by Robert Palmer | 2/11/15
On February 9, HP announced plans to acquire encryption technology vendor Voltage Security. Based in Cupertino, CA, Voltage Security offers a broad array of security solutions, but its flagship product is data encryption and tokenization technology that can be applied to distributed file storage systems, such as Hadoop, and to distributed applications including e-mail, regardless of where the data resides. Founded in 2002, Voltage Security has received multiple rounds of financing and has been growing steadily in the enterprise security market.
by Ken Neal | 2/2/15
Communication counts, particularly for information management professionals. Why? Because they often have to communicate how their programs can help drive success. To meet this and other challenges, I suggest honing six relatively simple skills. These include: be brief, be clear, be receptive, be strategic, be credible and be persuasive. I believe these skills function together — as an integrated system or “communications workflow”— adding up to much more than any one skill individually. Implemented together, they provide a powerful persuasive force that greatly increases your chance of getting what you want.
by Amy Weiss | 1/16/2015
If you Googled the most-used topics in technical blogs leading up to 2015, topping the list would probably be the fact that it’s the year in which Michael J. Fox went forward to the future in Back to the Future 2. It’s overused because it’s applicable, and because that movie gave a lot of children of the 80s some pretty high expectations for 2015 — children who are now writing said blogs. So it’s pretty common to hear depressed 30- and 40-somethings bemoaning the fact that there are no hoverboards or flying cars in the real 2015.
by John Mancini | 1/6/15
The concept of a paperless society originated way back in 1978 by information scientist Frederick Wilfrid Lancaster – a world where paper documents would be replaced by electronic storage and communication. Progress has undoubtedly been made, yet it sometimes feels as if we are as far away from that vision as ever.
by Mitch Taube | 12/16/14
It’s a widely known fact that workflow automation can boost your staff’s productivity, make your company run more efficiently and effectively, and improve your bottom line. But another major benefit to workflow automation — one that’s less frequently talked about — is keeping your business compliant, reducing your risk of costly penalties and fines.
by Amy Weiss | 11/4/2014
The Executive Connection Summit (ECS), held Oct. 27-29, 2014, presented opportunities, questions, and answers surrounding a fast-changing industry. The title of the summit couldn't have been more apt as the connected world is here, a fact demonstrated by the content and the speakers as they worked through the rapidly shifting world of the imaging channel. Hopefully most attendees were left as I was, with not just a sense of change, but a feeling of tremendous momentum.
by Larry Barrett | 10/1/14
Ubiquitous smartphones, cheap and abundant digital storage repositories and the continuous development of new software applications designed to parse, label and contextualize the trillions of digital videos and images generated every year has created a whole new universe of intriguing – and some might say disturbing – business opportunities. Isn't that wonderful?
by John Mancini | 9/24/14
The customer is and always will be right. This old adage is as applicable to business now as it ever was. But the digital age and the use of social media has given consumers power they could only have dreamed of decades ago. They can share their experiences and praise or criticise brands to potentially millions of people around the globe. This open and direct dialogue has forced companies to look carefully at their Customer Experience Management (CEM).
by Larry Barrett | 9/19/14
At the time I was gunning my Honda through a crowded grocery store parking lot last weekend with rage in my heart and some vague notion of instant retribution on my reptilian mind, it didn't occur to me until hours later that technology – for all its utility and purported benefits – was directly responsible for the ensuing exchange of expletives between two middle-aged strangers from the safety of our respective four-wheeled weapons.
by Ted Ardelean | 8/25/14
This is the third post in a three-part series about attaining high-performance Accounts Payable. To read the first post of the series, please click here. To read the second, please click here.
Our previous posts provided solutions for the most common challenges associated with invoice intake and invoice approval and processing – the first two stages of the accounts payable (AP) process. Traditionally, these stages are incredibly time consuming: requiring invoices (typically in paper format) to be routed from the buyer to the AP department; the invoice data to be manually converted and entered into the organization’s ERP system; the invoice to be validated by line-checking items against company data; and, finally, any discrepancies to be resolved before the invoice is approved for payment.