Serverless Architecture with AWS Lambda

Serverless Architecture with AWS Lambda

It’s been an exciting past few years watching cloud services evolve into what they are current day. Starting from the early years, companies were only looking to utilize unused computing resources; to now, where you can run platforms such as SQL Server as a service (PaaS) or use Salesforce in the cloud (SaaS).…

Read More
Move Aside Cloud, Blockchain is the Newest ERP Trend

Move Aside Cloud, Blockchain is the Newest ERP Trend

On January 10, 2018, Geoprise Technologies Corporation, the maker of GM-X ERP, announced that it has partnered with Coin Sciences Ltd, maker of the MultiChain blockchain platform, to launch an ERP application leveraging blockchain technology to enable secure business-to-business collaboration and others are quickly following suit. Let’s take a step back to understand what blockchain is and...

Read More
Data Governance Guiding Principles

Data Governance Guiding Principles

Some form of data governance is necessary for all organizations, regardless of industry or size. Data governance accomplishes many goals, from meeting regulatory requirements to fueling strategic initiatives that depend on data. While most organizations recognize the importance of data governance, they have trouble keeping momentum after starting. One issue is that data governance models are...

Read More
Three Utility Systems Integration Tips & Tricks

Three Utility Systems Integration Tips & Tricks

Does data have your head spinning? Here are a few tips and tricks for successful systems integration in the Utilities sector. As the West Monroe team gears up to attend DistribuTech this week (Booth #2761), we expect there to be plenty of buzz around enterprise data analytics solutions. Through enterprise data analytics initiatives, value is driven at the data intersections across...

Read More
Off the Chain – Blockchain is Hot but Still Unproven

Off the Chain – Blockchain is Hot but Still Unproven

We are about 24 months into the hype cycle on Blockchain, measured by the volume of news that has started trickling out from institutional investors and software companies, as well as the recent surge of interest in Crypto Currency trading.  We are potentially looking at another 24 months from starting to see a real presence in the marketplace, so now seems like a good time to address where...

Read More
Re-imagining STEM: Our Takeaways from the Washington STEM Summit

Re-imagining STEM: Our Takeaways from the Washington STEM Summit

West Monroe recently was a proud sponsor of the Washington STEM Summit, a day-long gathering of local and national education STEM thought leaders, innovators and champions who are united by a desire to advance excellence, innovation, and equity in STEM education. As deep technologists, we at West Monroe feel passionate about making STEM education accessible to all students, to increase the...

Read More
Lessons Learned in Vegas: Top Ten Takeaways from Tableau Conference

Lessons Learned in Vegas: Top Ten Takeaways from Tableau Conference

Everyone knows ‘What happens in Vegas, stays in Vegas.’ While that may be true for some activities, after attending the Tableau Conference, #DATA17, we couldn’t help but share some of the key takeaways. Tableau, a data visualization platform, has been an industry leader in recent years (as recognized by Gartner and other organizations), and is known for its design-focused data visualizations...

Read More
What’s Your Cloud Security Foundation?

What’s Your Cloud Security Foundation?

Cloud implementation and migration projects create ample opportunity for mistakes when it comes to the management of security controls in the new environment. This was demonstrated in dramatic fashion recently with the news that Viacom cloud configuration secrets had been exposed on the public internet due to misconfigured S3 bucket permissions.…

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Tap into Actionable Data – 5 Considerations for Delivering Successful Reporting Implementations

Tap into Actionable Data – 5 Considerations for Delivering Successful Reporting Implementations

The marketplace for business intelligence and analytics tools becomes more saturated every day.  Between standardized reporting, ad hoc self-service visualizations, and predictive analytics, many managers and buyers are so overwhelmed by keeping up with product releases and understanding tool features that they do not have time to consider the pitfalls that can sabotage a successful...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons