Capture is a term most commonly recognized in the enterprise content management (ECM) segment as the scanning of paper documents. Today, it has expanded to include all types of information—both scanned... View More
2017 was a turbulent year for many enterprise buyers, as we continued to see major shifts in the technology marketplace. Market consolidation, accelerated migration to the cloud, and a growing shift to... View More
As enterprises are faced with a plethora of choices for digital workplace technologies, it is important to focus on improving people’s experiences and leveraging tools to help get their work done.... View More
Organizations in every industry are recognizing that building strategies to manage the customer experience (CX) has become critical to their business success. Tracking and honoring customer preferences,... View More
About a year ago, we reported on the announcement by OpenText on their intention to acquire Dell EMC's Enterprise Content Division (ECD), which includes Documentum, InfoArchive, and LEAP. It was a move... View More
If you are researching the topic of document management, there are many white papers, articles, books, presentations, etc. about document management systems and technology, but there are few focused on... View More
For many large, regulated organizations, customer communications management (CCM) systems have quietly become one of the most expensive and limiting parts of the technology stack. According to Aspire
Before we discuss the act of creating effective and personalized customer journeys, it is important to be reminded that the term “customer journey” tells us it’s the customer’s journey. It’s not mine, not ours and not yours....
Customer Communications Management (CCM) is in serious need of transformation. Today’s customers expect more than basic personalization — they demand relevance, empathy and immediate access to information that speaks directly to them at the...
In an era defined by digital acceleration, remote work and ubiquitous cloud services, cybersecurity threats have evolved from isolated IT incidents to strategic business risks. Cybercriminals have gro