Compliance
What are your competitors doing this year?
Application delivery management (ADM) plays a pivotal role in ensuring the seamless deployment, monitoring, and optimization of software applications. We’re well into 2024, and we…
Streamline identity management with a secure automated cloud solution by NetIQ Identity Manager by OpenText
OpenText™ Cloud Editions (CE) 24.1 introduces exciting updates and enhancements tailored for CE customers. Among these notable additions is NetIQ™ Identity Manager, a cloud-based solution…
Innovation with a Canadian accent
As the new year begins, it’s a great time to look ahead. If your 2024 plans include finding new ways to drive your organization forward,…
E-commerce and EDI: What’s the difference?
There are lots of different terms used to describe B2B process automation. These terms can be confusing, partly because they are so inter-related. This article…
Three use cases for cloud fax in financial services
Fax is so secure that faxed documents and signatures are recognized in the courts as being legally binding. It stands to reason, then, that fax would be the bedrock of financial…
G before S except after E and other rules to live by
2022 was both chaotic and transformative – a war in Ukraine, increased cyber-attacks, disrupted supply chains, an adjustment to work at home and new trust…
Redaction blunders in context
There are many great articles that focus on the headache (and harm) that occurs when sensitive data is not redacted properly in eDiscovery, investigations, and…
When it comes to EDI service providers, less is more
I’ve seen it many times: often business expansion and acquisition leads to organizations with multiple business units on multiple continents. Each has its own EDI…
Responding to Second Requests
Recent experience has convinced me that familiarity breeds complacency when it comes to responding to Antitrust Second Requests. In the name of the “unique nature”…
Global e-invoicing compliance drives manufacturers to seek partners
Each year brings more dramatic developments in global e-invoicing compliance to which manufacturers must quickly respond. There are more than 170 governments worldwide now operating…
Turn up the volume with Table Top Exercises
MITRE released a new edition of its book on “the way security operations is done”, 11 Strategies of a World-Class Cybersecurity Operations Center. The book…
Introducing OpenText Supplier Portal: one portal to rule them all
Securely build, manage and connect business ecosystems to deliver enterprise services and collaborative processes, irrespective of industry and geography Digital initiatives that interconnect ecosystems of…
What factors are driving change in your corporate investigation processes?
This blog has been co-authored by Rachel Teisch and Andy Teichholz. Significant increases in the quantity and complexity of information, along with growing compliance and regulatory…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.