Search
XML Web services brought a breeze of fresh air in the way B2B interactions happen in today’s digital world. Logistics, transportation, invoicing and other retail sectors were revolutionized, since real-time updates for everything were now possible.
Taking into account the budget, resource, and staffing pressures organisations are facing today, IT service providers and IT departments have had to figure out how to do a whole lot more with a whole lot less. IT service management (ITSM) has been used over the years to enable IT organisations to answer such a demand. By shifting from a technology delivery approach to a process approach for providing customer service, it has created efficiencies and introduced structure.
At TRASYS, we treat our customers like kings. With one exception. If we see that the business case for an IT project is missing or of poor quality, then we try to start a minor palace revolution.
Security is a peculiar thing. There never seems to be any problem with it. You hardly ever hear of big companies being hacked or of specific cases of industrial espionage through spearfishing, of organisations losing confidential data or of consumer services being halted by malware. The same thing happens if you ask your own IT team how things are going. Everything is always under complete control, judging by the smiles on their faces. But how can you be sure?
Every organisation that develops software wants to minimise the work needed to build new IT systems. But no matter how effective a development process may be, a real reduction in the work will only be achieved if one stops reinventing the wheel and starts reusing software.
The amount of content residing in your company is growing exponentially every year. Implementing a software tool is not enough, you also need to define proper rules and procedures on how to use the system.
Using any phone, we can call any other phone – regardless the company that produced the phone, regardless calling a landline from a mobile. Or vice versa. This is interoperability.
Email marketing is a great vehicle for addressing consumers. It works best when the database and tool for email campaigns are not the end, but only the beginning of the project.
Barriers to field force management optimization are strong. Besides the common resistance to a change of staff, there may be limited budget, resistance from the IT department and the complexity of an integration with legacy systems. Here are five more situations that can go wrong.
Cloud and cloud security are buzzwords that probably have had the longest lifespan ever. Lots of companies are talking about it, thinking of going for it and wondering about its data security. Still, not that many companies have actually taken the step of adopting it.






