High Tech Articles - Perficient Blogs
Blog

High Tech

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Cloud Procurement Approval Management

Cloud Procurement offers a new interface defining approval workflow for Requisitions, Purchase Documents (Order, Blanket, Contract) and Supplier Management. Approval rules are managed in a user friendly interface that integrates back-end Business Process Management (BPM) while keeping a logical and complete setup in front of the user. While relatively simple to define rules in Approval […]

Read more

Install, Configure, Deploy FileNet P8 using Ansible

Here is something I’m working on at Perficient to make installing/upgrading, configuring, and deploying IBM FileNet P8 more efficient. It even creates a Domain, and Object Store. All using Ansible. If your organization is looking to implement something like this in your environment, give Perficient a call. We’ll be happy to assist.    For […]

Read more

Machine Learning Models Have People Skills

I like seeing patterns across domains. Consider machine learning models and employees. Both models and people can be appraised. What is an employee appraisal? Employee “performance appraisal has three basic functions: (1) to provide adequate feedback to each person on his or her performance; (2) to serve as a basis for modifying or changing behavior […]

Read more

Adding Additional Content Platform Engines to an Existing P8 Domain

There are many ways to implement FileNet P8 in an environment. Small organizations might have a simple implementation consisting of the Content Platform Engine (CPE), and Content Navigator. Large organizations may have multiple CPEs in a single cluster performing many different functions. Some of those functions are basic, such as end-users simply uploading or retrieving […]

Read more

Executives and Cloud – Perfect Alignment

In today’s “digital everything” world with all the confusing jargon around the subject of “cloud”, it is easy to miss the point of why cloud technology is important. In this blog, I hope to remind the reader about some cloud basics. The reference to cloud in this blog is a more broadly defined definition of […]

Read more

Kali Project Encryption and Isolation Using Vagrant and BitLocker

Imagine that you work on different engagements or projects in which Kali Linux is one of your primary tools.  Furthermore, maybe you also have the need to keep the data for each of those projects isolated from the others – in other words, you need to avoid cross-contamination between your projects.  In this article I […]

Read more

Oracle Cloud PPM Rapid Install – “Why Bother?”

Introduction In this installment, I will discuss a few key takeaways of the PPM Rapid Install sheet. The PPM Rapid Installation is very helpful in getting an environment up very quickly. It also provides a structure in capturing configuration data. Depending on which features are suited, and selected, for your company, the sheet will enable […]

Read more

Creating a Data Flow Diagram

A data flow diagram (DFD) documents the path data takes throughout your process/system. It is important to document and keep accurate and updated. Part of the value of such a diagram is that it shows where data is crossing a trust boundary. For example, user input (low trust) from a web site crosses a boundary […]

Read more

Invoice formats- Oracle Projects Considerations Part 7

What is a Project Billing Invoice Format? The Oracle projects billing invoice formats determine how invoice lines can be displayed on invoices. Implementers define the width of columns and different data types to appear. Invoice formats also allow free-form text. These details are used in Receivables for invoice accounting and presentment to the customer. Are […]

Read more

Project Statuses-Oracle Projects Considerations Part 8

What Are Project Statuses? Statuses can control the “life-cycles” of projects, project resource requirements, and people. New statuses can be created for the above objects. Out of the Box Project Statuses Project Statuses include predefined statuses for the following objects: Projects – a project’s current state, for example Open, Closed, or Approved Requirements – The […]

Read more

Should Auto Dealers Use Chatbots On Their Websites?

The growth of chatbots in the auto industry is undeniable. They have flooded the industry and are being used in multiple ways. Some of the uses are positive and others are negative. One of the negative, and most controversial, ways these chatbots are being used is occurring at the dealership level. Almost every dealer has […]

Read more

Office 365 Tenant to Tenant Migration Overview

Office 365 has become one of the top hosting platforms for SaaS for companies of all sizes.  The traditional Microsoft Office Product Suite has been the go-to desktop productivity set for many decades and as Microsoft has adjusted their (often confusing) bundled Office 365 licensing packages and pricing models, it is becoming increasingly attractive for […]

Read more

Using Chef Habitat to Migrate Legacy Windows Applications

Overview In this bog post we will discuss Using Chef Habitat to Migrate Legacy Windows Applications to a Modern Secure Platform. With support ending for Windows Server 2008 and Microsoft SQL Server 2008, legacy Windows applications will need to be migrated to newer secure and supportable modern platforms. For instance, Windows Server 2016 and 2019 […]

Read more

DevSecOps in the Cloud – Policy and Practice

Cloud computing is now ubiquitous throughout the software development industry.  There are many cloud service providers offering everything from ‘bare-metal’ virtual servers to complete server-less computing platforms.  The speed by which computing resources can be reserved and instantiated is a major contributing factor to the success of DevOps, where repeatability and automation is central.  However, […]

Read more

Intelligent Security Graph

(Microsoft Intelligent Security Solutions, Part 3) Advanced AI analytics mining a centralized data-lake of unique threat indicators with real-time telemetry. Here, Part 3 of my blog series covers Microsoft Intelligent Security Graph and how it uses advanced analytics to break the silos of security data points spread across most organizations, combining them into a cohesive […]

Read more

Here’s Why You Should be Using a Password Manager

I do not mean a notebook with handwritten passwords or even a spreadsheet.  I mean software designed specifically to generate and safely store your passwords.  We have all heard about sticky notes under the keyboard, or even worse on the monitor.  The current browsers can store your passwords for you and, assuming you have an […]

Read more

Microsoft Defender ATP

(Microsoft Intelligent Security Solutions, Part 2) Data Breach and Endpoint Protection This blog on Microsoft Defender ATP is Part 2 of my 3-part series covering Microsoft Intelligent Security Solutions. Part 1 covers the Microsoft Secure Score service, explaining the world’s current cybersecurity environment and how Microsoft Secure Score helps organizations to identify their Office 365 […]

Read more

Things to Consider with Lift-and-Shift Migrations in Cloud

This is the next installment in a series of blogs on the subject of cloud transformation. We decided to call out this specific cloud lift-and-shift migration strategy because of our clients’ experience with this strategy. Many of our clients have seen both negative and positive results from this strategy, however, all of them missed many […]

Read more

Potential Impacts Beyond Cloud Applications & Infrastructure

This is the next installment in a series of blogs on the subject of Cloud Transformation. When an organization transitions to cloud technology, it will often change the way that organization thinks about IT solutions. Cloud technology allows an organization to operate in more of an experimental/disposable way. This freedom allows an organization to “try […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up