OUR
WORK
Making the light infantry even lighter (Article for Saab)
With threat scenarios becoming more and more complex, today’s light infantry needs to be more flexible and more manoeuvrable.
The five stages of property development (DGI)
There’s plenty of interest in buying and selling distressed property. But what are the mechanics of the process? DG Institute Founder Dominique Grubisa outlines the 10 key steps to flipping houses, and explains how you can make a profit while helping the property owner solve their financial problems.
How to flip property (DGI)
There’s plenty of interest in buying and selling distressed property. But what are the mechanics of the process? DG Institute Founder Dominique Grubisa outlines the 10 key steps to flipping houses, and explains how you can make a profit while helping the property owner solve their financial problems.
Five appealing reasons to become a property developer (Article for DGI)
With property development workshops springing up around the country, the sector is increasingly popular with people changing careers. Here, DG Institute Founder Dominique Grubisa outlines five reasons why you might want to become a property developer.
The benefits of 2FA (Blog for Nexus)
IT departments across all industries are fighting a constant battle to protect company networks from hackers and fraudsters. Two-factor authentication (2FA) is an effective – and increasingly important – weapon in the IT manager’s armory.
The problems that IT departments are struggling with in 2018 (Blog for Nexus)
There was a time when the main concerns for IT departments were the rate of resolution for helpdesk tickets, the cost per ticket, and user satisfaction
Three ways of building a cost-efficient and secure IT management system (Blog for Nexus)
IT departments are being asked to do more with less, despite a growing list of challenges and threats. Under such circumstances, it is vital that IT management systems are optimized to reduce costs while ensuring security.
Why you should care about shadow IT (Blog for Nexus)
Shadow IT isn’t new, it’s as old as IT itself. It’s what happens when frustrated users bypass official channels and deploy their own technology to help them get things done. In the process, they often store critical business data beyond the reach of IT departments.
A family affair (Via Appelberg)
With a connection to Saab’s Giraffe radar stretching back 30 years, Peter Andersson is well placed to talk about the advantages of the system.