Talent [R]evolution

Sourcing Talent in the digital age

Posts filtered by Key Roles

Best practices in IT management

it management

Information technology has always been the focal point of managed services within businesses. However, often, its presence goes largely unnoticed; team members see a functioning IT system as a given, a sort of operational constant. Often, its presence is only felt when it fails and it’s at this point that a team truly acknowledges it’s […]

How the digital economy is transforming strategy consulting

strategy consulting

There was once a time when running a management or strategy consulting firm was a clearly defined business, with distinct assets and entry barriers. These attributes protected the business from new entrants and competitors. In a pre-digital business environment, strategy consultancy was driven by top talent from established MBA schools. These individuals had a clear […]

The process and role of a successful IT project manager

it project manager

What is an IT project manager and what do they do? A project manager is responsible for the organisation and coordination of IT projects on a wide scale. Their roles may include: Setting up a dedicated office and team Communicating with staff, salespeople and clients about conditions and demands of the project Sustaining a working, […]

Technical Due Diligence: Thinking Beyond Scalability

due diligence

The desire for creating the next big thing is what drives most startups. Getting one big investment that will help them get over the finish line, landing that partnership with one of the big giants of the industry or getting acquired by a known name is what many startups plan to achieve. But as most […]

How companies can foster business development in their long-term strategy

business development

Do you have a clear idea of what business development really means? There can be just as  many definitions of what it is as there are people who will tell you. In its simplest terms, business development is every aspect of a business’s growth. Business development is a business’s profit, sales share, market increase and […]

The makings of an exceptional big data engineer

data engineer

As a discipline, data engineering is effectively the sibling of data science; like data scientists, data engineers are highly analytical, able to write complex code and produce detailed data visualizations. However, unlike data scientists, a data engineer will manage complete data pipelines by building tools, infrastructure, frameworks and services. Their most crucial role is to […]

What are the main challenges a CTO faces today?

CTO

Technology is a dynamic and ever-changing field. With new developments and disruptors appearing seemingly daily, an organisation’s CTO has to constantly face up to new challenges. Today, this is more the case than ever. With game-changing new developments like 5G, collaborative Cloud platforms and artificial intelligence (AI) rapidly changing the way we do business, CTOs […]

What makes a great web analyst?

web analyst

What does a web analyst do? A web analyst’s main responsibilities are to look closely at the data associated with a business’s website. That means making detailed analyses of data, behavioural patterns, visitor numbers and their responses to the website. It requires a certain amount of understanding and creativity. The perfect web analyst is lead […]

Sourcing interim management: Options for agile onboarding

interim management

The employment market is becoming increasingly dynamic. Today, the tendency towards remaining in organisations for long stints is shifting. Instead, many of the most talented individuals are recognising the benefits of changing jobs more often. This is for various reasons, one of the most important being that such ambitious individuals crave stimulation. Certainly, this is […]

Cyber security and IoT in a 5G reality

cyber security

5G is coming – and with this new digital landscape we can expect an exponential increase in IoT devices. This presents new challenges in regard to cyber security; as many are well aware, devices that connect to large external WiFi or Cloud networks can be at risk. Until recently, enterprises have accepted that they can […]

  • Page 1 of 2
  • 1
  • 2