top of page

Sample Papers Archive 01

It's not always malware 
The threats to data are increasing, yet it is not always about malware attacks.
 
The security of enterprise storage - A call to action for CISOs
Cyber criminals can infiltrate an enterprise infrastructure and stay there, undetected, for months at a time. When a data infrastructure does not have the right level of cyber storage resilience, intruders can take advantage of the value of data by accessing critical enterprise storage resources and unleashing ransomware and malware, among other types of cyberattacks.
Three key cyber resilience messages that channel partners need CISO clients to understand
As the digital economy grows, digital crime grows with it. All industries face greater exposure to cyberthreats due to increasing digitization, yet research shows that companies continue to lack the readiness to respond to ransomware attacks.
Does IT infrastructure really matter?
No one would dispute that Information technology has become the backbone of commerce. As IT’s power and presence have expanded, companies have come to view it as a resource ever more critical to their success.
Can IoT adopters manage the security and privacy challenges in smart utilities?
The utility sector is undergoing a huge transformation, becoming highly connected infrastructures, with millions of endpoints, including smart meters and smart grid devices.
Business productivity gains
Digital transformation efforts are driving enterprises to refresh and modernize their server, storage, and/or data protection infrastructure, and many are turning to storage systems equipped with solid-state storage to deliver the performance they need.
Driving IT productivity staff gains
Improving storage performance and storage team productivity is paving the way for better agility, but with a huge skills shortage in IT compounded by budgets beingcut, IT management are being required to do more with less.
 
GDPR - The benchmark for a global privacy network
The introduction of the General Data Protection Regulation (GDPR) set the precedent for privacy and data laws around the world with 71% of countries now having data protection regulations in place and a further 9% with legislation in development.
 
Taking cyber storage resilience to the next level
In February 2022, Infinidat announced InfiniSafe®, its comprehensive cyber resilience1 architecture, which covers both primary and secondary storage, providing four pillars of protection.
Economic uncertainty in an uncertain economic world
Business and information technology leaders across the globe continue to seek to transform their organizations digitally. 
 
Cost reductions and the impact on IT infrastructure
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets.
How to improve the bottom line with mandated spending
In the face of continuing economic uncertainty and a recession threat, every company is hyper-focused on cost management and financial performance. 
Ego gains workflow edge with Esker
Ego Pharmaceuticals reduces invoice processing time with Esker's Accounts Payable solution to improving supplier and employee experience. 
Infinidat ranked among Power 500 Software Companies
Software is a fundamental value proposition of Infinidat’s portfolio.
The business value of Infinidat storage
A recent IDC White Paper, sponsored by Infinidat, "The Business Value of Infinidat Storage" has found that the payback for an enterprise’s purchase of an Infinidat InfiniBox® hybrid solution is within 11 months, showing a rapid return on investment (ROI) on enterprise, cyber resilient storage for data infrastructure.
FirstNet chooses Infinibox
As one of South Africa's leading cloud, connectivity, voice and security solutions provider, FirstNet turns to InfiniBox®, the powerful enterprise storage solution from Infinidat to help it deliver high performance, highly reliable storage with Capacity on Demand (COD) for all FirstNet customers.
 
Cyllene chooses Infinibox
Driven by a need to implement high end storage arrays for cloud, security, infrastructure, digital, data, management and web marketing, Cyllene needed an IT partner, but with no dedicated staff available to handle the administration of its storage network, Cyllene turned to InfiniBox®, the powerful enterprise storage solution from Infinidat.
The hot trend - security and enterprise storage together
Cybersecurity and cyber storage resilience are usually treated separately in the enterprise. This exposes a huge gap in creating a comprehensive enterprise cybersecurity strategy.
Flexible consumption - Why consumption led pricing is accelerating for enterprises
Forward thinking organizations across the UK are looking for practical ways to reign in their spending and mitigate the business impacts. One good option is to consider a switch to consumption-led pricing models for on-premises storage infrastructure, says the author of this article.
Set it and forget it
The IT skills gaps pose a ‘high or medium risk to their team’s ability to meet key objectives’ cites 80% of 80% of IT leaders according to the Skillsoft 2022 IT Skills & Salary. Where the requisite skills are available, workers are commanding premium rates and salary inflation is running at an all-time high.
 
Esker improves CX at Fujifilm
As a leading provider in offering smarter ways to work with document-related solutions and services, solutions and services, Fujifim Business Innovation Corporation has now transformed its operations using Esker's accounts receivable solutions.
A new home for SMEs
SME operations changed for good due to the COVID-19 pandemic, and as the modern office and workspace carries forward some elements of the hybrid working model that grew so popular during the height of the pandemic there are some fantastic real estate opportunities out there, explains the author of this article.
 
Overcoming  cybersecurity barriers
In this article, the author explores these issues and looks at how confusion around the meaning and potential of“automation”, “orchestration” and “XDR” may be a barrier to implementation.
 
IOT ambitions are maturing
We published our first ‘state of the nation’ Internet of Things (IoT) report in 2017. Last year, we revisited this study, surveying 300 UK and US IT decision makers within organizations across a range of industries, including utilities, energy, telecoms, construction and government, to see whether (and how) attitudes and adoption patterns have changed.
Technical teamwork equals business achievement
A myriad of unprecedented factors continues to impact businesses of all sizes and industries and these factors are fostering stress financially, organizationally, and operationally to levels which many IT infrastructure leaders have never seen.
Secure savings by focusing on indirect spend
How rationalizing indirect spend is an area that, provided you have the right tools, is a perfect area for cost optimization.
Cyber Insurance and ITDR: a perfect match?
In a world where cyber threats are varied (and constantly changing), cyber insurance can protect organizations from losses due to security incidents.
 
Enterprise storage trends
Looking ahead, 2023 will be a very exciting year for enterprise storage. In this article, the author looks at five emerging trends.
New era for cyber recovery
The rise of vendor guarantee programs is increasing, but if customers are going to use them to help make an enterprise storage purchase decision, it is important to really understand which program facets offer differentiating value.
Why digital forensics and incident response must go remote
To detect if a user has been stealing intellectual property, it’s no longer a case of physically borrowing that laptop.
 
NVMe Storage Evolution
Non-volatile Memory Express (NVMe), the new storage access and transport protocol for flash and next-generation solid-state drives (SSDs) is delivering the highest throughput and fastest response times yet for all types of enterprise workloads.
 
Is there a special place for cybersecurity marketing?
With the industry constantly pushing the message ‘Your business – safe at the speed of light’, many businesses are feeling overwhelmed.
What CIOs should know about zero trust
Zero trust is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication – not assumed trust.
 
IT issues that need cleaning up
If you are at a supermarket, the “dirty dozen” is a list of foods that are considered the most tainted. Similarly, if you are working in an enterprise or for a service provider, the dirty dozen is a list of issues that tarnish IT infrastructure, “contaminating” current enterprise-grade implementations and exposing the dangers and risks associated with them
Cloud Control: Maintaining compliance as regulated apps move off premise
The general trend toward cloud-based IT and cloud-hosted applications use shows no signs of abating, and the life sciences industry – albeit behind the curve – has been making its own steady progress in moving its systems off premise.
Help me Obi Wan, InfiniBox is our only hope
The storage admin is no longer solely focused on storage, nor do they require PhD levels of storage expertise to do their jobs. Storage systems have evolved; new storage architectures have emerged, which fundamentally changed the storage landscape
 
Enterprises must have better cyber resilience
How do you stop Cybercrime is the multi-billion dollar question. Every aspect of our IT infrastructures are part of it. The cyber “attack plane” is enormous, it is not just securing our network connections, but also extends to the people at their desks or at the edges of the company networks who can willingly or not, be the source of IT turmoil.
Where digitalization goes wrong?
Digital transformation has been high on the agenda for most companies over the past few years – but there’s often too much inaction. This is preparing for failure, and that will come sooner than many might think.
 
Graph technology puts data at the heart of Government decision making
The ability to use data is becoming essential to governing well. With digital technologies having transformed our economy, society and daily lives, the challenge for governments is to make use of new sources of data and the emergence of new data science technologies to solve problems and make decisions.
 
Creating cyber-resilient technology
The threat of cyberattacks has become such a huge issue facing the largest global enterprises that 66% of Fortune 500 CEOs named it the Number One threat to businesses in the May 2021 survey of Fortune 500 CEOs.
Driving innovation in transport systems
Just as employees are being rallied by the Government to return to the workplaces and adapt to the new ‘norm’ of living with the Covid Omicron virus, it is feared that safety concerns around social distancing could push commuters away from trains despite the green agenda.
Data protection at scale (2)
Data protection is one of the most important safeguards that a company can have today.
Five pointers for choosing a threat intelligence platform
As 2022 gets under way and the new financial year looms, many companies are starting to identify the key strategic focus areas for the year ahead and the technology investments needed to deliver them.
What are the benefits of 5g?
As data and mobility become more critical to business operations, IT teams across the globe are getting ready to embrace the next-gen network. In this article the author discusses the benefits that fifth generation wireless technology (5G) can bring to businesses.
Knowledge graphs push the boundaries of data science
Knowledge Graphs are a big trend in the advanced data science world, but they aren’t as widely known as they could be.
Data protection at scale (1)
Data protection has many meanings. It ranges from the data availability on primary storage, to the long-term preservation and retention of data for multiple business purposes.
Perfecting revenue recognition
Despite the ASC 606 and IFRS 15 standards deadlines of 2017 and 2018 respectively, many public and privately held companies are still not compliant.
 
Remote working and taxes
Businesses around the world are seeing the substantial benefits of remote working post-Covid 19. 
 
Open banking - are you ready to become a banking ecosystem?
Open banking is enabling new ways for people to manage their money.
Behavioral Biometrics and customer identity authentication
With synthetic identity fraud on the rise, behavioural biometrics enable banks to balance customer experience and fraud prevention.
Data storage consolidation
For many years, IT teams have struggled to manage several different data storage systems. Bringing together a range of silo systems into a frictionless ecosystem is often surrounded in complexity, whilst spiralling costs as vendors try to collaborate is frustrating.
YourDMS transforms FJ Chalke
With showrooms throughout Somerset, FJ Chalke continues to grow, but like most businesses that experience rapid growth, the challenges of managing increased amounts of paperwork become a much larger task.  With help from YourDMS (www.yourdms.net), FJ Chalke are transforming its operations.
With great power comes great responsibility (and cooling)
Data centres account for 1% of the world's total electricity usage each year, and by 2030 this is set to rise to around 3-13% with much of the power going into cooling servers and systems according to research conducted by Huawei Technologies.
On campus, colocation, or the cloud?
Higher education and research organizations faced with challenges for urgent digitization of their applications and data platforms, are now moving their IT infrastructure off-campus and into a purpose build data centre to ensure that their IT works harder for less.
How to launch a thriving B2B marketplace
As a marketplace entrepreneur, you want to build your marketplace with the best possible chance of success by putting a robust strategy in place and look at how others have used these platforms to their competitive advantage.
 
The pervasiveness of data and data-centric security strategy
In this last year, we have seen an exponential growth in not just the amount of digital data, but also its vulnerability. 
 
US data privacy at a glance​
Data privacy protection is both a fundamental right and an economic need, as data breaches grow in impact and frequency. 
 
A pandemic of cyber attacks
With 2020 dominated by the start of the COVID-19 pandemic, there was also a sharp rise in cybercriminal activity. From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyber threat landscape evolve and grow.
 
Infinibox SSA - delivering confidence
For as long as there has been competition among IT vendors, IT vendors have bragged about the performance of their products. Too often vendors toss around the word performance as if it were some simple, one-dimensional thing.
Cloud misconfigurations - a greater threat than one might think
New research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud based services.
 
The hidden glass ceiling of AI
In a world driven by connections, graph algorithms provide one of the most potent approaches to analyzing connected data because they are specifically built to operate on relationships.
Rethinking digital processes
As CEOs look to transform their enterprises and drive new business models forward to thrive in the digital economy, addressing business process management issues has never been more critical.
Deep learning myths, lies and videotape (2: Balderdash!)
While there are no enterprise storage systems other than InfiniBox that claim to use DL (and none do), there are many that claim to use AI/ML.
 
Deep learning myths, lies and videotape (1: Verities!)
When it comes to marketing storage products, IT vendors often misuse the terms Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL).
 
Managing emotions with AI
Spotify Web Player has recently patented a voice recognition technology that is capable of tailoring bespoke music recommendations to our emotions and environment.  With the help of Artificial Intelligence, could this new music technology become another powerful tool for advertisers and tech giants to target us more effectively?  Asks Tom Andrews at Rightly.
 
Credential phishing attacks
In the last month, the Menlo Labs team has been observing a steady rise in credential phishing attacks. Credential phishing is a popular method of attack where attackers make use of fake login pages or forms to steal credentials of commonly used services in a corporate environment.
Lockdown 2.0 and the DDos threat
No matter how productive you think you have been while working remotely, cybercriminals worked just as hard to exploit every vulnerability that emerged from the pandemic.
 
GBS case study
Gerichte Basel-Stadt delivers critical performance benefits and reduces costs with Infinidat’s flexible enterprise storage model.
OFFSITE reduces costs
OFFSITE reduces costs of delivering enterprise IT services to its clients with Infinidat's elastic pricing and flexible storage model.
VDC overcomes growth challenges
Fast-growing managed hosting provider VDC drives business, cost savings and storage consolidation using Infinidat.
 
Why is Apple associated with high business productivity?
Staff productivity is one of the biggest impacts on business revenue. It is widely recognized that productive employees perform tasks more quickly and to a higher degree of quality. This frees up more time for additional tasks, making a company’s output greater.
Rethinking the storage infrastructure
With digital transformation under way at most enterprises, IT management is pondering how to optimize storage infrastructure to best support the new big data analytics focus.
Enterprise platform or point solution? - separating the hype from the reality
In 2021, the word ‘platform’ is going to be bandied about more and more often as all kinds of software vendors attempt to reposition their software in order to seem more foundational, comprehensive and cost-efficient.
What are ABM, MDM and DEP?
There is a new range of acronyms in town – DEP, MDM and ABM. But what do they mean and why do they matter?
 
The new normal is Work from Anywhere
The workplace of the future is likely to be very different to the one we have all experienced in the past.
Case Study - YourDMS streamlines Pets Corner
A combination of Abbyy Flexicapture – for data extraction – and Invu Document Management and Workflow – for easy storage, retrieval and management of information, sees YourDMS streamline processes at Pet Corner.
Next generation data analytics insights with graph technology

The pace of data science adoption by business is accelerating. Increasingly, organizations are applying graph-powered analytics to connected data to discover insights and power innovation.

 
Case Study - Pulsant meets customer demand with Infinidat

Identifying and deploying innovative, robust, technology is critical to the continued success of the Pulsant business. The company invests heavily in software, infrastructure and skills in order to remain agile and boost its competitive edge.

 
How a hybrid innovation platform can drive integration
Connecting and standardizing an organization’s data and business processes, across its entire application landscape, places a significant strain on traditional technologies, methods, and abilities. 
Preparing your DR for 2021
Technology disasters can happen at any time. An IT disaster can be any unexpected problem that results in a slowdown, interruption or failure in a key system or network.
 
The implementation of MITRE
Since the emergence of the first real malware about 25 years ago, it became clear that criminals lurk in the expanses of the World Wide Web. Nevertheless, it is no use giving up and surrendering to your fate.
 
How effective is threat  hunting for organisations?

Threat hunting is the art of finding the unknown in your environment, going beyond traditional detection technologies with active cyber defence activity.

 
The integration imperative for XDR
Large security vendors with Extended Detection and Response (XDR) offerings position their solution as integrating their own set of products.
Free migrations break the stalemate between inertia and modernisation
Data migrations are a lot like a toothache. You can delay going to the dentist for a while, but eventually, you are going. The desire to postpone data migrations is understandable.
Data Centres and green foundations
The data centre industry continues to grow rapidly as more of our lives become digitally led.
 
E-KYC in the era of digital crime
Even before COVID-19, the risks of online fraud were being highlighted by industry professionals. Earlier this year Cifas, the UK’s fraud prevention service, reported that in 2019 over 364,000 cases were recorded to its database – the highest ever recorded.
 
Why CEOs are shifting to business-driven WAN
Every enterprise’s digital transformation journey is different, and as applications migrate to the cloud businesses both large and small are faced with opportunities and challenges.
 
Steps for responsible AI
A new report published by FICO and Corinium has found the demand for AI, data, and digital tools has soared in the wake of the COVID-19 pandemic.
SD-WAN: as simple or complex as needed

More cost-effective and flexible than legacy router-centric multiprotocol label switching (MPLS) WANs, software-defined wide-area network (SD-WAN) offers superior responsiveness, enhanced application performance, more robust security, and improved visibility that gives greater reliability and consistency to enable organizations to advance their cloud and digital transformation initiatives.

Implementing a seamless customer experience
As the rise in remote working continues and technology hands customers unprecedented power to dictate the rules in purchasing goods and services, the lines between products, services and customer experience blur.
 
Getting the most from High Performance Computing
High Performance Computing requires next generation cooling deployment and increased power per rack. Yet, many traditional data centres cannot provide this service.
Case Study - Streamlining AP with YourDMS
With over 300 employees Charlton Athletic football club were looking to achieve maximum efficiency within all areas of its business.  This case study explains how YourDMS helped the club streamline its accounts payable system.
Redesigning jobs in the IT sector

According to new research from international recruitment consultancy, Robert Half UK, one-in-three (29%) of employers are currently redesigning roles in direct response to the impact of the pandemic as they look to build more agile, adaptable workforces moving forward.

Staffing solutions in the IT sector

Over 70% of UK workers are currently reassessing their career options despite COVID-related job insecurity.

Digitalizing European energy trading

When the energy markets first opened-up in the early 1990’s, market participants completed weekly planning and scheduling, using rudimentary forecasting and analysis tools. But now times have changed.

 
The Modern Bank Heists report
VMware Carbon Black has just published the third edition of its Modern Bank Heists report, which takes an annual pulse of some of the financial industry’s top CISOs and security leaders.
 
Tech is helping us work from home
The rise of the coronavirus (COVID-19), is continuing to cause headaches for businesses and brands all over the world. 
APIs for Fintechs
Banks can adopt several strategies when working with fintechs. Those most commonly discussed range from programmes to instill an entrepreneurial agile culture within banks, building and engaging extensively with developer communities, and building internal developer capacity.
CIAM for customers with varying levels of experience

Customer identity and access management (CIAM) often gets confused with IAM solutions, however, CIAM solutions are still solving identity access related issues, whereas IAM typically deals with authentication and access within an organization.

 
How APIs can transform business

As business continues to operate far from its norms, companies are having to get creative in thinking up new ways to operate in a day-to-day world where mobility has been strictly reduced.

 
Why myopic vision can blindside a business

Responding to changing market conditions as markets rebuild in the aftermath of COVID-19 continues to challenge both IT and business leaders. For IT leaders the need to actively minimize risk when making IT investments continues, whilst for business leaders, financial uncertainty is often cited as the top concern.

 
Case Study - Solar Insurance Services

The whole process of storing our indexed documents straight into Invu is an integral part of what we do - it’s part of the daily routine," says Solar Insurance.

The benefits of continuous testing
Defined as a software testing methodology, continuous testing involves a process of testing early, often and everywhere, and needs to be on the agenda for every organization.
Building long-term business relationships through BI
In a rapidly evolving retail landscape, businesses are generating data at an alarming pace but it often exists in silos across the business making it difficult to gain an accurate, real-time overview of how the organization is performing.
Builders of digital infrastructure
The continued growth of the global data centre market is being driven by an explosion of cloud and internet services.
Digital currencies

Cryptocurrencies have been in existence for quite some time, the concept being introduced by computer engineer Wei Dai that led to him publishing a paper in 1998 where is discussed “B-money” and the idea of a digital currency which could be sent along a group of untraceable digital pseudonyms.

Expert witness and data breaches

With personal data being easily purchased from the dark web, many criminals are undertaking this data to commit identity theft. In this article the author discusses how the impact of stolen data can become a legal issue in terms of class action lawsuits.

DDos attacks
Nearly every organization is dependent on some form of technology and connectivity, and in a time of crisis, the term ‘IT resilience’ is directly intertwined with the resilience of the business.
 
Powering remote working
The technology industry has been the enabler of remote working in some way, shape, or form for some time, whether it is required due to personal appointments, childcare or work life balance.
Covid-19 and the move to the cloud
Until recently organizations have historically looked at only new application development and deployment for cloud, taking a ‘cloud first’ approach.
Getting the right IaaS provider
Businesses are now at the stage where their cloud strategy and choice of cloud computing models is vital to their long-term sustainability and profitability.
 
Defeating business disruption 
Nearly every organization is dependent on some form of technology and connectivity, and in a time of crisis, the term ‘IT resilience’ is directly intertwined with the resilience of the business.
Securing data centre management skills

As data becomes the most valuable asset to businesses and digital transformation thunders on, the role of the CIO has become increasingly business critical.

 
Why your SD-WAN development is failing

There is an uncomfortable networking truth that is widely known but seldom acknowledged: implementing software-defined (SD-WAN) is difficult.

 
Apps Get the AI Treatment 

Wherever you look there are new takes on how AI is going to impact business and it can be hard to take on board some of the predictions that are being made.

Monitizing APIs

Application program interfaces or API’s are becoming increasingly popular among businesses.  They are especially useful to application developers who want to generate revenue.  The simplest term to describe “API monetization’s” would be charging for the use of API’s.

 
Moving applications to the cloud

Often the first step for organizations on the path to cloud adoption is Disaster Recovery-as-a-Service.

 
Case Study - Mitchell Edwards

By implementing the Invu Document Management System from YourDMS, accountants Mitchell Edwards now have speedy access to all documents giving greater productivity and enhancing client experience.

 
2020- the year we put more trust in AI 

Business and governments are turning to artificial intelligence (AI) for a variety of reasons including satisfying our desire for faster more personalized services – but how do we build trust in (and into) these systems?

 
Desktop as a service vs DaaS

Whilst Desktop as a Service is a cloud computing solution hosted by a third party provider, Device as a Service is has fast become the new model for procuring and managing in business.

Case Study - Mitchell Edwards

By implementing the Invu Document Management System from YourDMS, accountants Mitchell Edwards now have speedy access to all documents giving greater productivity and enhancing client experience.

Device as a service

Device as a Service is fast becoming the new model for procuring and managing IT in businesses.

Uncovering links to fraud

Money laundering is on the rise. The faster you can pinpoint questionable behaviours, the faster you can tackle the issue.

 
IOT and 5G

The Internet of Things (IoT) is growing exponentially with some forecasts estimating total number of IoT devices by 2025 to be north of 25 billion devices.

GTP and roaming

Mobile traffic using GPRS Tunnelling Protocol has exploded over the last couple of years, largely due to elimination of international roaming price barriers that previously discouraged subscribers from using the service.

Securing the cloud

Securing the cloud can feel a bit like eating an elephant – and how do you eat an elephant?  One bite at a time.

Information management challenges to modernization 

We are producing more and more data, which is resulting in an enormous data management headache not only because of the gargantuan volumes, but also the growing complexity and plethora of formats

The Rise and Rise of the Megacity

By 2025, the developing world will be home to 29 megacities as the prospect of better employment and a brighter future continues to lure people from rural outposts to urban centres.

Back to  basics for public sector

Whether or not you believe the old adage that government lags behind the private sector in terms of digital transformation, it must be acknowledged that squeezed public sector budgets make adopting digital technologies on a large scale difficult.

Hitting Your Contract Management Goal

Managing business contracts should be straightforward in today’s digital age, but many CFOs are still hobbled by cumbersome processes that can impact businesses.

Graph technology: AI’s missing link

Graph enhancements to Artificial Intelligence and Machine Learning are changing the landscape of intelligent applications.  Beyond improving accuracy and modeling speed, graph technologies make building AI solutions more accessible.

More ...

In-Memory Computing Summit Europe 2019

In-memory computing (IMC) can enable companies to deliver real-time, massively scalable applications for today’s digital transformation and omnichannel customer experience initiatives.

More ...

 

The Transformation Challenge of the Invoice Process Exception 

One of the biggest challenges facing business today is the management of invoice exceptions.

Apps Get the AI Treatment 

Wherever you look there are new takes on how AI is going to impact business.

More ...

 
Analysing the Struggles and Successes of DCIM 

Wherever you look there are new takes on how AI is going to impact business.

More ....

Facing 5G

5G-Ready transport networks continue to evolve into semi-unmapped territory.

More ...

How the digital world is reinventing client relationships

Digitisation is driving unprecedented change and it is changing the rules of client engagement. 

More ...

 
 
Sample papers archive 02  >>
bottom of page