- All categories you are currently on the blog page with all categories and articles
- Security przejdź do strony artykułów z kategorii Security
- Case study przejdź do strony artykułów z kategorii Case study
- Good practices przejdź do strony artykułów z kategorii Good practices
- Mergers and acquisitions przejdź do strony artykułów z kategorii Mergers and acquisitions
- Energy przejdź do strony artykułów z kategorii Energy
- Real Estate przejdź do strony artykułów z kategorii Real Estate
- Due Diligence przejdź do strony artykułów z kategorii Due Diligence
- Virtual Data Room przejdź do strony artykułów z kategorii Virtual Data Room
- Product updates przejdź do strony artykułów z kategorii Product updates
- FORDATA Team przejdź do strony artykułów z kategorii FORDATA Team
- Reports przejdź do strony artykułów z kategorii Reports
- Expert's View przejdź do strony artykułów z kategorii Expert's View
- All categories you are currently on the blog page with all categories and articles
- Security przejdź do strony artykułów z kategorii Security
- Case study przejdź do strony artykułów z kategorii Case study
- Good practices przejdź do strony artykułów z kategorii Good practices
- Mergers and acquisitions przejdź do strony artykułów z kategorii Mergers and acquisitions
- Energy przejdź do strony artykułów z kategorii Energy
- Real Estate przejdź do strony artykułów z kategorii Real Estate
- Due Diligence przejdź do strony artykułów z kategorii Due Diligence
- Virtual Data Room przejdź do strony artykułów z kategorii Virtual Data Room
- Product updates przejdź do strony artykułów z kategorii Product updates
- FORDATA Team przejdź do strony artykułów z kategorii FORDATA Team
- Reports przejdź do strony artykułów z kategorii Reports
- Expert's View przejdź do strony artykułów z kategorii Expert's View
-
02 . 03 . 2020
SecurityAre your email attachments safe?
The modern office cannot function without email. According to the Radicati group, a statistical employee receives 121 messages per...
-
27 . 02 . 2020
Good practicesHow to black out text in a PDF document correctly?
Document redaction has many faces - it may turn out that overwriting of the text in our document, which at first glance looks...
-
03 . 02 . 2020
SecuritySafe cloud and the user - a marriage of convenience
According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that...
-
08 . 01 . 2020
ReportsReport M&A Index Poland Mergers and Acquisitions in Poland, Q4 2019
In the last three months of 2019, there were 49 mergers and acquisitions - 16 more than in the third quarter.
-
18 . 12 . 2019
ReportsReport M&A Index Poland Mergers and Acquisitions in Poland, 2019
In 2019 (as of December 12), 179 mergers and acquisitions took place. It is 20 less than in the same period last year.
-
16 . 12 . 2019
Mergers and acquisitionsCEE countries stay firm as global economy bears down
In the face of economic downturn all around, also in Europe, countries in the CEE region are expected to keep growing, especially...
-
01 . Fake software aggregators – how to identify them?
Fake software aggregators and Virtual Data Room industry. See how developers try to deceive their customers with fake software comparison websites.14.03.2024
-
02 . CEE countries stay firm as global economy bears down
In the face of economic downturn all around, also in Europe, countries in the CEE region are expected to keep growing, especially...16.12.2019
-
03 . The role of the CFO in mergers and acquisitions – has it changed?
Financial directors have faced the big challenge of managing company's funds in the uncertain reality caused by the coronavirus ...22.03.2021
-
04 . Safe cloud and the user – a marriage of convenience
According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that...03.02.2020