Posted by Rick Davidson

Find me on:

The Whole Picture: Functional Requirements Are Important, But Not Sufficient in Selecting Software

Functional vs. Non-functional Requirements

If you are a business leader, are you frustrated with an IT organization that gives you all the reasons why your purchase of a software application won’t work versus figuring out how to make it work? If you are an IT leader, do you find your concerns about application security, performance, compliance and a slew…

Read More

Tags: , ,

Guided Autonomy Governance Model [White Paper]

Guided Autonomy

Over the past several years, the tension has grown between corporate IT and the departments it serves throughout the organization. This tension exists for many reasons, but is escalating as departments are increasingly acquiring their own technology to meet their specific business needs. Corporate IT departments often refer to this as “Shadow IT.” While the…

Read More

Tags: , ,

Why Now is the Time for Business Agility

Business Agility

Many business leaders today face the challenge of transforming their organizations to compete in a world that is defined by increasing levels of uncertainty, chaos and complexity. A global pandemic, social justice concerns, rapidly evolving customer expectations, the changing nature of work – these and other factors are driving the need to create new business…

Read More

Tags: , , , ,

“Time to Weed the Garden” – How CIOs Can Improve Customer Experience (CX)

CX at Sub-Zero case

Are companies making it difficult for our customers to use our products or consume the services we offer? Have they put business rules in place over time that now serve as barriers to delivering great customer experiences? As a consumer, you know the rules – the ones that constrain our options when we dare to…

Read More

Tags:

Cloud Security – Extending Your Cyber Fortress to the Cloud [White Paper]

Cloud Security

Is your organization considering a move from on-premise systems to the cloud, but concerned about information security? Are you already using the cloud, but uncertain about how well your networks and data are protected? The transition to cloud computing is transforming businesses and IT departments worldwide, yet all too often, security is an afterthought. It…

Read More

Tags: , ,

Preparing to Become an Intelligent Enterprise: a Five-Tiered Approach

Intelligent Enterprise Services

The fundamental distinction of the Intelligent Enterprise from its analog and digital predecessors is in the extensive use of data. While data is used today by businesses of all types, the sheer amount of data captured – both structured (e.g. databases) and unstructured (e.g. social media content) – is what is driving the Intelligent Enterprise….

Read More

Tags:

How to Avoid Extinction in the Age of Digital Disruptive Technology [White Paper]

Legacy technology

Our latest white paper focuses on the urgent need for many companies to find their way from their current status struggling with legacy technologies to generating competitive advantages with emerging technologies like artificial intelligence and machine learning. Here are some clear warning signs that your organization is lagging behind and needs to move into a…

Read More

Tags: , ,

The Time to Invest in Cybersecurity is Not After a Breach

cyber shield

A major credit-reporting company recently disclosed that hackers possibly gained access to the personal information of 143 million US consumers, or roughly half the US population. In a statement made on the day of the public disclosure of the breach, the company’s chairman and CEO vowed to increase cybersecurity spending. Of course, this is the…

Read More

Tags:

Five Pillars of Cybersecurity to Protect Against WannaCry Ransomware

Wannacry ransomware

Organizations and IT departments are still fighting off the WannaCry ransomware attack, which has crippled corporations, government agencies and healthcare systems across the globe. Every threat is different, but this is yet another example of why every organization, no matter how big or small, needs to take these threats more seriously. At Cimphoni, we have…

Read More

Tags:

Building a Cyber Fortress to Protect Your Digital Assets [White Paper]

Building a Cyber Fortress to Protect Your Digital Assets

An adage in cybersecurity is, “there are two types of companies – those that have been hacked and those that don’t yet know they have been hacked.” Which one is your organization? The importance of an effective cybersecurity program should not be underestimated. In our latest Cimphoni white paper, Building a Cyber Fortress to Protect Your…

Read More

Tags: