• More
Menu Search
OpenText Blogs
The CEO Blog

CEO Mark Barrenechea shares his insights and observations.

ProcessMatters (BPM)

Perspectives on issues that impact business process improvements at all levels.

InformationExchange (IX)

Efficiently sharing and managing vital high-volume data exchanges.

EngageU (CEM)

Fuel user adoption, increase productivity and transcend the online experience.

Industry Insights

Industry experts share the latest trends and review challenges and solutions for your industry.

INFORMation Governance (ECM)

Get insights into how to manage and protect your information.

OpenText Online

Your Gateway to Customer Service.

Recent OpenText Blog Posts
  • Fax to the rescue - again!

    Amy Campos

    Most of us can’t imagine a business day without email.  It’s the lifeline of most communication both inside and outside an organization.  But what happens when you can’t use your email?  That’s what Sony employees and executives are faced with right now, in light of the recent hack to their network and email system.  

    It seems that Sony employees have taken to picking up the phone, handwritten notes and, you guess it  -  fax, as a way to communicate with one another.  Old school, you say? ...

  • How B2B Integration Drives Superior Supply Chain Performance

    Mark Morley

    Today’s manufacturers face a constant challenge of balancing supply chain efficiency with the investment placed in their B2B integration platform. To try and get a better understanding of whether increased use of B2B solutions and services impacts the performance of a supply chain, OpenText sponsored a new B2B integration related study with IDC Manufacturing Insights. This blog will briefly summarise some of the key findings from the study.

    IDC conducted a one hour qualitative survey with 2...

  • It's Secure? Great, but can normal people use it?

    Scott Mitchell

    There was an article in a recent issue of MIT Technology Review about the difficulty of using cryptography software. Cryptography is about protecting and securing electronic information shared between a sender and recipients. But, as the author points out, “Nobody wants cryptography in and of itself. What they want is to communicate how, and with whom, they please, but safely.”

    The article discusses how today’s encryption software is “horrid” to use. Cryptographers tend to focus on how elabora...

Showing 1 - 3 item(s)
Go to First Page Go to Previous Page Page
of 280 Go to Next Page Go to Last Page

Search Blogs

x