Since schools transitioned to remote learning, districts have added or upgraded their IT education technology and monitoring tools to provide better outcomes for all. But it’s not necessarily a good…
With the Biden administration considering the enhancement of national cybersecurity a top priority, learnings from the sophisticated attack on SolarWinds help highlight the need to collectively improve the prevention, management,…
William Hurley (or “whurley” as he prefers to be called) is a philanthropist, entrepreneur, and open source advocate, whose work at Apple, IBM, and in the area of quantum computing is world-renowned. Picking…
William Hurley (or “whurley” as he prefers to be called) is a philanthropist, entrepreneur, and open-source advocate, who’s achieved what many geeks only dream of, including critically recognized work at Apple, IBM, and CERN. He’s started and sold…
As organizations marshal their data to drive business value throughout the enterprise, it’s becoming more important than ever to ensure the quality of this data. Building data quality, data validation testing, and…
So, you have an interview lined up for a sweet new gig as a SQL Server database administrator (DBA). What interview questions will you be asked? How can you make…
As cyberattacks become more sophisticated across ever-expanding attack surfaces, it’s easy to assume the security team will take care of risk management and mitigation. Indeed, employees—both within the agency and…
Putting machines to work to enhance our everyday lives has been well-ingrained in our society for at least a couple of centuries now. IT workers use machine learning (ML) in…
International Podcast Day began in 2015 to celebrate the audio medium around the world. The day is meant to acknowledge and appreciate all who make podcasting possible—from the hosts to…