Blog
Sharing insights, knowledge and expertise
How to Identify and Monitor Risks During Project Implementation
Software development is always risky since a lot of market segments are saturated with ready-made solutions. The creation of customized software for…
Modernization Strategies for Legacy Systems: Choosing the Right One for Your Project
We have already described the way to analyze the legacy system and evaluate risks before running a modernization process. In…
Legacy Systems: How to Analyze, Project and Evaluate Risks
Legacy systems can seem hopeless, but you just need to find a partner who knows how to work with legacy…
So You’re Thinking of Migrating from VersionOne to Jira
Collabnet VersionOne (recently absorbed into Digital.ai) is a powerful agile management tool built with large-scale, enterprise-level implementation in mind. It…
How to Optimize Transparency Through Value Stream Mapping
Value Stream Identification and Mapping is one of the best tools used in SAFe that develops deeper transparency within your…
Cprime Employee Spotlight – Getting to Know Andrea DeFrates, Managing Consultant
Our Employee highlight of the month is Andrea DeFrates, Managing Consultant! See what she's up to outside of work, and…
Presto-Bingo, You’re Agile!
Agile for Hardware Discussion Panel Recap On Tuesday July 28th, we hosted and participated in a virtual executive discussion panel…
Moving from ServiceNow to Jira Service Desk: Why and How?
ServiceNow has been called “the Salesforce of IT”, and for good reason: It’s a solid solution for IT support management…
How to Conduct Market Research for Startups: 5 Steps for Launch
When you decide you are ready to run a startup, ask yourself did you do the whole preparatory work. Before…
Cprime Employee Spotlight – Getting to Know Chris Thiele, Enterprise Agile Transformation Delivery Manager
Our Employee spotlight of the month is Chris Thiele, Enterprise Agile Transformation Delivery Manager! See what he's up to outside…
What You Need to Know About Embedded Software Development
The first embedded system was developed over 50 years ago. Today, embedded systems surround us at every turn, and are…
Hospital Security Checklist
According to Accenture’s Cost of Cyber Crime Study 2019, the annualized cost of cybercrime for companies in the healthcare industry increased…