In this CIO Drive article, Samantha Schwartz outlines the key areas to focus on when presenting security issues to the C-Suite. While presenting this information to the C-Suite is important, many times this presentation lacks information on the impact on the bottom line. This doesn’t translate well when threat levels need to be acted upon in different ways.

Curious about how Hackathons can benefit our society? Check out this blog post on Charitynavigator.org for a quick intro! Charity Navigator is one of the larger and more trusted non-profit assessment organizations in the U.S. PC World says, “Consider it [Charity Navigator] the Consumer Reports of the nonprofit world.”

In this article (a few ads), Jody Medich outlines edge computing means to the success of IoT (Internet of Things). Typically, “edge” computing still had some reliance on the cloud, but further advances in machine learning (ML) make it possible for IoT devices to process data in areas without internet connectivity. Couple this with AI, and even more gaps are filled.

Let’s discuss the basic principles for data repair in Dynamics GP along with how to repair the most common issues! This webinar will cover which method is best in various circumstances, etc.​

Good insights start with good data, and knowing what data to pull from your BC / NAV system, and how, makes all the difference. There are a lot of options available – XMLports, RapidStart Services, OData feeds, Excel – but what should you and your users employ for which purposes? We’ll start with real examples of each, then drill down into RapidStart to ensure you have a thorough understanding of this invaluable tool. We’ll address when and when not to use Configuration Packages, a step-by-step guide of how to create and modify Configuration Packages, and how to use the Configuration Worksheet.

Some companies have allowed a large number of workers to work remotely in the past, others have not until the Coronavirus arrived. Security and access to data, like the rest of your business processes in these challenging times, needs to now be looked at a bit differently. In this webinar, we will review the steps you and your company can put in place to ensure application and user security is not compromised with a remote work force. The good news is that more than likely your company probably has many techniques in place already, or in place and ready to easily implement. However, there are some controls that are often overlooked, and a since ‘a chain is only as strong as its weakest link,’ it is critical all security controls are addressed accordingly. We will highlight these commonly overlooked controls as well in this webinar. ​​