Through a 100% share purchase agreement, Xpertdoc Technologies Inc. has acquired the assets of XperiDo from Belgian company Invenso bvba for an undisclosed amount. In a briefing late last week, Xpertdoc... View More
The new year has been pretty quiet on the acquisition front for OpenText, but today, they showed some love for the cloud file sharing and collaboration firm Hightail, announcing they had acquired Hightail... View More
After more than a week of speculation and rumors, Japan's FUJIFILM Holdings Corporation and iconic US company Xerox Corporation announced today that they had entered into a definitive agreement to combine... View More
About a year ago, we reported on the announcement by OpenText on their intention to acquire Dell EMC's Enterprise Content Division (ECD), which includes Documentum, InfoArchive, and LEAP. It was a move... View More
Last week at the Dreamforce conference in San Francisco, Google and Salesforce announced a partnership that will allow companies to get more out of the cloud than ever before. The partnership, which promises... View More
Join our Editor Allison Lloyd for this quick review of Gartner's 2015 Magic Quadrant for the CRM Customer Engagement Center & the trends for customer engagement... View More
For many large, regulated organizations, customer communications management (CCM) systems have quietly become one of the most expensive and limiting parts of the technology stack. According to Aspire
Before we discuss the act of creating effective and personalized customer journeys, it is important to be reminded that the term “customer journey” tells us it’s the customer’s journey. It’s not mine, not ours and not yours....
Customer Communications Management (CCM) is in serious need of transformation. Today’s customers expect more than basic personalization — they demand relevance, empathy and immediate access to information that speaks directly to them at the...
In an era defined by digital acceleration, remote work and ubiquitous cloud services, cybersecurity threats have evolved from isolated IT incidents to strategic business risks. Cybercriminals have gro