Articles

Illustration of a network of lock icons.
Articles
Christian Burger

Federal Cybersecurity Programs

What are they? Who are they intended for?  How are they enforced? What makes them special? By: John Solon I Senior Project Manager, Burger Consulting Group

Read More »
Close up of a man's hands typing on a laptop and white business graphics are overlaying the photo.
Articles
Angus Frost

Agile IT Organization

As IT leaders, if 2020 has taught us anything, it’s that we need to be more agile as an IT organization. The construction technology landscape

Read More »
Young businesswoman sitting at her desk and using a computer and laptop to calculate bills into a binder.
Articles
Amanda Kalcic

AP Invoicing Process

AP Invoice Automation Does your company still receive paper invoices that are manually routed for approval or scanned/emailed to approvers? Or does your organization have

Read More »