PaperCut Blog

Getting to know … Thomas and Götz, Germany

Meet the all new German PaperCut team – Thomas Zirpel, Partner Alliance Manager – DACH, and Götz Weber, Channel Manager – DACH.

Learn a little about their plans for the DACH market, their goals for 2018, and their cow-riding exploits. Wait, what?

Is GDPR Y2K all over again?

Y2K brought mass chaos that gripped not just IT professionals, but business as a whole.

The pending implementation of the EU’s General Data Protection Regulation (GDPR) has driven a similar rush. What do you think? Is GDPR the new Y2K?

Understanding GDPR (in under 3 minutes)

GDPR begins 25 May 2018.

If, after reading that sentence, you find yourself wondering, “Hmm, what’s GDPR? Does GDPR affect me? Wait, what does GDPR even stand for?”, this guide is for you.

Here’s the lowdown, in under 3 minutes.

We need you to scan to cloud

We’re looking for the doers. The make-happeners. The folks who want to get involved in new tech ideas. Is that you?

Project Acacia is the latest piece of tech brewing in the PaperCut Percolator. We’re working on the next generation of scan to cloud technology.

But we can’t do it on our own.

New year, new version number and an awesome new release

The start of a new year is always an exciting time here at PaperCut. For starters, it means a new series of version numbers for our solutions. As it’s 2018, it means our version numbers will start with (wait for it), 18!

It also means there’ll be a huge new release. And it just so happens that PaperCut 18.0 is here right now! Ready to see what’s in it?

Document security isn’t just protecting against hackers

What would it mean to your workplace if your secrets were revealed? Not by a hacker, but by a humble sheet of paper.

While billions of dollars are invested to lock down business systems from external attacks, information on paper is the often-overlooked and weakest link in any security chain.

These 3 tips will help you secure your print environment.

Cabinet Files incident reveals dangers of poor document security policy

Document security breaches aren’t confined to hackers sneaking through your print server. They’re not even strictly digital. Sometimes they occur through simple human error.

To avoid a leak such as the Australian Government’s ‘cabinet files’ leak, your document security policy must factor in at least four potential security breach areas.

How programming languages have changed over the years

I recently spoke at Linux Conf Australia about the differences between five programming languages developed over many decades. It was a five minute talk, which didn’t give me enough time to do the topic justice.

I found it an interesting enough exercise to warrant exploring more in a blog post, as it’s a handy way to see how different languages work.

1 2 3 23