All Research

Inventory Management Maturity Self-Assessment

Assess your current-state inventory management maturity to identify steps to graduate to the next level.

Advanced Inventory Management Storyboard

Use our advanced inventory management playbook to get your customers what they need, when they need it.

Advanced Inventory Management

This research explains how technology-led inventory management adds to the agility and resiliency of modern supply chains. For inventory management to be effective, a new...

Turtles All the Way Down: ChatGPT, LLMS, and the Use Cases for Semi-Smart AI

The public release of OpenAI's ChatGPT has caused quite a stir, to put it mildly, and led other companies to follow suit. This week's issue covers just what these tools...

Integrate Physical Security and Information Security Communication Deck

Use this communication deck template to present the results of the integrated security plan to stakeholders. This information security communication deck will help ensure...

Integrate Physical Security and Information Security RACI Chart Tool

Use this tool to identify and understand the owners of various security integration steps across the organization. This RACI chart will help clearly define each area's...

Integrate Physical Security and Information Security Requirements Gathering Tool

Use this tool to map organizational goals to IT goals, facilities goals, OT goals (if applicable), and integrated security goals. This tool serves as a repository for...

Integrate Physical Security and Information Security Storyboard

Use this deck to integrate physical security and information security. The essential initial steps are to engage stakeholders and justify value for the business, to...

Using AI to Decode Whale Communications: A Conversation with Roger Payne and Daniela Rus

This month we lost one of the greatest voices in celebrating whales and ocean health: Roger Payne. In his honor, we are sharing a transcript of a previously unpublished...

Integrate Physical Security and Information Security

Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us