Uncategorized

Pursuing Great Customer Service

My son recently celebrated his 21st birthday. He is going to school 7 hours away, but since I remember it being an important milestone for me, my wife and I wanted to make it a particularly special day for him. … Read More

Featured Post

Proper Training Feeds User Adoption

Like most 15 year-old boys I had a death wish. OK, I didn’t really have a death wish, but judging by the risks I regularly took it certainly looked like I did. One particular day three of us decided we were … Read More

Featured Post

5 Ways to Ensure User Adoption

5 Ways to Ensure User Adoption For a number of years, it’s been my counterintuitive contention that folks over the age of 50 are actually MORE flexible than their millennial counterparts. Since the AARP generation has had more experience with … Read More

Featured Post

Replacing Legacy Software

Replacing Legacy Software I own a 1996 Chevy Suburban with 241,000 miles on it. It’s old, quirky, rusty, and the air conditioning doesn’t work. All the knobs on the radio console have broken, and we managed to lose one of … Read More

Featured Post

Music, Art and Content Management

I am a musician.  The son of musicians.  The father of musicians.  I’ve spent my whole life immersed in music and art.  Few things in my life will provoke a visceral reaction more quickly than a moving piece of art.  I … Read More

Featured Post

How to choose the best secure document distribution software

Mail and email simply aren’t the best ways to share documents with others anymore. This is especially true of software-generated documents and documents that your company receives from third parties. Examples of reports you might be distributing include the following: … Read More

Featured Post

Improving document distribution: How to track important reports

“I hate her new haircut.” “Why does he talk so much?” “Is that a pimple, mole, or tattoo?” Can you imagine what it would be like if everyone you met could see or hear every thought that crossed your mind? … Read More

Featured Post

33 great ETL tools: Data integration at its best

Extract, transform, load (ETL) becomes data integration In a landscape dominated by data, it can be hard for businesses to keep up. Right now, your business is receiving data from many different platforms. These platforms may include the following: Databases … Read More

Featured Post

When and how to secure personally identifiable information (PII)

Depending on the conversation, you may get very different definitions of what personally identifiable information (PII) is. Generally, people agree that it’s information hackers could use to perform any number of crimes against a person. Most frequently, the specific crimes … Read More

Featured Post

2 methods to safely de-identify protected health information (PHI)

HIPAA doesn’t restrict sharing of de-identified PHI It’s been 20 years since congress enacted the Health Insurance Portability and Accountability Act (HIPAA), and handling protected health information (PHI) is only becoming more complex with advancing technology. The Privacy Rule outlines … Read More

Featured Post

5 steps to create effective, successful knowledge transfer materials

There’s a lot of turnover in the workforce right now Over one-third of the workforce will reach retirement age in under 15 years—when the last baby boomer turns 65. Meanwhile, overall participation in the labor force by 16- to 64-year-olds … Read More

Featured Post

Is manual entry or automatic data extraction more reliable?

All growing companies come to a point when their manual entry processes just can’t keep up. With data increasing at unprecedented rates, security measures are often too difficult to enforce. It’s a very common problem, and recently, we worked with a company who needed to … Read More

Featured Post