Articles

Illustration of a network of lock icons.
Articles
Christian Burger

Federal Cybersecurity Programs

What are they? Who are they intended for?  How are they enforced? What makes them special? By: John Solon I Senior Project Manager, Burger Consulting Group

Read More »
Close up of a man's hands typing on a laptop and white business graphics are overlaying the photo.
Articles
Angus Frost

Agile IT Organization

As IT leaders, if 2020 has taught us anything, it’s that we need to be more agile as an IT organization. The construction technology landscape

Read More »
Young businesswoman sitting at her desk and using a computer and laptop to calculate bills into a binder.
Articles
Amanda Kalcic

AP Invoicing Process

AP Invoice Automation Does your company still receive paper invoices that are manually routed for approval or scanned/emailed to approvers? Or does your organization have

Read More »
Business people shaking hands with cityscape in the background.
Articles
Christian Burger

Trending Acquisitions

The pace of acquisitions in the Contech space has reached fever pitch. This is coming from both large publicly-traded companies acquitting mature solutions (think AutoDesk,

Read More »