Using Social Media to Block Cyberattackers
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
Working with such a diverse group of companies and agencies means becoming creative in the ways that I tie in everything together.
With so many people teleworking and working in virtual environments, you need to make every opportunity for personal interaction count. That means having an elevator speech that flows effortlessly off your tongue.
What else has gone the way of 8-track tapes and the Rolodex?
We see the explosion of GIS with the advancements in technology. Do you know how often you use GIS?
Here are three times that it’s particularly important to communicate actively, instead of letting your silence speak for you.
For starters, if you need long term care, consider what it will cost. Here are a couple of good resources to help you forecast LTC expenses.
Now, in anticipation of the upcoming school year, don’t get overwhelmed unnecessarily. It is possible to stay ahead of the curve and minimize stress during the week. To do so, consider any or all of these practical tips.
Recently, I sat down with an associate analyst (AA) in state government to talk “shop.” Here’s how the conversation went.
The difference today, of course, is that Linux and open source software in general have evolved from a “hobby” to preferred solutions for many organizations, including government agencies.