TAG: outsourcing

Author user photo

Who Has a Copy of Your Software?

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

IT Consumption-Based Service Management

Here’s how IT can quantify just how technology investments are delivering business value.

More Articles

News You Can Use

Click here for news about

  • Intacct in 2015 OnFinance Top 100 List
  • CrowdOptic granted patent for augmented reality apps
  • WHD.usa (hosting & cloud service event) - May 19-20
  • Mentored 1-day marketing strategy development sessions for startups in Silicon Valley