Recently I completed a project that was challenging in the best of ways. We were asked to study and understand…
Read More about "From Conversations to Documentation: 9 Tips for Writing System Requirements"
Recently I completed a project that was challenging in the best of ways. We were asked to study and understand…
Read More about "From Conversations to Documentation: 9 Tips for Writing System Requirements"
When you think about your organization’s cloud strategy, mindset may not be one of the first things you think about,…
Read More about "Adopting a Cloud Mindset for Successful Cloud Transformation"
Data Lake has become a mainstay in data analytics architectures. By storing data in its native format, it allows organizations…
Read More about "Data Privacy and Data Lake with Databricks DeltaLake"
Whether you are just starting your journey to Office 365, or you are expanding your usage of the platform, it’s…
Read More about "The Value of User Research for Your Next Office 365 Project"
K.C. Jones-Evans, a User Experience Developer, Josh Lathery, a Full Stack Developer, and Sara Darrah, a User Experience Specialist, sat…
Read More about "The Design Huddle: An Approach for Project Development Planning"
I recently read Patrick Lencioni’s latest book, Getting Naked: A Business Fable About Shedding The Three Fears That Sabotage Client…
Read More about "Book Review: A Business Fable from Patrick Lencioni on Being a Better Consultant!"
Make no mistake, most organizations and government agencies are—at least in part—software companies. The backbone of the services and products they…
Read More about "Eyes On the Prize: Focus Your DevOps Investments"
The FBI’s Uniform Crime Reporting (UCR) Program is a nationwide, cooperative statistical effort of more than 18,000 city, university and…
Read More about "AIS Models FBI Uniform Crime Reporting Data"
In my previous post, I proposed an example application that leverages the resources available to us in Office 365 development…
Read More about "Office 365 and the Graph API: Under the Hood"
Enterprises have a trove of business resources and data that are often under-utilized – users, calendars, contacts, emails, tasks, documents and…