Blog Series: Business Relationship Management – Part 1

Blog Series: Business Relationship Management – Part 1

A Discipline or Role? This is the first of a three-part blog series explaining how Business Relationship Management (BRM) can be used as both a discipline and an enabler of digital transformation. To level set, digital transformation is the application of digital capabilities to processes, products, and assets to improve efficiency, enhance customer value, manage risk, and uncover new...

Read More
Seven Myths About Credit Cards and Your Credit Score

Seven Myths About Credit Cards and Your Credit Score

As a member of the West Monroe Payments Practice, I work with our clients to help them develop payments strategies, products, and partnerships.  As both a professional and a consumer, I am frequently asked about credit card rewards, features, usage best practices, technologies, and more.  Over a series of blog posts, I will examine several of these topics in more depth.…

Read More
Lessons Learned in Vegas: Top Ten Takeaways from Tableau Conference

Lessons Learned in Vegas: Top Ten Takeaways from Tableau Conference

Everyone knows ‘What happens in Vegas, stays in Vegas.’ While that may be true for some activities, after attending the Tableau Conference, #DATA17, we couldn’t help but share some of the key takeaways. Tableau, a data visualization platform, has been an industry leader in recent years (as recognized by Gartner and other organizations), and is known for its design-focused data visualizations...

Read More
Blog Series – Part 2: DOE’s Grid Resiliency Pricing Rule

Blog Series – Part 2: DOE’s Grid Resiliency Pricing Rule

Compounding Inequality for Customers This second blog in a series discussing the Notice of Proposed Rulemaking (NOPR) issued by the Department of Energy (DOE) examines potential adverse effects on electricity customers. Aside from the debate around whether this NOPR would improve grid resiliency, the proposed pricing rule can fundamentally alter wholesale electricity markets.…

Read More
Stranger (Internet of) Things: A couple of factors to consider before making the investment

Stranger (Internet of) Things: A couple of factors to consider before making the investment

We recently attended the IoT Summit Chicago hosted by the Illinois Technology Association. This conference gathered over 500 professionals from around the globe to collaborate on best practices and discuss future trends in the often discussed, but rarely understood “Internet of Things (IoT).” We took a moment to reflect on time the conference and identify some key takeaways to share with...

Read More
Can New Pricing Models Capture the True Value of Water?

Can New Pricing Models Capture the True Value of Water?

Many water utilities are currently experiencing high sensitivity to demand and revenue fluctuations. As capital expenditures to maintain and upgrade distribution infrastructure become inevitable, many utilities are also facing increasing pressure to conserve resources and maintain water quality. Evaluating potential rate structures may reveal solutions to provide revenue stability while...

Read More
Moving to the Cloud:  Myth Versus Reality

Moving to the Cloud: Myth Versus Reality

Cloud computing solutions have been available for well over a decade. Software as a Service (SaaS) came to prominence first, followed closely by Infrastructure-as-a-Service (IaaS) solutions, then advanced Platform-as-a-Service offerings (PaaS), and now Function-as-a-Service, or “serverless” cloud hosting models, where the application requests compute resources without visibility or knowledge...

Read More
What’s Your Cloud Security Foundation?

What’s Your Cloud Security Foundation?

Cloud implementation and migration projects create ample opportunity for mistakes when it comes to the management of security controls in the new environment. This was demonstrated in dramatic fashion recently with the news that Viacom cloud configuration secrets had been exposed on the public internet due to misconfigured S3 bucket permissions.…

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Imagine a Day Without Water

Imagine a Day Without Water

Many Americans take our access to freshwater for granted. It is typically only in moments of crisis, due to drought or contamination, that we truly understand the value of our water. That’s why the annual Value of Water Campaign, led by the American Water Works Association, is asking us all to imagine a day without water.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons