Our Blog

Mike Hastie | November 24, 2017
In the not-so-distant past, IT professionals and consultancies would execute extremely large methodologies that were designed to ensure that details captured during business and technical interviews were used to complete “as-is” detail requirements. They then go into future state business design, or the “to-be” phase. Although I actually have no issue with this as an... + continue reading
Mike Hastie | November 14, 2017
Whether we got into IT because we had an interest in it or because it was required for college or a job, we all start out by digging in. This could involve formal training or a bunch of reading and experiments, but in the end, we all end up with a set of broadly applicable IT concepts—and, for most us, a deeper understanding in an area or two. As we do more things and our experience grows... + continue reading
Prithvi Srinivasan | November 9, 2017
Introduction As it is, the healthcare system is bloated with cost, bureaucracy, and middlemen. It’s ripe for the picking for disruption. Lately, there has been a lot of talk that Amazon will soon enter the prescription drug market. This would be major blow to traditional brick-and-mortar retail pharmacies, and it would also threaten Pharmacy Benefit Managers (PBMs). To ward off this... + continue reading
Parthasarathi Jayapathi | November 8, 2017
Overview IBM BPM is one of most successful products in the Smarter Process and business process management world. It is used globally across various industries, including financial services and banking, healthcare and insurance, retail, manufacturing, and media and entertainment. IBM BPM offers many exciting features, including process transformation, optimization, modeling, performance... + continue reading
Mike Hastie | November 6, 2017
With the emergence of tools, frameworks, and accelerators designed to “just get it done,” the days of having a business analyst, a lead developer, a database administrator, a QA specialist, an administrator, and maybe an operations specialist have gone. That is not to say we don't need all the skills and considerations that go with all of these roles; it’s just that so many... + continue reading
Mike Hastie | October 30, 2017
In the not so distant past, an organization’s IT infrastructure was simpler and more self-contained. For many, security only had to be enforced in a small set of applications, with an outer layer of protection with dedicated networks and limited access via firewalls and virtual private networks. Even larger and more sophisticated environments had a single identity store (LDAP or Active... + continue reading