Startups and innovation seem to go hand-in-hand. Maybe that’s why we all love that perennial story about two friends in their garage building the next epic disruptor that will change how we think,... View More
Robotic process automation (RPA) software is an important and evolving technology category that organizations should consider as part of an overall process transformation initiative. At IDC, we define... View More
Content silos are an unfortunate byproduct of the move toward electronic documents. In paper form, a document could pass from one business process to the next, albeit very slowly. As organizations implemented... View More
With its latest release of Quadient Inspire R12, global customer communications management (CCM) heavyweight Quadient has clearly set their sights on the digital experience. This enhanced offering also... View More
During Enterprise World 2018, OpenText CEO Mark Barrenechea delivered the opening keynote address at their annual user conference to over 4,000 delegates. The theme of this year’s event was “Mundus... View More
With the use of automation technologies, we've come a long way in streamlining our operations and business processes. Companies are gaining their process independence now more than ever due to an increased... View More
For many large, regulated organizations, customer communications management (CCM) systems have quietly become one of the most expensive and limiting parts of the technology stack. According to Aspire
Before we discuss the act of creating effective and personalized customer journeys, it is important to be reminded that the term “customer journey” tells us it’s the customer’s journey. It’s not mine, not ours and not yours....
Customer Communications Management (CCM) is in serious need of transformation. Today’s customers expect more than basic personalization — they demand relevance, empathy and immediate access to information that speaks directly to them at the...
In an era defined by digital acceleration, remote work and ubiquitous cloud services, cybersecurity threats have evolved from isolated IT incidents to strategic business risks. Cybercriminals have gro