OK, folks. Let’s be real for a moment and acknowledge that everybody, every professional, and definitely every vendor out there is tossing out the phrase “IoT” like flyers on the…
A few weeks after I started with an insurance company as a rookie COBOL developer, Hurricane Katrina made landfall on the Gulf Coast and New Orleans. Because I worked for…
In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For…
Have you ever had a colleague who waited year after year for a promotion that never came? Or worse, have you BEEN that person? You’re not alone. Many IT professionals…
Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to…
I started in the IT industry in networking. I had a negative experience in high school trying to learn computer programming*, so I was relieved route/switch had much less to…
Have you gotten the call/email/text yet? You know, the one where your mom tells you the printer is making a weird noise. Normally you’d reassure your mom it’s probably a…
We all know how important communication is. For it to be effective, it depends on factors including its presentation, the tone, details of the message, and even non-verbal cues like…
Let’s look at your phone for a second. Do you have the newest model? If not, you probably know someone who does or who’s waited in line overnight to get…
The DOD cloud strategy recognizes the department’s disjointed and siloed systems have negatively impacted the effectiveness of warfighters, decision makers and staff. According to the strategy, only cloud computing will…