become truly intelligent and connected by:
Elevating lead application capabilities: Increase the power of business systems by injecting information when and where it’s needed to better optimize accuracy, velocity and effectiveness.
Improving business processes: Increase overall company outcomes by enriching business processes with critical content and insights.
Empowering employee productivity: Enable business teams to know, see and do more, allowing them to make faster and smarter decisions.
Realizing one version of the truth: Extend and apply governance policies to a much larger pool of enterprise information.
Download our ECM Integration guide to learn more about these four ways to connect content to your digital business and boost productivity. In the guide, you’ll also see real-world examples of how organizations are extracting more value from their content when integrating it with key business processes.
Learn more about OpenText Extended ECM solutions
Learn more about the OpenText™ Extended ECM Platform and how it offers organizations a way to transparently integrate OpenText Content Suite Platform to their lead applications, allowing for seamless information flow between all systems. It is available with out-of-the-box solutions for many leading business applications for HR, CRM and ERP like Salesforce®, SAP®, Oracle® E-Business Suite, and Microsoft® Office 356™. It also has development tools, APIs, and templates needed to create custom integrations to other lead business systems.
In the energy sector, it’s not just change that organizations must prepare for – it’s the speed of change. In October last year, the price of Brent crude was as high as $85 per barrel. Optimism was in the air and there was talk of new capital investments and new development projects. By early this year, however, that price had fallen to just over $54 a barrel. The caution that energy industries – oil and gas, especially – have experienced since 2014 is back.
In its predictions for the oil and gas sector in 2019, Deloitte suggests that “investors will likely want to see sustained returns and capital discipline, not just volume growth”. While energy companies must continue to focus on operational excellence to boost efficiencies and returns, this doesn’t diminish the major business opportunities that are likely to occur as all energy markets change. According to PWC, companies should ‘double down on digitization’ to drive efficiencies and open up new opportunities. With this in mind, here are five trends that will have a major impact on energy companies this year and beyond.
Trend 1: Industrial IoT at the heart of everything
The Industrial Internet of Things (IIoT) is now a commonplace within energy sectors. Companies understand that the use of IoT devices can transform many parts of their operations. IoT not only connects machines and appliances, it also allows for greater connectivity across entire assets – drilling rigs, refineries, pipelines, grids, etc., – to optimize performance and minimize downtime, while enhancing health and safety and environmental performance management. We are beginning to see the introduction of ‘Digital Twins’ that use data from IoT devices to create a virtual simulation of an asset to improve efficiencies and enable predictive maintenance.
In 2019, as the pace of IoT adoption increases, energy companies will need to meet the challenge of properly capturing and exploiting IoT data while ensuring the security and performance of their growing IoT networks through an identity-driven IoT platform.
Trend 2: Operational excellence puts the focus on content services
Effective content management has been a mainstay of energy operations for many decades. As this technology evolves into what Gartner has termed ‘content services’, energy companies can gain even better control of their content. Additionally, micro-services and mobility functionality gives users access to exactly the information they need wherever and whenever they are.
Trend 3: Increasing profit margins means greater asset utilization
The desire to increase revenue and profit margins means that companies will look to ‘sweat the assets’. Whether oil and gas or utilities and power, companies are used to focusing primarily on asset utilization and reliability. However, across the energy sector, assets and infrastructure is aging. This raises two challenges for energy companies: They must minimize unplanned outages through the use of predictive maintenance and they must monitor asset performance closely to ensure the decision to replace or retire equipment or assets are made at exactly the right time.
Trend 4: Achieving collaboration in evolving value chains
The value chain across all the energy sectors is changing. Within oil and gas, companies are moving from the traditional ‘owner operator’ model of working with suppliers, towards a model of working with organizations that have complementary skill-sets to build ecosystems, enabling them to quickly embrace new opportunities and business models. This includes the large oil and gas companies that are now entering low carbon plays by investing and acquiring renewable energy resources.
The increase in distributed energy resources (DERs) and micro-grids will impose a similar evolution of the utilities value chain. The traditional model of large, top-down and centrally distributed energy production is being replaced by modular, consumer-driven and evenly distributed power generation. Providers must work out how to cooperate with the new players in the power generation business. In 2019, energy companies will seek to forge alliances in their value chain ecosystem and find better ways for them and their partners to work and collaborate together.
The hype that has been surrounding terms like artificial intelligence (AI) and advanced analytics is beginning to become a reality. Energy companies are starting to gain greater control over the data and are turning it into actionable insight to drive faster and sharper decision-making. The application of AI-assisted analytics is fairly established in areas such as predictive maintenance.
This year is likely to see an extension of this through prescriptive analytics. This type of analytics allows companies to move from a product-based to a process-based approach. Companies can quickly see where failures in the process are likely to occur and take remedial action before it becomes a problem. As the analytic engines become more sophisticated, the front-end business intelligence capabilities become more user-friendly. Simple interfaces, visualizations and dashboards make it easier for users at all levels to analyze the data.
For energy companies in 2019, deploying the correct digital technologies will be vital to keeping operations lean while delivering the flexibility and agility to meet business and customer demands. If you’d like to know more about how OpenText can help improve operational excellence in your energy organization, please contact us.
RSA 2019 is right around the corner. The most exciting security conference of the year – apart from OpenText™ Enfuse of course – RSA is a chance for us to meet our customers, hear first-hand about their security challenges and educate them on the solutions we provide.
At OpenText, we build secure solutions for the connected and intelligent enterprise, because that’s what we are and that’s who we care about.
This year, we are coming to RSA focused on three major problems:
Connected and intelligent enterprises need faster detection and response that can work at scale
In a world of connected everything, the enterprise must manage the digital identity of people, systems and things
Enterprises need real AI and ML to unlock insights faster and achieve better security outcomes
Visit us at booth #6358 in Moscone North Hall for more, but we’ll start with a sneak preview.
Meeting the need for Endpoint Detection and Response (EDR) at enterprise scale
The key to effectively containing an incident is faster detection. EDR tools are meant in part to continuously monitor endpoints – the process of capturing and analysing data in real time from enterprise endpoints to help security teams detect issues more quickly.
But what happens when your enterprise needs to scale solutions to 100,000, 200,000 or even 500,000 endpoints? And across multiple continents? Every enterprise CISO I’ve spoken with has to ask, “will this work on every machine I want it to, providing value across the entire enterprise consistently without breaking anything?” If the answer is no, the solution isn’t viable at enterprise scale.
OpenText™ EnCase™ delivers threat detection and response with a “bottom-up” approach that leverages our forensic expertise and capabilities. EnCase offers unobstructed insight into machines, data, and application interactions for security teams, while eliminating many of the issues that make traditional EDR tools difficult to scale.
The importance of Identity and Access Management (IAM) for Security
According to one estimate, 80% of data breaches are caused by stolen, weak or default passwords – in other words, poor identity management, and not just for the people accessing enterprise networks.
Cyber attackers are relentlessly targeting digital identities (the keys to the kingdom!), the devices that make life easier, and the networks that make everything work. As enterprises become more connected to an ever-expanding network across the internet of things (IoT), digital identity and cybersecurity are becoming more closely linked than ever.
We’ll be demoing the platform all week at booth #6353.
Getting real about AI and Security in 2019
The final problem we’ll be discussing in detail at RSA, how AI and ML can be applied for better security. AI was the term du-jour at RSA 2018, but for all the hype and marketing, we believe 2019 will be the year we take a realistic look as a community at how to leverage AI to solve real use cases within security operations.
Writing in Forbes this year, Joe McKendrick predicts that “In essence, AI will increasingly serve as a way to filter through the growing data hairball that characterizes today’s enterprises.”
Visit us in the booth to learn how OpenText™ Magellan™, a flexible AI-powered analytics platform, learns the enterprise environment, data and preferences over time, to self-optimize for increasingly better performance. When combined with OpenText™ EnCase™ Endpoint Security, OpenText Magellan provides security teams insights from even the most complex and seemingly unrelated “data hairball.”
We call this a posture of predictive security – a vision of integrated security, machine learning, and business intelligence from OpenText that reduces the gap between compromise and detection, improves response capabilities, and creates better security outcomes.
Visit Booth #6353 to learn about how we scale EDR for the enterprise, help manage the entire identity lifecycle, and get real with applied AI and ML for predictive security.
If any of these topics are of interest to you, I hope we’ll see you at Moscone.
Vertica has a built-in function to calculate the arithmetic square root a number called SQRT and another built-in function to calculate the arithmetic cube root of a number called CBRT.
Example:
dbadmin=> SELECT sqrt(9);
sqrt
------
3
(1 row)
dbadmin=> SELECT cbrt(27);
cbrt
------
3
(1 row)
But what if I need a function to calculate the arithmetic nth root of a number? No problem. I can create my own!
dbadmin=> CREATE OR REPLACE FUNCTION nrt (x FLOAT, y FLOAT) RETURN FLOAT
dbadmin-> AS
dbadmin-> BEGIN
dbadmin-> RETURN POWER(x,(1/y));
dbadmin->
dbadmin-> END;
CREATE FUNCTION
In today’s digital world, the ability to establish defensible and transparent processes to auto-classify digital content is of growing importance to the intelligent and connected enterprise. As data stores get bigger and bigger, the burden of classifying them grows as well. In fact, the challenge is not just to classify digital content quickly, accurately, and cost-effectively, but also to make these processes legally defensible and transparent if litigation ever rears its ugly head. This challenge generates many questions about auto-classification: how does it benefit your bottom-line? Can all your content be classified automatically? What auto-classification tools are there, and how can we use them efficiently? What work is required upfront to setup an auto-classification pipeline? What kind of work is required in the long run?
In this blog series, I explore these questions about auto-classification and show you the many ways that OpenText™ can help. In this first installment, I share some insights about the benefits of auto-classification, as well as how to figure out what you want to classify.
Why Auto-Classification?
There are two main reasons why today’s businesses turn to auto-classification:
1. Simplifying record keeping and content classification, and saving on time and related costs.
While this is a very compelling reason to move towards auto-classification, it’s important to know that such solutions come at a cost, both in terms of money and effort. Although auto-classification has many long-term benefits, including reducing your employees’ workload when it comes to classifying your content, setting it up can require a substantial upfront investment in time and effort from external or in-house experts. It’s important to weigh your expected return on investment against the initial cost.
2. Mitigating legal risks when it comes to litigation, while ensuring compliance with respect to a retention policy (if applicable).
Enforcing and maintaining a transparent and defensible retention policy can impose constraints that must be clear throughout the development of classification models. It is crucial to know the exact type of content that is to be classified (emails, images, text files, etc.), and to make sure we choose the right tools to realize our desired outcome of retaining only the documents important to your business while disposing of legacy, unnecessary or potentially harmful content.
This disposal leads to two immediate benefits: savings on storage and the ability to combine the resulting classification structures with other semantic metadata extracted from the content to build more robust search and AI solutions. (I’ll go into this more in a future blog.)
What do you want to classify?
There are a variety of auto-classification tools on the market, so it’s important to understand what you want to classify and how. Thinking carefully about the nature of all the content you wish to classify, and ensuring you consider the right tools for the task(s), is always the first step.
Ask yourself: when you look at a document, how do you know which category it belongs to? Is it a document containing text (contract, email, financial report)? Is it a plan or CAD file identified by a specific symbol? Is it a photo or a logo? If the textual content is what matters, then you should choose a tool that can train classifications based on that. If you want to classify documents found in your content repositories, such as OpenText™ Content Server, or your employees’ mailboxes, and want to have a good user interface and dashboards to clearly understand the performances of your classification models, then a tool like OpenText™ Auto-Classification (OTAC) might be what you’re looking for.
If you want to auto-classify your content and combine the results with other metadata (system or semantic) to build more robust search and AI solutions beyond an auto-classification pipeline, then OpenText™ Magellan™ Text Mining can help. For a quick demo of Magellan Text Mining, simply paste part of your favorite news article here.
If you want to manage usage rights for images or clips, manage your branding and branding history, or resolve discovery challenges relating to your digital content, then a digital asset management platform like OpenText™ Media Management (OTMM) is what you’re looking for.
After you’ve identified the basis for your classification, it’s important to verify that this feature of your content is readily accessible. Do you have image PDFs in your collection, reflecting a legacy of documents scanned over the years? It’s likely these documents should be treated by optical character recognition (OCR) software before classifying them with a tool made for textual content. If you’re trying to classify invoices and receipts captured by employees on the go, then you might be looking for solutions like OpenText™ Captiva™.
Now that we’ve identified our content to be classified and chosen our tools based on our classification criteria, how do we classify our content? Join us next time when we dive into this question and more!
This year, OpenText™ sent our first official delegation of talented female employees from our Hyderabad and Bangalore offices to the Grace Hopper Celebration India (GHCI). As Asia’s largest gathering of women technologists, GHCI provided our delegation with incredible learning and networking opportunities.
I had the pleasure of joining our inaugural Indian delegation to GHCI in Bangalore. Over 5,000 attendees took part in the official satellite event of the Grace Hopper Celebration, including our ten inspiring leaders. It truly was a conference to remember!
I sat down with some of our attendees – Luxmi Priyadarshini Bhattacharya (Program Manager), Himani Rathore (Manager, Consulting), Shalini Mahale (Senior Project Manager), Ashu Thangaraj (Director, Engineering) and Rama Bhamidipaty (Senior Director, Engineering) – to hear their thoughts on GHCI, diversity in the tech industry, and what makes India a great place for women in tech to thrive.
How did it feel to be selected as part of the first OpenText delegation to be sent to GHCI?
Luxmi: I felt honored to represent OpenText at the GHCI event. It was a great learning experience that I believe is going to bring the best out of me, both personally and professionally.
Ashu: It feels great to be selected as part of the first OpenText Delegation in India. This exhibits the commitment that OpenText has to diversity in technology. I am hoping that this continues and gets bigger year after year.
Himani: Being selected as part of the first OpenText delegation to GHCI was incredible and truly special. It was a conference full of energy and inspiration – so I was excited and was looking forward to this opportunity. I was the youngest member in the OpenText delegation and I knew I had so much to learn from all the other wonderful delegates, and that is exactly what happened at the conference.
India has made great strides in achieving gender equality in the technology industry. How do you think the country has achieved this great milestone?
Rama: In India, many female students prefer STEM disciplines. There are a huge number of companies offering technology jobs, providing real opportunities to female graduates. Companies are becoming more aware of the skills female employees can bring to an organization, including their aspiration to continue working after having children. The Indian government mandates that larger companies provide not only maternity benefits but also child care facilities for women returning to work. This helps women to continue in their career and thrive in the workplace.
Himani: The mindset of people across society is changing in India. Female empowerment is being given a lot of emphasis and women themselves are motivated to join the tech industry, so professional careers are leaping forward. Women are now able to concentrate on their career aspirations due to the support system they are building on. The support of the family and the help of other women are making great things happen.
Shalini: India has evolved over the years. I do see a great change in the mindset over the last 15 years, when I started my career. Education has played a key and pivotal role, and I think the technology industry has made significant progress in promoting gender inclusivity. Government intervention and some trail blazing women achievers have helped to bring about some drastic shifts in the industry. The percentage of women hired into entry level jobs has significantly increased in the last five years. I feel India still has a very long way to go, but one can take solace in the fact that we are marching towards the right direction, towards progress, women empowerment, global impact. Change is happening in every sector. There is a need to focus at the middle and senior management levels, too, to create more role models.
What was your biggest takeaway or favorite memory from the conference?
Shalini: I have great memories created for life from the conference. I had a wonderful opportunity to hear from women achievers about their life experiences and learnings. I was inspired hearing stories from a women achiever in the field of sports, who shared how to “Thrive on Pressure Like a Sportsperson”. I met some great colleagues from OpenText who were my co-participants and learned how they overcame challenges in their lives.
Rama: Lori Beer, Global CIO of JPMorgan Chase & Co. referred to the song “I am Unstoppable” in her discourse. It was amazing and inspirational to see a woman coming from a farm community rising to the be the CIO of such a huge company.
Luxmi: “Leadership is an action not a position.” After attending multiple sessions by dynamic women leaders, what became very evident to me was leadership is not about position, or for that matter, title. It is about action. It is about who we are and our actions, our deeds, how we treat others, how we make decisions, how we listen to others, how we accept responsibility for our actions and hold ourselves accountable; this is who we really are. As leaders, we must realize that every action is a reflection of our character, our integrity and our ability to be noble, caring human beings.
Why do you think companies need to focus on diversity and inclusion in the future?
Ashu: Research has shown that having at least 30 percent diversity in the organization at board level increases the profitability and growth of the organization. There is diversity everywhere and embracing it enables companies to understand the needs of customer and help build better solutions. For today’s organizations, it has become an imperative to focus on diversity.
Rama: When women are part of the tech world, new ways of living, of seeing the world and of doing business reveal themselves. Women’s contributions need to be respected, their voices have to be heard. Companies will be better places to work, and more innovative and productive, as a result.
Luxmi: Diversity and inclusion is an absolute must in the global workspace. Apart from boosting the brand of the employer, it also helps create an environment for generating non-homogenous thoughts among the workforce. With the exchange of creativity and innovative ideas, diverse teams are known to perform better. Needless to say, high performing teams will eventually let the business grow and make it sustainable in the competitive market.
Ashu, you have been a GHCI volunteer since it began in India and this year you managed the “Tech for Good’ track. Why do you continue to get involved in GHCI year after year?
Ashu: I have been passionate about women coming into STEM and technology. GHCI was a great platform for me to help contribute towards this, and since the time GHCI started in India, I have been volunteering for this program. I had been a committee member as well as a speaker in the previous GHCI. It also provides a good platform to network, learn from other leaders and benchmark the work our organization is doing.
Hear more about Ashu’s involvement with GHCI, her career path and her advice for young women entering the industry in this video interview from OpenText Enterprise World 2018.
What is one piece of advice you would like to give to women who are just starting their careers?
Luxmi: The one piece of advice that young ambitious women are never told but could make all the difference is – “When you have an idea, be passionate about it and get your voice or product out there. Do not allow fear of failure hold you back from expressing yourself creatively. Keep thriving, keep pushing, persevere. Every day is a new opportunity, and you can take as many days as you need to succeed. ”
Rama: Be confident and be strong and show yourself as the expert that you are. Take credit and accept praise for your work. Voice yourself, don’t let only your work speak for itself. Its voice might be lost.
Himani: Confidence is a gift we give to ourselves, so believe in yourself and take the plunge, do not give up. Your career is as important as anyone else’s so do not settle for anything less than what you deserve.
More from the delegation
To hear more from Ashu, take a look at this blog where she shares her experience working as a leader in tech, or this interview with Ashu and Lakshmi Chinnam. Next, listen to this interview with Rama and Sangeetha Yanamandra, Director, Software Engineering on diversity and inclusion in the tech industry in India.
We also attended the Grace Hopper Celebration of Women in Computing in the U.S. this year – take a look at what our delegates had to say in this interview.
With the demand for creative content to support an ever-increasing volume of campaigns and programs on the rise, marketers turn to digital asset management (DAM) solutions to address their creative challenges. A DAM platform like OpenText™ Media Management helps marketers organize and store large volumes of digital media content. But to solve both halves of the “creative crunch” equation, marketers also need a solution to manage how their creative content is made.
Enter creative collaboration software like OpenText™ Hightail™. Designed to streamline the review and approval process (aka how creative content is made, the second half of that equation), Hightail allows teams to easily share, collaborate and approve large rich media files.
Combining the power of an industry-leading DAM solution like Media Management with a simple, intuitive tool like Hightail, marketers now have a robust solution to boost their team’s productivity and generate significant cost and resource savings across the digital content supply chain.
Not sure if your team needs a DAM and/or creative collaboration software? Read this American Marketing Association e-book to learn how you can use technology to #createbetter.
OpenText™ TeamSite™ has come a long way in recent years, but there are a few lingering myths about its capabilities. Here are five of the most common myths we hear.
Myth #1: TeamSite is for websites only
Reality: TeamSite is a headless (and decoupled) Content Management System (CMS) which makes it ideal for any digital channel. The content is created and stored separately from where it is viewed. This means that you only have to create the content once and it can be published anywhere. TeamSite offers out-of-the box responsive design templates for publishing mobile websites along with hybrid mobile application support.
Myth #2: TeamSite is hard to use
Reality: With Experience Studio, TeamSite has a user-friendly interface that makes it easy to work with. Not only is it organized in a very intuitive way with tile-based projects and pages, but you can get started easily with our templates, other HTML templates (like Foundation or Bootstrap), or even make your own. User-friendly features like on-the-glass (WYSIWG) editing and drag-and-drop form creation allows non-technical team members to work within TeamSite confidently.
If you run into issues, Experience Studio also includes step-by-step instructions in its Help area.
Experience Studio, TeamSite’s user-friendly user interface. If you’re using CC Pro, let’s set up a demo and we’ll show you how it works!
Myth #3: TeamSite can’t keep up with the modern marketer’s needs
Reality: TeamSite is uniquely designed to be future-proof. Think of it as the ideal foundation which you can build upon, renovate and expand over time. TeamSite includes the key functionality a marketer needs, including built-in analytics, integrated multivariate and A/B testing, campaign management support, and easy development of mobile and landing page campaign solutions. All of this allows easy collaboration with creative services teams and agencies.
Myth #4: TeamSite is only for Java developers
Reality: TeamSite is technology agnostic, meaning you’re not limited to a certain developer language. In fact, whether you use Java, .NET, PHP, Angular, React or any other language, your skills will work well. This opens up a world of possibilities when hiring top talent to help your organization excel.
Myth #5: An end-to-end Content Management System is better than TeamSite
Reality: Although OpenText offers an end-to-end experience solution, TeamSite gives you the freedom to work with the software of your choice. This means that if your organization has already invested in best-of-breed software, or if a start-up comes up with an incredible tool, you can rest assured it will integrate with TeamSite. This helps make for a seamless transition and cuts the cost of training your employees on new software.