Blog
Unlocking AI Insights: 7 Takeaways from Laserfiche Empower 2025
By Scott Hirschfeld | | AI, Blog Post, Tech Trends
I recently spent most of a week in Las Vegas at the Laserfiche Empower 2025 Conference. Empower is always packed with great insights into the Laserfiche product, what is new, and what is coming, and it also provides a broader IT perspective. As you might expect, AI is fueling business process automation in a good…
Read More Serving Up Unreasonable Hospitality
By Scott Hirschfeld | | Best Practices, Blog Post, Leadership
For more than 30 years, I have been part of the leadership team at CTaccess. Our culture is all about service and making a difference in the lives of others. Recently, though, I have been inspired by Will Guidara’s book Unreasonable Hospitality, which has challenged me in unexpected ways. I hadn’t considered hospitality in terms…
Read More Keeping on Track: 5 Innovation Areas for Business Leaders
By Scott Hirschfeld | | Best Practices, Blog Post
About 25 years ago, when I was onsite working for a customer, the owner, Brad, told me that what he wanted from an IT Service Provider was to pay one monthly fee and have them take care of everything from start to finish. At the time, this was very much out-of-the-box thinking. I took this…
Read More 5 Practical Ways to Use AI
By Scott Hirschfeld | | AI, Best Practices, Blog Post
The November 30th, 2022 release of ChatGPT quickly stoked a race for the best generative AI. We now have a wide group of players, with OpenAI, ChatGPT, Google Gemini, Anthropic Claude, and Microsoft Copilot leading the way. Microsoft is building data centers right here in Wisconsin to propel its AI initiatives even further. Nobody would…
Read More How To Protect Yourself from Costly Business Email Scams
By Scott Hirschfeld | | Best Practices, Blog Post
Business email compromise scams are nothing new, but there has been a recent surge of scams. I am aware of more than one local company that has been hurt by them. The recent and common way a threat actor perpetrates this scam is something like this: STEP 1: The scammer gains access to a valid…
Read More