Are you a founder?

On a recent flight from the west coast, I watched a biography, The Founder, about Ray Kroc, the founder of McDonald’s. Kroc was a middle-aged, struggling blender salesman with a history of entrepreneurial failures. He came across the McDonald brothers after they order some blenders. The McDonalds were running a small, popular hamburger stand in […]

What’s in your stack?

You may have heard various computer people throw around the s-word. A stack, in IT terminology, usually refers to a solution stack. Any software application, whether it’s your website, email client, favorite iPhone app, or your online CRM, is developed and run on top of a set of standardized, prebuilt, building blocks. These building blocks, […]

Your Personal Password Plan

A few days ago, Yahoo revealed that a suspected 2014 security breach generated enough media to give us a much-needed respite from the presidential campaign. Some simply recycled the same old password resetting advice, some boldly predicted apocalypse, and some entertained us with CYA articles from within Yahoo. Leaving behind the hyperbole, the only certainty […]

The Problem with Microsoft OneDrive

Since its inception in 2007, Microsoft OneDrive for Business, a cloud file sharing tool, has been plagued by marketing missteps. Given Microsoft’s Azure and Office 365 excellent launches into the cloud space, OneDrive’s inability to gain market share among IT departments or consultants is a head-scratcher. Compared to its main rivals Box, Dropbox, and Google […]

Blockchain: change is coming

Few people outside of the tech industry have heard of blockchain, which is the technology behind Bitcoin. Many technology experts believe that over the next decade, blockchain will revolutionize how we do business. Today, almost all business transactions, whether paying a vendor, buying an item on eBay, or trading stocks, take place through an intermediary […]

The Weakest Link in your Company’s Security Plan? It’s You

Best practices for cybersecurity at small-medium sized businesses (SMB) usually focus on network security, operating system patches, password management, and monitoring. While these practices are important components of every security plan, the lowest-hanging fruit for potential attackers has shifted over the last few years. As more businesses have moved their email servers and other sensitive applications […]