On Guard!

4 minute read “In this business, by the time you realize you’re in trouble, it’s too late to save yourself. Unless you’re running scared all the time, you’re gone.” ~Bill Gates Relentless hackers infect millions of personal records by exploiting a tiny hole in the protective wall surrounding the Internet. A mid-level analyst, frustrated that…

Razing a Legacy System

5 minute read “Decommission the legacy system” is one issue that never seems to get priority on the agenda.  Month after month, this major decision sits in the old business category, dwarfed by the other initiatives. With an excitement factor of zero, and a tenuous link to business goals, the prospect of investing precious IT…

Protecting the Fortress

[toggle title=”Enterprise Security – Part 1 of 2″]The first of a two-part series discussing enterprise security reviews major tactics employed today, cautions about limitations, and highlights the data that can be collected from each. In Part 2, we’ll lay out strategies for using that data – in new ways – to achieve high-level enterprise security. [/toggle]…

The Fundamental Techie

2 minute reader It’s a seller’s market when it comes to top IT talent. As enterprise technology has quickly occupied a larger and larger piece of the organizational asset pie, the technology recruiting scene has become more and more competitive. The Society for Human Resource Management released survey results last year that confirmed what we…

The Technical Debt Trap

5 minute read Back then – it was just what you needed. You built a good looking website to front your business, and customers used it like the Yellow Pages. It was your online corporate brochure. But what was cutting edge just a few years ago is now common, and may convey the wrong message…