Remove CTO Remove Engineering Remove Finance Remove Productivity
article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. An excerpt is below. How would your CFO or CIO handle this?

article thumbnail

How IBM, Intuit, and Rich Products Became More Customer-Centric

Harvard Business Review

Now, every company of any scale and in any sector wants to be closer to its customers, to understand them more deeply, and to tailor their products and services to serve them more precisely. They followed a sequence that resulted in new products or major updates to products every year or two.