Author user photo

Who Has a Copy of Your Software?

Mike Rozlog, CEO - dBase

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

Five Sources of Software Pricing Pressure

M.R. Rangaswami, Co-Founder - Sand Hill Group

Sand Hill’s 2014 study details software pricing pressures.

Author user photo

Five Common Mistakes Enterprises Make with IT Outsourcing Deals

Jonathan Crane, Chief Commercial Officer - IPsoft

More IT dollars are being spent on outsourcing, but many deals have disappointing ROI performance. Applying these procedures will avoid common pitfalls and lead to desired outcomes.

Author user photo

Get Your Professional Services Right Sourced

Regev Yativ, President & CEO - Magic Software Enterprises Americas

You don't have to be in the "faster, better, cheaper — pick two" situation when you outsource. Use right sourcing to get exactly what you need when you need it.

Author user photo

Using Application Performance Management to Improve Your Customer’s Experience

Charles Rich, VP, Product Management and Marketing - Nastel

Attention is often placed on the technology details of how application performance monitoring (APM) works, while overlooking the real reason we use the technology.