Cyber Security Responsibilities for Your Organization

Does your CFO know how to wire in a new Ethernet jack in a meeting room? Can your net tech read a P&L? If you are in an organization like 99% of those in the world, the answer to both questions is probably, “No”. Just as your employees have different responsibilities with respect to the […]
Read More ›

Does Cybercrime Differ from Physical Crime?

Today’s post is a bit different than my previous posts. The idea is to engender discussions within teams or other groups. Below I present a scenario and some questions about it. The scenario focuses on the week 3 topic (Cybercrime) of National Cyber Security Awareness Month. Imagine a small town or village: a place with […]
Read More ›

How Does Power BI Fit Into My Business Intelligence Plans?

Things change pretty fast in the business intelligence arena. Terms can change pretty fast, too. A little more than a year ago, many people used the phrase “Power BI” to refer to Excel Add-Ins of particular interest in BI, notably Power Pivot and Power Query. Now, the same phrase refers to a distinct and separate […]
Read More ›

Why Personas and Scenarios Matter in User Experience Design

Why does user experience design depend on understanding users and their scenarios? Because it’s just like buying a house. Every once in a while, I’ll be working with a client on a UI design and they’ll get tired of me badgering them with questions about the application’s users, goals, mental models, and scenarios. It’s easy […]
Read More ›

What Does the IANA Transition Mean for Us?

When I first worked with TCP/IP and the ARPAnet, there was no DNS. When one wanted to connect to a computer by name, the system looked in a table called “HOSTS.TXT” to find the IP address corresponding to the name. The growing file had to be downloaded every few days from a “nearby” host that […]
Read More ›

Type to search

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.