RFID, a technology first invented by the USSR for US surveillance at the beginning of the Cold War, is fast becoming the new technology of the late 2000s. RFID, otherwise known as "the Internet of things,"... View More
Recent headlines lead businesses and consumers to believe that the majority of data breaches occur online. According to "Security of Paper Documents in the Workplace," a new study from the Ponemon Institute,... View More
Once the right price points are achieved, the scope of RFID applications is limited solely by the ingenuity and imagination of the user. Aside from supply chain management, here are some of the most popular... View More
Today, financial institutions can realize continued growth in one of the most mature of treasury management services — wholesale lockbox (WLBX) — even as B2B check payments inexorably relinquish... View More
Even if you are not a programmer, you have likely heard some mention of XML within your organization and throughout the industry. Certainly, your technologists are using it when explaining how they are... View More
The form is the thing. In fact, it lies at the heart of all document-centric applications. Yet, as science marches on and technology convergence runs its inevitable course, it becomes easier and easier... View More
It’s no secret that digital channels have become foundational to the delivery of customer communications, with customers increasingly indicating mobile apps, SMS, email and other digital delivery me
Customer communications surrounding accounts receivable (AR), particularly those regarding overdue payments and the initiation of collections, are among the trickiest to craft given the critical
In the digital transformation era, what most needs digitization is multiform content. Enterprise content management systems (CMSes) are how that will get done