Is Data Warehousing really dead?

Is Data Warehousing really dead?

Traditional data warehousing was pioneered by Ralph Kimball and Bill Inmon in 1970s to address growing problem of accessing data for reporting and analytics from multiple disparate data sources. Key drivers and goals of data warehousing are: Collect data from multiple sources into a single repository Expose data for reporting and analytics in a performant way Keep full history of data...

Read More
Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Believe it or not, information security professionals could learn some lessons from the health and wellness industry. The practice of preventative care can and should be transferred to the information security profession. According to the American College of Preventive Medicine, preventive medicine is defined as “a practice by all physicians to keep their patients healthy“.…

Read More
Unlocking the Blockchain’s Potential

Unlocking the Blockchain’s Potential

Raw talent needs coaching Few teams in the National Basketball Association can say they’re better positioned for the future than the Minnesota Timberwolves. Despite losing 65% of their games this past season, the T-Wolves have a young roster oozing with talent, though lacking in experience. Headlining the squad are Andrew Wiggins, the 21 year-old, hyper-athletic wing, and Karl-Anthony Towns...

Read More
10 Years & 10 Apps. AppExchange 10th Birthday and the Top 10 Apps on it Today!

10 Years & 10 Apps. AppExchange 10th Birthday and the Top 10 Apps on it Today!

Earlier this year the Salesforce AppExchange, the home for third party-created Salesforce-native applications, celebrated its 10th birthday. Back in January 2006 the app exchange officially launched and was dubbed the Ebay of Business Software by Businessweek. By 2011 the AppExchange celebrated its one millionth app installed, by 2013 it reached its two millionth app installed and by 2015 the...

Read More
Public LTE: What is the True Cost of Going Wireless?

Public LTE: What is the True Cost of Going Wireless?

Across the country, telephone service providers are announcing their plans to suspend future support, and eventually retire legacy analog circuits. Over the past few decades, these circuits were used by utilities to connect critical assets with their core IT network. Many utilities are using this as an opportunity to upgrade their existing communications systems to IP or cloud based...

Read More
Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More
Securing Cloud Networks

Securing Cloud Networks

Continuing our blog series on Azure Secure Cloud Migration, we will discuss Azure’s take on network control and how scalability and manageability play a role in designing a secure and functional environment. See our previous post on Talking to the Cloud for insights on architecting an Azure network. Network Access Control Network Security Groups (NSGs) are a native Azure feature to apply...

Read More
Demystifying Elasticsearch

Demystifying Elasticsearch

Is your app’s searching capability not scaling to meet added load? Do your searches slow as your transactional data volume grows? Do you have complex, hard to maintain stored procedures that function as your main search components? If you answered yes to any of these questions, you may have spent some time looking at search technologies, such as Elasticsearch, Solr, Lucene, and SQL...

Read More
How to Talk to the Cloud

How to Talk to the Cloud

Picking up from last week’s post on Preparing to Migrating to a Secure Cloud, the first part of our Azure Secure Cloud Migration blog series, we’ll jump right in to how and why the client’s Azure network was architected. Connectivity and traffic flow between Azure, on-premises locations, and even business partners are things to consider immediately, as they impact the overall structure of the...

Read More
Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More
Vision & Value: Helping Your Business and IT Leaders Align Through Change

Vision & Value: Helping Your Business and IT Leaders Align Through Change

The expectations of how Program and Project Managers support the implementation of new technology are changing. Technology deployments and implementation projects have historically been owned and managed in great part by an IT department, with sporadic input from the business. In today’s environment of cloud computing and solutions-as-a-service, this is not the case.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons