IBM Cloud Transforms Business Operations in the State of Vermont

IBM Cloud Transforms Business Operations in the State of Vermont

IBM cloud services and Silanis’ electronic signature technology are transforming business operations for the State of Vermont.

Cloud computing has transformed business operations to improve efficiencies, boost profits and allowed the State to more cost effectively collaborate with vendors.  IBM notes that the State of Vermont aimed to reduce costs and paper consumption and boost efficiency in its Department of Information and Innovation (DII).

Our department signs as many as 80 vendor contracts a month. A Cloud-based business process using Silanis and IBM technology helped us keep up with Vermont’s commitment to the environment and our plans to adopt productivity-enhancing technologies,” said Kris Rowley, DII’s chief information security officer. “Hand-signing also meant many of our people were spending valuable time chasing down multiple signatures or correcting errors.”

Silanis Technology provides electronic signature software to government organizations and agencies. For this project, Silanis’ subscription-based, secure online e-signing service, e-SignLive has also been integrated with IBM’s LotusLive cloud-based collaboration service. This integration allows Vermont’s DII to gather, approve and process signatures and contracts in an efficient, environmentally friendly, paperless manner.

Looking forward, this organization intends to use additional IBM cloud collaboration capabilities to further improve its efficiencies. IBM has included in its LotusLive’s cloud collaboration service a range of tools including project tracking, Web meetings and instant messaging.

All these tools accomplish several goals such as promoting team work, quickly find expertise needed to get projects done, and create effective partnerships.

“This initiative is our way of taking a positive approach to the downturn in the economy,” said Rowley, DII’s chief information security officer. “It’s a challenge that has led us to seek out ground-breaking technologies like the combination of e-SignLive and LotusLive, which is improving the way we do business while costing us less.”

By Anuradha Shukla

Sorry, comments are closed for this post.

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…