Strategy & Governance

Is the ITIL Empire Overextended?

(By Info-Tech Analyst Refael Keren - Printed with permission from Processor magazine) History teaches us that great empires’ overreaching growth is often responsible...

Consumer Techs in Business: Be Cautious, But Not Close-Minded

(By Info-Tech Analyst Jayanth Angl - Printed with permission from Processor magazine www.processor.com). IT leaders don’t have it easy. Maintaining a secure and reliable...

Where's the Unified Communications Vision?

When it comes to UC, the majority of organizations fall short of having a strategic long term vision. Instead, many organizations are phasing in one communications...

Cash Flow Analysis: Understand the Cow's Movement

A cash flow analysis is a crucial step in determining the financial position of the enterprise as well as that of prospective vendors and business partners. Learn to read...

Cash Flow Analysis Template

A cash flow statement is essential to understanding the financial position of the business. There are three key components included in the analysis in order to accurately...

Healthcare: Barriers to Technology Implementation Adoption

Implementing new technologies into most organizations is a difficult process. IT managers in the healthcare industry, in particular, have a hard time gaining buy-in for...

Is Your Web Site User Hostile?

(By Info-Tech Analyst Howard Kiewe - Printed with permission from Processor magazine www.processor.com) I recently guest lectured on the topic of usability testing to...

EMR Begins with Document Imaging

For many hospitals worldwide, Electronic Medical Records (EMR) systems are the way of today. Healthcare organizations slow to join the digital wave should begin with...

EMR Document Imaging Worksheet

Healthcare organizations looking to implement Electronic Medical Records (EMR) technologies should begin with document imaging. Organize a high level strategy for...

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...
GET HELP Contact Us
×
VL Methodology