Backing Up To the Cloud From the Cloud

Backing Up To the Cloud From the Cloud

In our last post, “Managing Administrative Access to an Azure-based Cardholder Data Environment,” we outlined ways to secure administrative workflows by using various Azure technologies. We’ll resume with part eight of the Azure Secure Cloud Migration blog series, covering considerations for backing up VMs in Azure and all the associated restrictions and caveats.…

Read More
Driving Innovation through Technology

Driving Innovation through Technology

The first topic we’ll cover in our Deep Tech Blend series is all about innovation. If you are a CEO, COO, CIO or CTO of any technology-enabled organization, or influence the decisions made by those titles, this will resonate with you. Speed is critical in the digital economy and business disrupters are ever present.…

Read More
Uncommon Blend: Making Business Needs Tangible

Uncommon Blend: Making Business Needs Tangible

As the Director of Marketing at a consulting firm, there are a few projects that will inevitably come up – web site redesigns and customer relationship management system implementations. With these projects comes the notorious debate… do we use our internal resources OR do we outsource it? In April of 2016, West Monroe decided to transition from our CRM system and e-marketing tool to...

Read More
Reduce PCI DSS Costs by Reducing Scope

Reduce PCI DSS Costs by Reducing Scope

In a recent post, we discussed some scenarios involving Service Providers and their integration into Payment Card Industry Data Security Standard (PCI DSS) compliance. Click here for more of our recent series of blog posts on PCI DSS-related topics for more information. Defining the cardholder data environment (CDE) is a key step toward PCI DSS compliance and has become somewhat of a pain...

Read More
Addressing The Magic Bullet – Part 2

Addressing The Magic Bullet – Part 2

Now that you’ve been introduced to service providers (see “Addressing the Magic Bullet – Part 1” from our “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” blog series) and what you should look when involving them in PCI DSS compliance, let’s make things a little more complicated.…

Read More
Why You Should Blend Instead of Join in Tableau

Why You Should Blend Instead of Join in Tableau

Data blending in Tableau is the operation of combining multiple data sources into the same view by finding common fields between them to join on. Unlike an ordinary join, which combines data sources at the lowest granularity before any aggregation is done, a data blend can join data sources after aggregation is performed on the individual sources; ultimately limiting the number of records that...

Read More
How to Prepare for the Tableau Desktop Qualified Associate Exam for Free

How to Prepare for the Tableau Desktop Qualified Associate Exam for Free

I recently took the Tableau Desktop Qualified Associate Exam and passed it without spending anything on preparation materials. Having taken other certification exams before, I knew that study guides issued by exam providers don’t always provide the most thorough methods of preparation. In preparing for this exam, I was unsure about the best approach for studying, and ended up exhausting the...

Read More
Is Data Warehousing really dead?

Is Data Warehousing really dead?

Traditional data warehousing was pioneered by Ralph Kimball and Bill Inmon in 1970s to address growing problem of accessing data for reporting and analytics from multiple disparate data sources. Key drivers and goals of data warehousing are: Collect data from multiple sources into a single repository Expose data for reporting and analytics in a performant way Keep full history of data...

Read More
Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Believe it or not, information security professionals could learn some lessons from the health and wellness industry. The practice of preventative care can and should be transferred to the information security profession. According to the American College of Preventive Medicine, preventive medicine is defined as “a practice by all physicians to keep their patients healthy“.…

Read More
Unlocking the Blockchain’s Potential

Unlocking the Blockchain’s Potential

Raw talent needs coaching Few teams in the National Basketball Association can say they’re better positioned for the future than the Minnesota Timberwolves. Despite losing 65% of their games this past season, the T-Wolves have a young roster oozing with talent, though lacking in experience. Headlining the squad are Andrew Wiggins, the 21 year-old, hyper-athletic wing, and Karl-Anthony Towns...

Read More
10 Years & 10 Apps. AppExchange 10th Birthday and the Top 10 Apps on it Today!

10 Years & 10 Apps. AppExchange 10th Birthday and the Top 10 Apps on it Today!

Earlier this year the Salesforce AppExchange, the home for third party-created Salesforce-native applications, celebrated its 10th birthday. Back in January 2006 the app exchange officially launched and was dubbed the Ebay of Business Software by Businessweek. By 2011 the AppExchange celebrated its one millionth app installed, by 2013 it reached its two millionth app installed and by 2015 the...

Read More
Public LTE: What is the True Cost of Going Wireless?

Public LTE: What is the True Cost of Going Wireless?

Across the country, telephone service providers are announcing their plans to suspend future support, and eventually retire legacy analog circuits. Over the past few decades, these circuits were used by utilities to connect critical assets with their core IT network. Many utilities are using this as an opportunity to upgrade their existing communications systems to IP or cloud based...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons