Image Resources
The Software Development Grenade
When conflicting motivations and processes between teams within the IT department clash, a grenade triggers causing quite a large range of destruction.
Image Resources
The Ten Zones of Enterprise Cloud Security
These ten zones can help you keep track of information security when dealing with cloud service providers.
Image Resources
The Other IaaS: Insights as a Service
If you don’t have time to learn a new platform or budget to hire a full time data analytics staff, an Insights as a Service provider can help implement Power BI dashboards, Azure Data Platform, and similar tools to deliver real business insight.
Image Resources
The Lowdown on Load Balancing | Blog
Learn how load balancing is used to scale IT infrastructure and keep applications available, plus what's different when everything is virtualized.
Image Resources
The InfoSec Threat Lineup: Biggest Threats from 2019
A motley crew of attack vectors are waiting to be leveraged against your corporate systems. Here’s our lineup for the nastiest InfoSec baddies of 2019.
Image Resources
The Internet of Things | Blog | Green House Data
The idea of the Internet of Things is complete automation of communication between all things, removing the need for any human-to-human communication.
Image Resources
The Key Habits for Great Customer Service: Empathy and Reassurance
GSC Systems Analyst Daniel Williams explains how empathy and reassurance make customer service interactions more positive for all involved.