
What’s in a Name? Re-branding IT.
Many people seeing IT as different things, but in today’s age IT is critical to existence and prosperity of your business. Re-branding IT is an important step to create that business partnership.
Follow My Blog
Get new content delivered directly to your inbox.
Many people seeing IT as different things, but in today’s age IT is critical to existence and prosperity of your business. Re-branding IT is an important step to create that business partnership.
WastedLocker went deep into the kernal to avoid AI. What is the next new security tool?
Social Media is a critical infrastructure that has profound effects on our democracy. Can we secure it from threats?
Facial recognition isn’t an evil technology, it just needs to be applied correctly.
Facial recognition leads to further social inequality – without a doubt!
There is a fine line between security of our community and the privacy of an individual. How does facial recognition toe that line?
Starlink brings the power of the datacenter to the remotest edge of our World. What can we do with it?
Rural towns are not built for large population influxes. How will Starlink change the way rural towns vision their growth?
With Starlink going beta, will the “Rural Divide” disappear?
How can you build your security strategy on Trust!
Architectural Design for Citrixt SMB VDI environments
If you are not deploying VDI, you are incurring opportunity costs and increasing your risk.
Understand a technology’s capabilities, or lack thereof, before it creates a large and expensive headache.
How do we protect the edge of our Network? Here are 6 techniques.
Using Machine Learning, and the normality of network usage against the hacking community.
Understand how VDI buys you TIME against ransomware.
Learn how partnering old and new communication technologies can improve resiliency and reliability in a SCADA deployment.