[Webinar] Improving Service Quality & Compliance in Homecare Via AI: What Works And What Doesn’t

Header image
a person with a laptop and documents popping out

Intelligent Document Processing: New Trends in 2026

Learn about the trends that would drive the Intelligent Document Processing industry in 2026 and make sure you’re choosing the right tool for your needs

Read More
invoice without a watermark turning into an PDF invoice with added watermark

How add watermark to PDF automatically

A simple tutorial on automatically add watermark to PDF using Google Docs. Great for invoice processing, sales quotes generation and more. Table of Contents Creating an automated system for adding watermarks to PDF documents can significantly streamline various organizational processes, such as finance, legal, and sales operations. In this blog post, we’ll explore a specific …

Read More
data security manager with a laptop creating password

Case Study: Emerson College Strengthens Data Security with Zenphi

, ,

The Challenge: Lack of auditing capabilities, tedious tasks of manual identification and notification of users having access to files created by another user who’s been suspended; native GAM capabilities didn’t allow to solve the problem. The Outcome: Improved security posture, enhanced IT Department efficiency (40 to 50 hours per workflow saved by reducing manual workload, …

Read More
descriptive

Automate upload to Google Drive: set emails attachments upload on auto-pilot

Discover how to optimize your workflow by automating the process of saving and uploading attachments from your incoming Gmail emails on Google Drive for further use. Table of Contents One of the most common tasks for anyone in IT, Marketing, HR or Legal Department is going through attachments they receive through their email and saving …

Read More
a magnifying glass and wooden blocks with human-like images on them

How to use AI In HR Recruitment

A simple tutorial on how to harness an AI-driven candidate sourcing. A great  use case of AI technology in recruiting that you can implement today in 6 easy steps Table of Contents No one would argue that finding the right talent for a business is critical. However, if you’re a fast-growing company or have a …

Read More
laptop with the word cyber security, a business person having a cup of coffee

Case Study: Cybersecurity and SMEs. Evaluating The Risks

Learn if SMEs are vulnerable to cyberattacks, what are the most common reasons for the successful attacks, and how likely are you to face a ransom. In a recent webinar hosted by Zenphi, the #1 tool for Google admins, Andy Sommer, a renown expert in cybersecurity and the founder of The Sommer Agency, shed light …

Read More