TAG: outsourcing

Author user photo

Who Has a Copy of Your Software?

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

IT Consumption-Based Service Management

Here’s how IT can quantify just how technology investments are delivering business value.

More Articles

News You Can Use