The Benefits of BYOD

4 minute read

We are a society that thrives on our personal and mobile devices—they are no longer additions to our personas, but extensions of them. We are intimately connected to our personal technology. So it makes perfect sense that the “Bring Your Own Device” (BYOD) movement has brought the relationship between personal…

Continue reading →

What’s the Big Deal About Big Data?

2 minute read

Big data is big business. Trillions of bytes of information are generated everyday by businesses large and small. And right in the middle of the big data picture are consumers as they browse, shop, share and communicate both online and offline.

Business leaders are now faced with a new challenge of…

Continue reading →

Enterprise Mobility – Doing It Better

3 minute read

“To better the world through information technology.” We take our mission seriously, especially when it comes to making our client’s world better. But what exactly does “better” mean? Working smarter? Faster? More efficiently? Expanding sales opportunities? The best technology strategy can only be developed once objectives are clearly understood.

As mobile…

Continue reading →

How Skynet Could Terminate an Enterprise Zombie Apocalypse

“I’ll be back.”
~ The Terminator

Part 1 of this series on enterprise security explored 6 IT tools and tactics that safeguard…

Continue reading →

On Guard!

7 minute read

“In this business, by the time you realize you’re in trouble, it’s too late to save yourself. Unless you’re running scared all the time, you’re gone.”

~Bill Gates

Relentless hackers infect millions of personal records by exploiting a tiny hole in the protective wall surrounding the Internet. A mid-level analyst, frustrated that…

Continue reading →

Protecting the Fortress

The first of a two-part series discussing enterprise security reviews major tactics employed today, cautions about limitations, and highlights the data that can be collected from each. In Part 2, we’ll lay out strategies for using that data – in new ways – to achieve high-level enterprise…

Continue reading →

Geek Speak

14 minute read

Jody Giles is the Chief Information Officer at Under Armour and Loyola University of Maryland Sellinger School of Business Lattanze Executive of the Year for 2013. Jody has made his mark as a strong leader who instinctively understands the specific ways that technology supports business goals, and he…

Continue reading →

Making Music

7 minute read

I didn’t know if I should try to look cool when I sat down across from Paul Reed Smith. He’s the CEO of PRS Guitars, a fine mark of craftsmanship and innovation based right across the Bay Bridge from Annapolis on the eastern side of the Chesapeake. I…

Continue reading →

Who’s in Charge of Your Data?

4 minute read

Data is not just for collecting and reporting; and if treated as a strategic asset, data can produce some game-changing business results. But who pilots the enterprise’s data strategy in order to fulfill its business objectives?

Who is Data’s Boss?

Let’s consider for a moment what organizations large and small need when it…

Continue reading →

Why You Should Invest In Keeping Attackers Out

9 minute read

Cybersecurity isn’t a line item or a project—it’s an Information Age imperative. Sophisticated digital defense aims to match the human body, with hardware and software doing digitally what biology does chemically—sorting the pernicious from the beneficial, while keeping systems running at light speed.

Continue reading →