Virtual Wine Event

Magenic Private Wine Event

Duration: 60 Minutes

John Doucette

VP Consulting, Magenic Technologies, Inc.

Rachel DeAmbrose

James Beard Award Winning Sommelier

Wine Event with Professional Sommelier & Magenic

September 17, 4:00 PM ET

Join Magenic for a live event with award winning, professional sommelier Rachel DeAmbrose.

You can expect to:

  • Be submersed in the fundamentals of vinification and fine wine appreciation
  • Master the art of fine wine pairing
  • Interact with Rachel throughout

Business Agility and Customer Centricity are the fuel of a company's digital transformation. How are you accelerating?

In this session John Doucette explores the necessary mindset and a way of doing business that focuses on creating positive experiences for the customer through the full set of products and services that the enterprise offers.

Customer-centric businesses generate greater profits, increased employee engagement, and more satisfied customers. As Product Managers and Owners in the business, how can they participate with technology teams to improve and accelerate outcomes based on these principals?

  • You will gain an understanding how to articulate the Product Owner and Product Manager role
  • Learn how to apply Lean-Agile principles and values to the PO/PM roles
  • Discover how to collaborate with Agile teams in estimating and forecasting work

Speaker: John Doucette, VP Consulting, Magenic Technologies, Inc.
John Doucette is the VP of Consulting Operations at Magenic, with responsibility for consulting delivery and business growth throughout Magenic’s eight US regions. John helps clients overcome challenges they face in developing enterprise software solutions. With his broad industry, organizational and technology perspectives, the entrepreneurial-minded Doucette is a recognized expert in software development lifecycle management, with several national speaking credits and publications to his name.

Sponsored by
Stay up to date. Get Reminders for this event.
Featured Webinar
Data Protection for All Types of Workloads