Tal Lavian, Ph.D., is a scientist, technologist, and lecturer at UC Berkeley Engineering with over 25 years of experience. Dr. Lavian specializes in Telecommunications, Network Communications, Mobile Wireless, and Internet Protocols, including mobile devices, smartphones, wireless LAN (WLAN), routing, LAN/WAN, Ethernet, TCP/IP, UDP, IP, VoIP, web, and streaming media.
Areas of Expertise
Communication Networks: Internet protocols; TCP/IP suite, TCP, UDP, IP, Ethernet, 802.3, network protocols, network software applications, data link, network, and transport layers (L2, L3, L4), packet switching, data center network architecture.
Mobile Wireless: Wi-Fi, 802.11, Bluetooth, MAC, PHY, Wireless LAN (WLAN). Cellular systems, SMS, instant messaging (chat), mobile devices, smartphones.
Internet/Cloud: Internet Technologies, Web applications, HTTP, e-mail, SMTP, POP, IMAP, Java, C/C++, file transfer FTP, client-server, cloud computing, distributed computing, Computer Networks
VoIP/Streaming Media: PSTN, circuit switching, IP telephony, VoIP, SIP, RTP, SS7, SONET, TDM, video/audio conferencing, streaming media, Voice and Data Communications
Past cases have involved leading companies such as Google, Microsoft, Amazon, LinkedIn, Avaya, T-Mobile, AT&T, Ericsson, Sprint, Cisco Systems, Juniper Networks, Polycom, Motorola, LG, WhatsApp, Instagram, Huawei, Facebook, and Apple.
As an expert witness, Dr. Lavian offers his opinion and litigation support services in patent-related cases, specifically in network communications, telecommunications, mobile wireless, and Internet software technologies. He has extensive experience rendering reports and testifying in Federal, IPR, and ITC cases. He has appeared before the USPTO PTAB IPR and ITC in over 140 patent-related cases. Dr. Lavian is skilled at helping the layperson understand complex and sophisticated technologies.
Dr. Lavian has served as an industry fellow and lecturer with U.C. Berkeley’s Industrial Engineering and Operation Research (IEOR) Department and with U.C. Berkeley Engineering’s Sutardja Center for Entrepreneurship and Technology (SCET). He has also been a part of U.C. Berkeley’s start-up accelerator, SkyDeck for CRadar.ai, VisuMenu, and Aybell.
Wireless-Nets, Ltd., offers a wide range of independent consulting services for planning, designing, implementing, analyzing, and troubleshooting Mobile Devices and Wireless Network Systems for many industries, such as hospitals, warehouses, airports and municipalities. Consulting Services Include:
Management Consulting
Product Development Services
System Implementation Services
Wireless Site Survey Services
Troubleshooting / Problem Resolution Services
Training Services
Principal Consultant and Founder of Wireless-Nets, James T. Geier, is an independent consultant, author, and entrepreneur with 30 years experience planning, designing, analyzing and implementing Mobile Devices, Communications Systems, and Wireless Networks.
Mr. Geier is the author of over a dozen books on mobile and wireless topics including, Designing and Deploying 802.11n Wireless Networks (Cisco Press), Implementing 802.1X Security Solutions (Wiley), Wireless Networking Handbook (New Riders), and Network Re-engineering (McGraw-Hill). Mr. Geier has been an active participant within IEEE standards organizations, such as the IEEE 802.11 Working Group, and the Wi-Fi Alliance. He has served as Chairman of the IEEE Computer Society, Dayton Section, and various conferences. Mr. Geier has been an active participant within IEEE standards organizations, such as the IEEE 802.11 Working Group, and the Wi-Fi Alliance. He has served as Chairman of the IEEE Computer Society, Dayton Section, and various conferences.
Gain a practical understanding of the underlying concepts of the 802.11n standard and the methodologies for completing a successful wireless network installation. Practical, start-to-finish guidance for successful deployment of 802.11n wireless LANs. With the ratification of the 802.11n wireless LAN standard, thousands of companies are moving rapidly toward implementation.
You know it's essential, and you've heard that it can be tricky implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Information and Internet Technology Patent Consultant Bruce Weiner
Bruce Weiner is an Information and Internet Technology executive with over 30 years of in-depth experience managing product and software development for contracting companies and Fortune 100 companies.
Mr. Weiner is a Princeton trained computer scientist and electrical engineer, and a patent holder. Over his career, he has gained extensive experience in Information Systems management, program/project management, software development, software architecture, internet delivery, business applications, technology vendor selection, IT Outsourcing, and customer contact center operations.
Litigation Consulting Services: Mr. Weiner has experience as a consulting and/or testifying expert witness in software development, patent infringement, and commercial litigation matters for both plaintiffs and defendants. He is adept at translating complex software, patent, and technology issues for the lay person audience. He consulted on industry transforming anti-trust cases in the travel industry.
Industry Experience:
Travel Industry Technology - Former technology leader for American Express Travel and Chief Technology Officer of United.com;
Loyalty Industry Technology - 30 years experience in the technology that powers loyalty programs, working on Membership Miles, Thank You Rewards, Mileage Plus, #1 Gold, eRewards, MyPoints, Blockbuster Rewards, and AAdvantage
Financial Services Technology – 30 years experience working with Financial Services Companies on credit card and banking technology.
Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis and litigation support services to assist in the investigation, handling, and prosecution of computer-related crimes or misuse.
Setec Investigations combines today's most advanced computer forensics and litigation support expertise with a business- and legal-friendly approach, resulting in a sound analytical foundation that carefully balances critical investigative requirements with vital legal and evidentiary needs.
Setec Investigations incorporates a cross-disciplinary team comprised of computer forensic investigators, attorneys, law enforcement specialists, and seasoned business professionals who have established a proven track record of success since 1997.
Services Overview
Setec Investigations possesses the necessary combination of technical expertise, understanding of the legal system, and specialized tools and processes enabling the discovery, collection, investigation, and production of electronic information for investigating and handling computer-related crimes or misuse.
Explore our range of service offerings:
Computer Forensic Investigations
Computer forensics and enterprise investigation services identify, gather, analyze, and preserve electronic evidence to establish a sustainable posture for internal or legal action.
Electronic Discovery
Manage large volumes of electronic data and quickly identify and isolate electronic evidence that is critical to the success of a litigation.
Litigation Support
Legal consultants and attorneys translate litigation issues into strong case strategies that effectively utilize electronic evidence.
Expert Witness
Supports the resolution of security incidents and active litigations by offering impartial and independent expert testimony, opinions, and customized reports in legal proceedings.
Identifying pertinent evidence on computer systems is essential to the discovery process in today's world, as it is believed that over 70% of information stored in computer systems is never reproduced in hard copy form
It is estimated that over 90% of all documents are now created electronically, although most of them are never printed; therefore, legal professionals are being challenged by a drastic increase in electronic evidence
Security Diligence, LLC provides consulting and advisory services in Information Security, Privacy and Risk Management with key practice areas in Cybersecurity and Third Party Risk. Their extensive experience provides a practical approach to assessing risk, identifying areas for program improvement and developing strategies and implementation approaches that provide measured results.
Security Consulting Services:
Information Security - Security Diligence brings business-driven strategy to the development and implementation of Information Security Programs. With industry-recognized practices, they assess existing program effectiveness and develop strategies for today's complex information and cyber security landscape.
Privacy and Data Protection - Security Diligence can provide a number of key services for Privacy and Data Protection that include program governance, Privacy by Design guidance, impact analysis, due diligence compliance reviews and information protection strategy and assessment.
Enterprise Risk Management - Security Diligence can provide risk management services for key focus areas including security assessments and analysis, counterparty security due diligence, cyber security framework alignment, cloud readiness, and third party oversight strategies.
Third Party Vendor Risk - Security Diligence has extensive experience in third party vendor risk. As a key risk area today, they provide comprehensive services in program development and implementation. They can also provide third party due diligence security reviews and onsite assessment services.
Founder and CEO, Shawn H. Malone, is an award winning Information Security and Cyber RiskExpert. He has over 35 years of experience delivering Cybersecurity Solutions and Third-Party Risk Management Programs to the financial services, insurance, consulting / advisory, and defense industries.
Mr. Malone has degrees in Electrical Engineering Technology and Network Security. He co-developed industry leading Third Party Risk Management professional certification. He is a Certified Information Systems Security Professional (CISSP), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). He has served as a keynote speaker and provides training services in his areas of expertise including Information Security, Cyber Risk, and Third Party Risk Assessment.
Robert O. Peruzzi, PhD, PE is a Licensed Professional Electrical Engineer with particular expertise in Mixed-Signal Integrated Circuits (MSICs). His subspecialty within this broad category is with Integrated Circuits (silicon chips) used for signal-processing. Dr. Peruzzi's recent clients include Quantenna Communications, Wavefront Research, LSI, Berkeley Design Automation, among others. Examples of Signal Processing Systems:
Telephones, mobile phones, cell phones
Data recording and retrieving systems for magnetic media such as disk drives
Radio transmitters / receivers - low noise amplifiers, filters, automatic gain control and frequency mixers
Audio amplifiers
Audio recording / reproduction systems
Heat, ventilation, air conditioning controllers
Data transmitting / receiving systems
Areas of Expertise:
Behavioral modeling of analog/mixed-signal circuits using Verilog-AMS, VHDL-AMS or MATLAB/Simulink
Specific verification requirements
High-speed verification using real-value modeling techniques
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems.
He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys. Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Prior to his responsibilities at Pegasus, Mr. Cooper was a Senior Managing Director at FTI Consulting Inc. and the senior-most person globally in their Electronic Evidence Consulting practice. Prior to joining FTI, in 1984 Mr. Cooper was a co-founder of INSYNC Consulting Group, a nationally recognized Electronic Discovery, Computer Forensics, and Information Technology consulting firm. Prior to that, he worked at KPMG Peat Marwick in their Management Consulting Group’s Information Systems Services practice.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
Panorama Consulting Group is a technology-agnostic consultancy specializing in Digital Business Transformation and Enterprise Resource Planning (ERP) System Implementations for mid- to large-sized private- and public-sector organizations worldwide.
This highly respected firm is 100% independent of software and technology vendor affiliation. They offer a phased and integrated approach to strategy alignment and execution, enabling each client to achieve its unique business transformation objectives by transforming its people, processes, and technology.
Panorama clients include multi-national conglomerates from Amazon Robotics to Valcor Engineering, as well as governmental entities, including state and local governments, municipalities, school districs, state offices of the attorney general, and tribal governments.
A large capital city in the United States needed to determine the effectiveness of the organizational change management component of its ERP project. The project involved the implementation of Tyler Munis ERP software. The city was experiencing:
Panorama was engaged by the city to perform an assessment of the in-progress ERP implementation. The project had been stopped by the city in October 2019 amidst concerns about the operational readiness of the vendor’s software and the readiness of the city staff to successfully operate the new systems and corresponding processes.
The client was in the process of implementing a new HRMS system and was about a year into implementation when they encountered serious issues with the software during the testing phase. They were concerned that some key business requirements were missed at the beginning of the project and left out of the system’s design and configuration.
The Tribe hired Panorama to assist in selecting software to support its Health Service functions. This software would replace the Tribe’s current health systems. In the first phase of the project, we documented business and technical requirements, reviewed legacy systems, mapped processes, and identified pain points across
A large global retailer in the process of implementing SAP software wanted customized, on-site training for the company's internal resources. The company needed to implement inventory management modules while executing training and communications, but it had a lack of organizational change management experience.
Providing engineering, architecture, construction, and consulting solutions to the global life sciences and advanced technology industries, this firm had recently undergone an internal reorganization of its business units and operations. Each region was following its own processes, and multiple systems were being used. This led to duplicate and inconsistent data.
This multi-billion dollar professional services company was using various, disparate software applications across its worldwide operations. Many of its core business processes were not utilized globally, and dual/triple entry was demonstrated at various sites and in various functional areas.
Project Oversight Case Study: Oil & Gas: Upstream petroleum oil exploration and production company in the Middle East. Company operates several blocks, including one on the Arabian Sea, where crude oil, produced from this
While the company had little technological communication either internally or with its sister firm, the company was growing by leaps and bounds. It needed to modernize its technology and improve its business processes to continue providing outstanding customer service while meeting increased sales demand.
This consumer services company in Denver was using custom software developed in an AS/400 environment. Many of its core business processes were either manual or paper-based, and the company was struggling with the issue of sole dependency on a single employee who understood the legacy systems.
A tax and accounting firm with revenue between $500,000 and $1,000,000, was growing both organically and through acquisition. This firm had a conglomerate of various software. The main financial system (used for time, billing, and financials) was at “end of life,” meaning it was not going to be supported by the vendor in about two years time.
Client Uses environmentally sustainable practices to produce approximately 650,000 tons of chlorine-free, bleach kraft pulp annually. Generates approximately $155 million in annual revenue...
This plastic and rubber injection molding company processes orders using both a made-to-order process and engineer-to-order process. The company engineers to order through a variety of CAD systems and must undergo first article inspections prior to running production batches.
The district contracted Panorama to help in the replacement of its existing systems with a proven, commercial-off-the-shelf ERP system. The client undertook this initiative to replace aging systems, gain efficiencies and update existing processes. Another goal was to improve the timeliness, accuracy, safeguarding and consistency of information
The client was moving from manual processes and old systems to a modern system, so their employees faced a big learning curve. Unfortunately, their ERP vendor only provided them with a “jump start” program that only covered particular deliverables and activities. For example, they provided an overall communication approach but not a communication plan.
Not long ago, this global organization had implemented an ERP system across several aerospace and defense manufacturing plants. It was now considering an upgrade to the latest version of the system. However, the organization knew its end-users were still struggling to adopt the changes instituted by the prior initiative. Panorama deployed two organizational change management experts
The organization was founded in 1981 as a nonprofit, tax-exempt 501(c)(3) organization. It does not just encompass a non-profit organization but also encompasses a for-profit company that has a different fiscal year. As such, the organization must focus on tracking, reporting and financial record keeping – including tracking grants and gifts from contributor to the end-product or support delivered.
Panorama was engaged by the city to select and assist in the implementation of a new ERP and related systems. Framed as an initiative to bring a high “return on citizenship” (the amount and quality of services received for taxpayer dollars) to the city’s constituents, the project’s goal was to implement a platform that would provide the same (or better) quality
The city had been using a decades-old ERP solution and had not evaluated their business processes at any point during that time. Not only was the current ERP system not the best fit for their municipality, but the city was spending an inordinate amount of money on maintenance costs for customization and did not take advantage of instituting best practices or current technology.
Vertical integration allows the company to control all aspects of beef production. It partners with ranchers and operates feed lots, ensuring cattle are fed to their standards. In addition to its processing capabilities, the company operates its own trucking line, providing products from farm to table. The company supplies beef to the US retail grocery and foodservice markets, federal school lunch programs and the US military worldwide.
Mobius Consulting is a Mobile and Wireless Technology management consulting firm. The industry and academic professionals at Mobius offer diverse services leveraging their extensive experience and expertise in enterprise and vertical markets including telecom, healthcare, energy, transportation, government, supply chain and logistics.
Principal, Jacob Sharony, PhD, MBA, has over 25 years of experience in Mobile and Wireless Technologies. He is currently an adjunct professor at Columbia University, teaching wireless technologies and applications. He also served as a faculty member of the electrical and computer engineering department and director of the Center of Excellence in Wireless and Information Technology at Stony Brook University. Dr. Sharony held engineering and management positions in diverse technology disciplines at Time Warner Cable, Motorola, BAE Systems, NEC Research Institute, and IBM Research. He has over 50 US patents (pending and issued) and has served on several government expert panels. Dr. Sharony has also published extensively in scientific journals and conferences.
Jason McDonald, PhD, is an accomplished Search Engine Optimization (SEO), Google Ads (AdWords) (PPC), and Social Media Marketing professional - teacher, corporate trainer - with over 20 years of expertise in online media. Dr. McDonald works to strategize with clients all over the world. His consulting services include:
Search Engine Optimization
SEO Page Tags, Density, etc.
Link-Building Campaigns
Landing Page Optimization
Google AdWords / PPC
Ad Strategy vs. Marketing
Campaign Set up & Copywriting
Google Analytics & Metrics
Social Media / Online PR
Twitter, Facebook, LinkedIn
Youtube & Google+ Marketing
e-Newsletters & Press Release
Background Experience - With a BA from Harvard and a PhD from Berkeley, Dr. McDonald began working at a number of San Francisco Bay Area start ups, ranging from Omnibus, Computer Currents, and MW Media. He also wrote freelance for many years with articles appearing in trade journals and press such as EE Times, Dr. Dobb’s, and Software Development Forum. In 1995, he left MW Media and was one of the co-founders of eg3.com.
Today, Dr. McDonald is Senior Editor for content at eg3.com and is responsible for website coverage (keywords), the monthly newsletter, and the series of Insiders’ Guides on topics from RTOS to FPGAs. He also is the Senior SEO Director at the JM Internet Group. The author of the best-selling SEO Workbook, Google Ads (AdWords) Workbook, and Social Media Marketing Workbooks on Amazon, Dr. McDonald currently teaches at Stanford University Continuing Studies and has taught in the past at the Bay Area Video Academy (BAVC), and AcademyX in San Francisco, California.
This book covers 'On Page' and 'Off Page' SEO, the 'new' content marketing, blogging, link-building, social media SEO (including REVIEW MARKETING on GOOGLE and YELP) and every other esoteric technical tactic in plain English for mere mortal such as GOOGLE SEARCH CONSOLE and GOOGLE ANALYTICS.
This book is a your step-by-step guide on how to market your business on social media, with up-to-date information on how to market on all of the major social media platforms.
This fun-filled Toolbook will identify so many free tools you'll soon have your head spinning. With joy. With elation. With the smug satisfaction that while your competitors are either clueless about social media marketing or paying for high-priced tools produced by self-satisfied smarty pants, you (my friend) will be using FREE tools to create FREE marketing programs on everything from Facebook to Instagram to Pinterest to LinkedIn and more.
Isaak Technologies provides expert witness, consulting & training services in the areas of design, construction, procurement, implementation, commissioning and operations of information technology, telecommunications, network systems and critical data center facilities. Isaak Technologies provides clear solutions to complex challenges using best-practice forecasting, strategy & risk mitigation.
Philip J. Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE, has over 20 years of experience as a design & operations consultant & training provider, with a focus in the information technology, telecommunications & critical data center facility industries.
In recognition of Mr. Isaak’s professional standing, the Officers & Board of Directors of the Institute of Electrical & Electronic Engineers (IEEE), the world’s largest professional association for advancement of technology, certified his election to the grade of Senior Member, a level only 9% of IEEE’s over 400,000 global members hold.
One of the new terms in the data center industry is Edge Data Centers. What is the Edge? Where is the Edge? Before we begin to understand what an Edge Data Center is, it might be helpful to first understand what it is not.
Internet Expert Witness: Peter Kent is the author of "Search Engine Optimization for Dummies," "Pay Per Click Search Engine Marketing for Dummies" and "Complete Idiot's Guide to the Internet." He has been online since 1984 and envolved with online marketing since 1990. Mr. Kent has worked as the Vice President of Marketing for a Web-applications development firm. He was also the Vice President of Web Solutions for a national ISP and the founder of a VC-funded e-business service provider. He has a wide range of Online-Marketing experience in many different industries.
So you want your Web site to rank #1 on Google, eh? Well, get in line! Oh, you want to do it for $50 a month? You've seen emails claiming you can do that? Sure, and I'm selling some seaside property in Glenwood Springs.
A clear understanding of search engine optimization (SEO) is essential if you want your Web site to appear high in search results. This straightforward-but-fun guide provides you with a clear understanding of how you can use SEO as a key strategy for online marketing. After discussing search engine basics, SEO expert Peter Kent shares tips, tricks, and advice for making your content appealing to search engines.
Electronic Information Consultant C Matthew Curtin
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
David Peterson, is a well-recognized ebanking pioneer, with a national reputation as a subject matter expert in Financial Technologies and Electronic Payments. i7strategies was formed to assist companies in the financial industry with determining and achieving their goals. Companies in need of assistance in determining or refining their goals will benefit by using i7strategies for strategic planning.
Our expertise lies in gathering all relevant information and working in conjunction with company executives to “boil down the issues” to reach the critical strategic goals which are crucial to the organization’s success. This “distilling” process can take the form of a brainstorming session, a multi-day strategic planning session, or an ongoing commitment to annual planning with quarterly or monthly follow up.
In certain circumstances, a company will wish to add to its existing talent base to satisfy a short-term but vital need. i7strategies can provide specific expertise across a wide range of operational and management categories, providing timely and focused consulting. By “instilling” targeted subject matter expertise, i7strategies gives companies the ability to avoid lost opportunities and operational errors.