Sensible Security
This post is the last in a 3 part series and will cover the last 2 points from our post entitled the Top 4 Failures in Corporate Information Security. Here we are going to focus on why firewalls...
View ArticleMergers and Acquisitions Revisited
We wrote a post last Sept about successful acquisitions. In that post we first struggled with how to actually define a “successful” acquisition. After that we postulated that there were two primary...
View ArticleGrowing Too Fast
When you’re waiting for your startup to achieve the hockey-stick growth, so you can ring the NASDAQ bell in a hoodie, it might seem impossible to grow too quickly. However, there are some serious...
View ArticleNewsletter – New Associate Partners
Below is part of our recent newsletter. If you haven’t subscribed yet, click here to do so. New Associate Partners We are very excited to announce that Geoff Kershner and Dave Berardi are joining AKF...
View ArticleAgile Communication
In Agile software development methodology the communication between team members is critical. Two of the twelve principles deal with directly with this issue: Business people and developers must work...
View Article
More Pages to Explore .....