Blog

Pros and cons of a SharePoint intranet

We’ve put together all the SharePoint intranet advantages and drawbacks so that you can decide if it suits your business needs, collaboration patterns and budgeting strategy.

Connected supply chain: top questions answered

IoT-driven supply chain management solutions help to mitigate supply chain uncertainty and allow improved monitoring of the locations, statuses and conditions of raw materials, work in progress, and finished goods. In the article, we answer the questions supply chain managers may be concerned about starting a connected supply chain initiative.

Internet Safety 101 - How to keep your employees safe and protected online

Maintaining safety and privacy practices to protect your company’s employees is quite a challenge. Read about the key measures that need to be implemented to ensure the online protection of your staff.

The missing element of perfect supply: where eprocurement takes us

Why more and more companies get enthusiastic about entering eprocurement? Find out the gains of a procurement portal sliced and diced.

7 best practices for database security

Protecting your systems from various types of vulnerabilities and threats even before getting hacked is the wisest thing one could do. It is better to prevent the data loss in the first place than trying to recover the lost data later on.

Security flaws discovered in OpenEMR healthcare software

Research revealed several instances of unauthorized information disclosure within OpenEMR. One showed unauthenticated users' details, including the database name and the current version of OpenEMR an organization used.

How to implement CRM at lightning speed

We provide best practices to make CRM implementation speedy, efficient and within the budget.

Sales Automation: Why, What, How

Knowing WHY you need sales force automation, WHAT exactly to automate and HOW to benefit from this process are 3 keys for your sales effectiveness.

A comprehensive guide to corporate network vulnerability assessment

Learn why vulnerability assessment should be conducted regularly, what its steps are and how it helps to secure the corporate network.

RFID and IoT in a smart hospital: benefits and challenges of smart patient tracking

We explore patient tracking with RFID and IoT from various sides to see whether this innovation is likely to pay off.