Our Expertise

Our Expertise

Learn how Olenick Advisory, a custom Olenick solution that leverages Artificial Intelligence to continuously monitor the Internet for threats, can help your business.

Click to view this webinar by Patrick Torralba and Igancio Elia that highlights testing mobile applications to ensure functionality and usability especially as mobile use has increased.

This second article in Ken Stawarz’s series on Data Migration and ETL testing focuses on the importance of data quality to ETL processes.

Olenick completed a RPA proof of concept for a Illinois Credit Union resulting in a reduced time to complete processes in scope from 50%-80%, through RPA solution​.

Read the third article in Associate Flip Nehrt’s 5 part series on Defect Management, which focuses on Training and Verifying.

Any organization that connects to the Internet owes it to themselves to do a vulnerability assessment. Learn why this practice is critical to cyber security.

Read the second in Associate Flip Nehrt’s 5 part series on Defect Management, which focuses on setting up your Defect Repository.

Read the first article in a series by Senior Associate Ken Stawarz on ETL, Data Conversion, and Data Migration.

View this webinar by Senior Consultant Steve Woods, featuring visually impaired internet user Diane Marks, to learn the importance of Digital Accessibility and how to test for accessibility.

The first article in a 5 part series on Defect Management by Olenick Associate Flip Nehrt.