Our Services Deliver Crucial Influence Within Your IT Projects, Operational Support, and All Aspects of Measurement for Overall IT Governance.
The Olenick Toolbox
Olenick has developed and honed an extensive set of tools that improve productivity and engagement impact for our clients.
Know Thyself: Why Your Organization Needs a Vulnerability Assessment
Any organization that connects to the Internet owes it to themselves to do a vulnerability assessment. Learn why this practice is critical to cyber security.
Defect Management: Setting Up Your Repository
Read the second in Associate Flip Nehrt’s 5 part series on Defect Management, which focuses on setting up your Defect Repository.
ETL (Extract, Transform, Load), Data Conversion, Data Migration: What’s the Difference?
Read the first article in a series by Senior Associate Ken Stawarz on ETL, Data Conversion, and Data Migration.
Watch the Webinar: “Addressing the Growing Need for Digital Accessibility”
View this webinar by Senior Consultant Steve Woods, featuring visually impaired internet user Diane Marks, to learn the importance of Digital Accessibility and how to test for accessibility.
Defect Management: What Is It, and Why Do We Need It?
The first article in a 5 part series on Defect Management by Olenick Associate Flip Nehrt.