Quantcast
Channel: Expertsourcing® » Technology Management
Browsing latest articles
Browse All 5 View Live

So what does vigilance look like? IE security flaw reminds us – vigilance...

I heeded the call, I left Windows XP behind after all those beautiful years together! Now that we find ourselves squarely on the other side of Windows XP “End of Life” Support, a vulnerability is...

View Article


Image may be NSFW.
Clik here to view.

It is time to Rationalize that App – It’s costing you money and you need to...

I shared an article last week on LinkedIn about Application Rationalization – basically a process that gets to the heart of “Is this application being used? How and Why?” This is a process that should...

View Article


Image may be NSFW.
Clik here to view.

The technical proficiency imperative for firm profitability & client...

2015 budget planning is just around the corner and preparation of next year’s IT initiatives and spending is going to take some serious reflection and soul searching. If not, then you’re doing it...

View Article

Shellshock Bash Bug Alert

Am I Vulnerable? For most of our clients the main impact of this vulnerability will be to personal MacBooks, iMacs and Mac Pro devices but this bug also applies to firewalls, routers and even webcams....

View Article

Image may be NSFW.
Clik here to view.

IT Time & Budget Hogs – Where does all the time (and money) go?

Over the past 20 years we have seen IT emergencies, natural disasters and cultural phenomena that gobble up IT time and resources. As we work on budgets and update IT strategic plans for 2015 we...

View Article

Browsing latest articles
Browse All 5 View Live