Screenshot 2016-08-15 11.20.49
Aug. 15 2016
When we focus on improving customer engagement and customer experiences, we don’t always have the complete story. Some companies have dozens of channels to manage, including offline, online, and... View More
ThinkstockPhotos-514989248
July 14 2016
When the last person leaves the office at night, the doors are supposed to be locked with the alarm set, but tonight, the alarm is off, and a side door is left propped open by a provider. When no one is... View More
bigdatapanel
June 30 2016
I had the honor of participating in a panel discussion about big data at the DOCUMENT Strategy Forum (DSF '16). The panel was moderated by Lane Severson from ... View More
CISO
June 15 2016
If you didn’t already know, there is a new sheriff in town within the corporate structure, and it’s the chief information security officer (CISO). If you need proof, look no further than the... View More
June 8 2016
Acuant, the leading provider of identity management solutions, today announced the acquisition of AssureTec Technologies, a leading provider of identity document authentication and data capture solutions.... View More
structure
May 24 2016
Do you have unstructured data? This term is used more and more each day. What is it? To best understand unstructured data, perhaps it is easier to define what it's not—structured. All businesses... View More
ThinkstockPhotos-179693732
May 23 2016
I’m currently working on an upcoming report on the impact of artificial intelligence on collaboration, and we’re seeing a growing trend toward what I’m calling "intelligent collaboration."... View More
830x539_David
April 21 2016
In his famous management book first published in 1954, The Practice of Management, Peter F. Drucker stated, “The goal of a business is to create and keep customers.” Today, more than 60 years... View More
ThinkstockPhotos-83397708 (1)
Feb. 12 2016
We know there are risks of data loss and data breaches by external hackers and fraudsters. We see this reported daily. While this is of concern, it is the internal threat of theft by staff or ex-staff... View More
bullseye
Jan. 20 2016
Many areas of research that we conduct within our business applications practice at 451 Research are becoming predicated upon data-driven principles, from managing advertising spend, matching consumers... View More
Dec. 10 2015
Photizo Group agreed to develop an automated Just-in-Time (JiT) toner delivery solution with PrintFleet, a leading provider of managed print software (MPS) and data-driven solutions for the imaging industry
printsecurity
Nov. 30 2015
Much has been written about the importance of securing data in the enterprise. Organizations have implemented policies and have spent untold millions of dollars to ensure the security and privacy of sensitive... View More
Oct. 29 2015
DocPoint Solutions, Inc., a leader in the implementation, customization, training and support of SharePoint solutions and its integrated suite of products, and CipherPoint Software, Inc., the global... View More
Decisions
Oct. 15 2015
In my past articles, I keep insisting, time and again, the reason that documents should be very well taken care of is that managers are paid to make decisions, which are made based on knowledge... View More
predict_small
Sept. 1 2015
Predictive analytics is the big “buzzword” in much of the industry today, and the imaging market is no exception. While still profitable, our margins are under pressure on almost all fronts.... View More
digitalengagement_small
Aug. 20 2015
If you look anywhere within the technology world, the terms "Big Data" and "digital marketing" keep popping up. I confess I had a general idea as to what they all meant but had yet to see the practical... View More
Trust_small
July 29 2015
I find that there’s a “Zen” thing going on when it comes to content marketing—your ultimate goal is to generate a lead for your sales team. However, to most effectively do this,... View More
IoTworkflow_small
July 20 2015
The Internet of things (IoT) will likely be one of the most powerful accelerators for digital transformation in our industry. That said, we at IDC predict that the worldwide IoT market will grow... View More
cloudsecurity_2015_small
June 23 2015
In a recent online debate presented by The Economist arguing “Should companies do most of their computing in the cloud?” noted security, privacy and cyber-terrorism expert Bruce Schneier highlighted... View More
June 10 2015
Cloud Labs Kft announces that Cloudifile, its free cloud file encryption client software, launches a Mac OS Beta today. Cloudifile automatically encrypts data for secure cloud-sharing and local file storage.... View More
 
  • Generative AI (GenAI) is set to revolutionize the Customer Communications Management (CCM) industry, driving profound changes in how businesses interact with their customers
  • Editor’s Note: This is part 2 of a 3-part series on AI in CCM. You can find part 1 in our Spring issue. Look for part 3 in the next issue
  • Today, executives are excited about the promise of artificial intelligence (AI) to help their businesses grow and innovate, potentially transforming every part of work, delighting customers with new e
  • Personalization is the core of what we do in CCM, and we do this on a scale that still requires specialized software that cannot be replaced by marketing or office editing tools. The number of persona
  • In today's fast-paced business environment, the future of efficiency and productivity is automation