Transforming the Way Work Is Done with Mobile Apps
Mobile devices are ubiquitous. Today, more people around the world have access to a mobile device than they do a toothbrush. People use their phones to pay bills, shop for…
Why You Should Stop Using Email to Manage Tasks
How much time are you actually wasting when using email? 30% of an employee’s day is spent reading internal emails 20% of knowledge workers call email their greatest time waster…
Project Management vs. Task Management
What is the difference between project management and task management? You have likely heard the term “project management” and the core components associated with it (i.e. time, scope, cost). Project…
Announcing Tasker Precognitive Edition – the Next-Gen in Task AI
1 APRIL 2022 – DTech Apps, the leader in secure apps for the ServiceNow platform, announced its next product release – Tasker Precognitive Edition. Featuring a revolutionary AI engine, Tasker…
Webinar Replay – How to Enable Robust Document Management for ServiceNow Applications
How much productivity are you losing every day due to employees having to constantly switch screens and jump from application to application just to get their work done? While there…
Tasker Tips and Tricks: Creating A Tasker Button in Microsoft Outlook
With the release of Tasker Version 2.7, setting up tasks in Tasker is as simple as sending an email—literally! Email was our #1 competitor, but we figured out a way…
Work Smarter, Not Harder
Americans have been working more hours than people in other industrialized countries for a long time. With the recent growth in remote work due to the COVID 19 pandemic, workdays…
Seeking Simplicity in the Modern, Mobile Workforce
In 1970, Alvin Toffler published Future Shock which discussed the “dizzying disorientation brought on by the premature arrival of the future”. Or in his words, “I coined the term future shock to describe the shattering…
Security Roundtable – Third in a Three-Part Series
Welcome to our third in a series of three articles on cybersecurity. In this article, we engage a panel of experts to discuss practical steps organizations can take to improve…
Security Roundtable – Second in a Three-Part Series
Welcome to our second in a series of Internet security articles. In this article, we discuss the impacts of cybercrime and Internet security best practices from the perspective of Dave Truitt,…