What’s old is new again: Hardware and software time slices
When computers took up an entire room, programmers received time slices. Then subscriptions became the fad. Now? We're seeing both models. Is one better?
When computers took up an entire room, programmers received time slices. Then subscriptions became the fad. Now? We're seeing both models. Is one better?
Garnet River announced Jon Avery has been appointed IT Systems Engineer and will support the continued growth of its IT Infrastructure and Security division.
Garnet River CEO and Principal Consultant Steve Richards has been involved in hiring many CIOs. As a manager and adviser, here are patterns he's seen worth talking about.
RPA automates repetitive and rule-based tasks. AI enables machines to perform cognitive tasks. Together, RPA and AI can transform your organization.
We created an attended bot that allowed coaches to quickly and easily search through a nationwide database to find high school students that met the team’s desired qualifications for recruitment. A pool of prospects was built in hour.
After an initial assessment, we worked with the onsite administrator to remove obsolete software, defective hardware, poorly working antivirus, and inadequate backup systems. We then began Co-Managed IT Services and provided CTO level guidance on new projects and initiatives.
We created an attended bot, which relies on human intervention for some steps, to gather the necessary information and format it into a standard template to distribute two weekly compliance reports to senior executives. The bot saved four additional hours per week.
Security as a Process (SAAP) and the classification of information is fundamental to information security. This article, the second in a three-part series, looks at the "how" of information security and why it is so important.
The governance pyramid is built bottom-up with policy, standards, process, procedures, and guidelines. To be effective, the structure needs to be organized, consistent, and aligned with to policy and business need.
Information security is a multifaceted field, covered with tempting baubles and sharp thorns. The unifying framework is governance. This article, the first in a three-part series, looks at standards and policy.