All Research

Rebalance Project Intake for Small Enterprise

Successful project intake doesn't require additional time, administrative overhead, or high PPM maturity. Build intake discipline one step at a time by adopting a...
  • guided implementation icon

Spread Best Practices With an Agile Center of Excellence

As use of Agile grows in your organization, its benefits can be stifled by inconsistent practices and friction with existing management and governance structures....
  • guided implementation icon

ECM Taxonomy Designer Tool

Use this tool to develop a content taxonomy and assign access permissions as part of your ECM strategy. The tool will assist you in defining level 1, level 2, and level 3...

Set a Strategic Course of Action for the PMO in 100 Days

New PMOs frequently suffer from poorly defined mandates and a lack of leadership vision. Don’t flounder in your new role as PMO director. Hit the ground running to...
  • guided implementation icon

Implement a New IT Organizational Structure

Managing organizational design (OD) changes effectively is critical to maintaining IT service levels and retaining top talent throughout a restructure. Yet many...
  • guided implementation icon

Build a Data Warehouse

The relational data warehouse is reaching its limits in supporting the data and analytics needs of business users today. Create a plan for enabling new capabilities by...
  • guided implementation icon

Master Data Mapping Tool

This tool helps your team create a comprehensive document of all the data elements involved in your master data records.

Crucial IT Process Areas and the Pit of Despair: Lessons from Leaders and Laggards

Leading IT organizations put more emphasis on IT processes such as asset management, cost optimization, and business value. But there’s a surprise. They put less emphasis...

Master Contract Review and Negotiation for Software Agreements

Review your software contracts to leverage your unique position during negotiations and find substantial cost savings.
  • guided implementation icon

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us