Menu
Log in
Log in


Tech News Blog

Connect with TECH NEWS to discover emerging trends, the latest IT news and events, and enjoy concrete examples of why Technology First is the best connected IT community in the region.

Subscribe to our newsletter

<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 
  • 04/25/2024 12:32 PM | Marla Halley (Administrator)

    *SMACK!*

    Stop it!  Stop it right now!

    *SMACK!*

    We all know the classic Hollywood trope: the heroine stands her ground in front of the false threat”. In the face of her unexpected authority and steadfast agency, that threat suddenly comes up short (and to great comic effect!).  From there, what initially presents itself as an insurmountable obstacle to the heroine s journey transforms into a loyal and steadfast ally for the rest of the plot.  Think: Dorothy and the Cowardly Lion, or Cher and Nicolas Cage, or Kagome and Inuyasha. 

    If only life would work like that.  If only our work would work like that.

    There are a lot of lessons to be pulled out of these stories: team building, change management, system transformation, etc.  But there s a warning here, too.  A warning that gets glossed over too often and leads to a lot of failed team building, change initiatives, and system transformations.  The warning of the Magic Bullet Mentality - mistaking the resolution of the false threat” for the solution of the real problem.

    Everyone falls for the Magic Bullet at some time; most times, multiple times.  Do this one thing!” “Make this one change!” “Install this one tool!” Too often, especially in Information Technology, the Magic Bullet Mentality leads to buying and installing some very high-priced (and, therefore, high-visibility) tools that fail to live up to their promises.  And what do you have to show for it all?  A big hole in your budget, a burned out support team, and a lot of angry questions from your business leadership.

    So, if we are all susceptible to the trap, how can we avoid this ‘magic bullet’ thinking?  Even better, is there a way to rescue a deployment that obviously started with a ‘magic bullet’ in mind?  There are three questions to ask, right now, to help:

    1. Do you have a “Process Map”?

    Process mapping might not be the latest buzzword, but it’s darned important nonetheless.  And the sooner the process mapping is done around the existing tool, the better.  That’s right; the existing tool.

    Too often we’re so enamored with the promised benefits of the new tool, we want to skip to the end and not do the due diligence necessary to map out the work ahead.  But how else can one ensure new tooling will successfully take over the job of the old one, if you can’t describe the work the old one was doing?  You can’t.  You need a baseline to measure against.

    The Process Map as a baseline has another benefit.  Once completed, a savvy project manager can take it, break it down into the individual components and efforts, and build a much more effective project plan.  And a project manager with a proper project plan will be much more likely to succeed.  Already started the project and don’t have the Process Map completed? 

    *SMACK* “Shame on you!” - Dorothy Gale, Wizard of Oz (1939)

    2. Do you have a “Data Map”?

    Data mapping is a newer buzzword, but it is not the same as a Process Map.  A Process Map charts the relationships between business functions and processes.  It provides insight on: which departments are responsible and accountable for what activity, who gets informed or consulted about those results, and what needs to happen before and after.  A Data Map describes the flow of information between the various systems and technologies described in the Process Map, down to the individual data attributes. 

    Consider an example.  Three teams work together to procure hardware and software assets: Vendor Management, Purchasing, and IT Service Management.  Each uses different tools to do their jobs and coordinate using email, chat, and excel charts.  The Process Map will show how these teams work together, and how a new ERP system could provide response and operational efficiencies.  The Data Map would show that the Service Management team needs cost center codes and project number data in order to keep break/fix inventory separate from capital expensed equipment.  And, come to find out, that new ERP system requires a whole separate financial module to be able to handle that demand.

    Let me guess.  You already started the project without a data map? 

    *SMACK* Snap out of it! - Loretta Castorini, Moonstruck (1987)

    3. Have you done a “Feature Analysis”?

    To be fair, the issue exemplified above could also have been noticed with a proper Feature Analysis.  Nobody likes doing them, but the money and heartache that can be avoided by making sure the right tool is chosen cannot be stressed enough!  A Feature Analysis goes beyond merely sitting through a boring sales demo, or copy/pasting the feature comparison from gartner.com .  The Feature Analysis lays out the manufacturer’s plans and roadmaps for future features, prices out the cost of support services and discounts offered, interviews and investigates other customers’ satisfaction with the tool and implementation.  The Feature Analysis will also draw direct connections between issues internal clients are having with their existing tooling and the features offered by all the other tools being considered.

    Unfortunately, a Feature Analysis will not be of much good if the tool has already been purchased.  But if you are still in the planning stage?

    *SMACK* “Sit boy!” - Kagome, Inuyasha (2000)

    BONUS QUESTION: Consider a third-party consultant?

    The idea of bringing in a third-party consultant - in addition to the internal technical personnel, the manufacturer’s technical resources, project manager, stakeholders, etc. - gives the feeling of ‘too many cooks in the kitchen.’  However, if the installation project is already in flight and there is a high degree of “magic bullet” thinking, a third-party consultant can be just the solution. 

    The manufacturer’s provided resources are really there for one goal: to complete this installation to the client’s satisfaction (or contractual obligation).  Usually, they will be running a script, checking boxes, and only provide specific solutions to specific technical challenges that arise.  They will not be able to make suggestions surrounding process changes, data flows, internal responsibilities or external accountabilities.  The internal team might know the ins-and-outs of the current platform, policies, and users.  But they might not have the experience with large digital transformations and the challenges the new tooling will present.

    A third-party, independent consultant can provide the experience and guidance to help both the internal and external teams succeed.  An experienced consultant will have actively participated in a number of similar deployments (not just the tool in question, but competitors as well).  They will be able to describe the usual mistakes and provide recommendations to the internal team and increase their change of success.  At the same time, they can engage the tooling resources to effectively and efficiently ensure the tooling resources can overcome challenges in a way that ensures long-term success for the client (not just the installation).  A third-party, independent consultant can also provide benefits in other areas as well: completing documentation, crafting training materials, building internal reporting to ensure the new tool stays useful.

    Bio: Jeremy Boerger founded Boerger Consulting, to improve and promote the benefits of Information Technology Asset Management (ITAM) programs for medium and large businesses.  He is a published author and sought-after speaker at technology expos, conventions, and podcasts around the world.  His clients routinely see a one-third reduction in their software operations budget, usually within nine- to twelve-month timeframe.

  • 04/25/2024 12:19 PM | Marla Halley (Administrator)


    In the tech leadership world, there’s this common trap we can fall into—hiding away in our offices. It's easy to do, especially for those of us who lean a bit on the introverted side. But here’s the thing: to really get the pulse of what’s happening in our field, we've got to get out there and engage with the people doing the actual work. Technology’s all about making things easier and more innovative for our teams, but there’s often a gap. Folks not living and breathing tech might not know about all the cool tools they could use, and us tech leaders might not see the creative shortcuts or workarounds they're using to get things done.

    So, how do we bridge this gap? How do we get more in tune with the heartbeat of our companies? Here are a few thoughts:

    • Chat it up in the hallways: Seriously, just talk to people. Get to know the movers and shakers in your company. You’ve got to build some trust, so they'll open up about their daily grind. When you’re visiting different sites or meeting with customers, leave some room in your schedule for those chance hallway chats that can lead to gold. Find out what big problems they’re trying to crack and maybe, you can throw in your two cents about a project that might help them out.
    • Mix your teams: Have your tech folks spend some time shadowing the end-users. It’s eye-opening to see if the tools you’ve deployed are actually making life easier for them or if they're just sitting there gathering virtual dust.
    • Know your stuff: This one’s a given but keep digging deep into what your business systems can do. The more you know, the better you can jump into conversations with something useful to contribute.
    • Circle back on solutions: After you roll out a new tool or system, don’t just walk away. Check back in after a month or two to see if it’s really making a difference or if it needs a tweak here and there.

    Getting out of your office and engaging with your team not only helps your tech team get seen as the go-to problem solvers but also makes your work a lot more enjoyable. It’s about building connections, understanding the real-world application of your work, and continuously improving things.

    In short, stepping away from the comfort zone of your office and diving into the daily lives of those around you is key for any tech leader looking to make a real impact. It’s all about fostering a sense of community, being open to learning from the ground up, and using that insight to drive innovation and efficiency. Plus, it’s just a more fun and fulfilling way to work. Making those connections, understanding challenges first-hand, and seeing the direct impact of your solutions.

    *****

    Bio: Karen Kauffman is the Director of Information Technology at Precision Strip Inc.  Karen has 35 years of experience in the IT industry, with 20 years of leadership experience.  Precision Strip leads the industry in metal processing for the automotive, appliance and beverage can industries.


  • 04/25/2024 11:18 AM | Marla Halley (Administrator)

    If we were to view technological growth through a wide-angled lens, it becomes evident that advancements are significantly outpacing governance. This rapid progress presents tech leaders with a formidable challenge: How do you safely deploy Generative AI while maintaining data security? As a transformative force, Generative AI rockets innovation forward. Yet, from a data governance perspective, these AI tools also introduce great risks such as unintentionally birthing an amplified insider threat. This dichotomy makes vigilant oversight crucial. This article highlights the dual nature of Generative AI and proposes essential steps to harness its potential while ensuring a safer deployment.

    The Double-Edged Sword of Generative AI: Innovation and Risk

    Generative AI significantly bolsters one technological capability, serving as a uniquely clever assistant that streamlines creative processes and enhances data analysis. These advancements don't just open the door to a wide variety of innovative opportunities—they also add a layer of complexity to the management and oversight of these potent productivity enhancers. Without proper checks, the very features you value can quickly morph into formidable threats, leading to security vulnerabilities, misinformation campaigns, and unforeseen ethical dilemmas.

    This nuanced challenge to privacy is enhanced by insider threats, which often stem from either human error or malicious intent. Sometimes, malicious attempts to compromise an organization can be inadvertently thwarted due to the perpetrator's sheer ignorance of what critical data they can access. However, in today's reality where data sprawl is rampant and permissions management becomes increasingly complex, Generative AI could unintentionally facilitate privacy breaches. Operating autonomously, it may grant unauthorized access or usage of sensitive information, escalating the risk of data breaches. To go a step further, as AI tools become more sophisticated and adapt within these lax ecosystems, they might inadvertently widen the impact of insider threats, accessing critical data that would otherwise remain undiscovered. Navigating these complexities requires tech leaders to practice stringent supervision of data stores, ensuring AI is employed within strict parameters to uphold privacy and safeguard data integrity.

    Common Pitfalls of Unchecked Generative AI

    The pitfalls of unchecked Generative AI are as varied as they are significant. Take, for instance, the case where a seemingly innocuous mistake by an executive assistant—sharing an executive folder via a collaboration link—became an open vault for anyone within the organization. This misstep led to a critical breach when a departing, disgruntled employee exploited the oversight. The worker harnessed the capabilities of a Generative AI Assistant, Microsoft Copilot, to ingeniously request and obtain sensitive data including executive compensation details, family trust documents, and personally identifiable information (PII) of the organization's leaders.

    Such incidents underline the multifaceted nature of threats posed by unregulated Generative AI. They are not confined to the direct actions of the AI itself, but also encompass how it can be maneuvered to fulfill harmful intentions—especially when combined with human ingenuity and malcontent. This unpredictability of AI-assisted threats adds an intricate layer to the already complex challenge of safeguarding against data breaches, emphasizing the need for rigorous AI governance protocols within any enterprise.

    Strategic Steps to Mitigate Risks

    To effectively manage Generative AI and maintain security integrity, technology leaders should consider implementing the following strategic measures:

    1. Adopt a Least Privilege Model:

    • Restrict access to data strictly on a need-to-know basis.
    • Regularly review and adjust permissions to minimize unnecessary access.

     2. Establish Robust Ethical Guidelines:

    • Draft and enforce clear policies on AI's decision-making boundaries.
    • Create protocols for swift intervention if AI actions deviate from norms.

     3. Deploy AI Monitoring Tools:

    • Implement systems for real-time oversight of AI activities.
    • Ensure traceability of AI actions to their sources for accountability.

     4. Integrate AI Risk Assessments:

    • Incorporate AI threat evaluations into existing security frameworks.
    • Develop proactive strategies to respond to anticipated AI vulnerabilities.

     5. Educate and Train Staff:

    • Conduct regular training sessions on the benefits and risks of Generative AI.
    • Promote a company-wide culture of AI awareness and responsible use.

    These actionable steps provide a comprehensive framework for mitigating the risks associated with Generative AI, promoting ethical use, and fostering an environment of informed vigilance.

    Charting a Safer Course: The Imperative of AI Governance

    We truly do stand at a crossroads of innovation and responsibility. It’s clear that unchecked use of Generative AI tools presents formidable risks alongside their tremendous upside for productivity. The incidents and challenges we've discussed underscore how essential it is to take a proactive risk management approach when deploying Generative AI in your ecosystem.

    To ensure the ethical deployment of AI, it is imperative to establish and uphold stringent ethical guidelines. These guidelines act as the compass that guides AI behavior, ensuring that it aligns with your values and ethical standards. Additionally, investing in comprehensive education and training programs is not just about risk avoidance but also about empowering your team to leverage AI responsibly and effectively.

    By reinforcing these two pillars—ethical guidelines and continuous learning—you cultivate a knowledgeable and principled workforce. Strengthen your AI oversight and educate your teams on how to safely utilize AI tools. By taking these decisive steps, you will not only protect your organization but also position it to thrive, deploying AI with precision and security.

    ****

    Bio: Ramone Kenney brings over 13 years of expertise in providing technology solutions to complex challenges. As Manager of Enterprise Accounts, specializing in Cyber Security for Varonis, he is instrumental in overseeing the deployment and implementation of robust data security measures. Ramone is committed to leading the charge in risk reduction initiatives, ensuring that his clients are safeguarded against ever-evolving digital threats.

  • 03/27/2024 10:48 AM | Marla Halley (Administrator)

    Embracing AI in Leadership

    In November 2023, I presented to and spoke with a group of technologists on the topic of “Embracing AI in Leadership.” The mission was to open people’s eyes to the possibilities of enhancing their own growth potential in their leadership journey by utilizing Generative AI. This included real case studies, several Gen AI tools, and various prompting techniques. Where there were a few skeptics at the beginning of the presentation, in the end, they were converted into believers. Task completed? Well, I think this journey is and will be a work in progress for the foreseeable future.

    My decision to delve into this topic was driven by multiple inspirations. First among them was witnessing the widening divide between the technologically empowered and the underserved. My journey from blue-collar sectors to the forefront of the tech industry has confirmed and validated the idea that there are boundless opportunities that technology can offer. Yet, it has also highlighted a stark reality: as technology progresses, the chasm deepens between those who continuously evolve with technology and those who remain disconnected. This disparity, especially with the advent of easily accessible Generative AI, is set to expand even more rapidly, distinguishing between the adopters of AI and those left behind.

    Setting AI aside for the moment, Scott Klososky points out that we have an existing problem. Even amongst well-established organizations, there are digital skills gaps that incur massive hidden costs. I have witnessed this myself at multiple organizations over the past several years. For instance, many individuals remain reliant on their mapped network drives for accessing and managing shared content. Mapped network drives have been around for a very long time. At the risk of opening myself up to rebuke, I’ll go ahead and say it, this is old-school technology, pre-cloud, pre-OneDrive, and pre-modern-tech.

    On one hand, some IT departments have invested heavily to ensure access to their mapped drives and shared content is seamless. On the other hand, many users experience frustration with the less-than-optimal method of working with their content, especially when on the move. What makes this worse is these same organizations have also invested in Microsoft 365 (M365), a comprehensive digital workplace. Yet 80% or more of users are still locked in their old-school processes that revolve around their mapped drives (these are my unofficial stats).

    This scenario underscores a missed opportunity to leverage existing resources more effectively and highlights the pressing need to address the digital skills gap within the organization. As Scott points out, the organization is responsible for closing the digital skills gap or suffer the resulting cost of a lack of efficiency and effectiveness.

    Get Your Digital House in Order

    Switching back to the AI topic. If your organization already has a detrimental digital skills gap, you have some work to do as a technology leader. Embracing AI in Leadership is based on the idea that, conceptually, you can use generative AI to improve your leadership capabilities, including strategic thinking, future-scenario simulations, enhanced research capabilities, and potentially help you devise a strategy and plan for closing the digital skills gap in your organization. I took a few minutes working with ChatGPT to generate the following high-level strategy as a good starting point to consider.

    Strategy Component

    Action Items

    Expected Outcomes

    Baseline Digital Skills Assessment

    - Assess to identify skills gaps.
    - Benchmark against industry.

    - Clear understanding of skills gaps.
    - Identified improvement areas.

    Customized Learning Pathways

    - Develop role-specific pathways.
    - Utilize AI for personalized learning.

    - Role-relevant skills improvement.
    - Higher engagement.

    Leverage Existing Technologies

    - Train with Microsoft 365.
    - Workshops for new tech adoption.

    - Improved tool utilization.
    - Reduced outdated tech reliance.

    Promote a Culture of Continuous Learning

    - Reward learning achievements.
    - Foster knowledge sharing and mentoring.

    - Learning as a core value.
    - Supportive learning environment.

    Generative AI in Leadership Development

    - Integrate AI for planning and simulations.
    - AI training for leaders.

    - Enhanced leadership skills.
    - Better planning capabilities.

    Continuous Feedback and Adaptation

    - Feedback loops for learning effectiveness.
    - Update materials based on feedback.

    - Agile adaptation to tech changes.
    - Skills aligned with goals.

    Beyond the Skills Gap: Paving the Way for AI and Digital Innovation

    This strategy lays the foundation for AI adoption and other technological advancements, while addressing the digital skills gap is crucial, it’s just one aspect. Organizations are embarking on extensive digital transformation, adopting advanced ERP systems, shifting to cloud-based development, enhancing cybersecurity, and establishing robust disaster recovery plans. Amidst these transformations, businesses strive to excel, balancing multiple initiatives seamlessly in their dynamic operations.

    As a technology leader, prioritize delivering high-quality digital transformations, using AI judiciously to augment your leadership and ensure initiatives remain focused and effective, without diluting quality or mission clarity. At some point, your organization might consider tackling AI head-on. For example, evaluating viable use cases, considering deploying your own Large Language Model (LLM) internally, training or fine-tuning your models using your own proprietary data, and then figuring out how to production-ize AI solutions. As you prepare for this new initiative, find the right partner and hire or train the right leaders who can devote 100% of their effort to AI. You will need leadership, experience, and a team to tackle this new space.

    In Conclusion

    As we explore “Embracing AI in Leadership” and tackle the digital skills gap alongside our digital transformation efforts, the journey is both challenging and filled with opportunities. Fostering a culture of continuous learning and adaptability is key to not just bridging the digital divide but thriving in the era of rapid technological advancement. Our ongoing endeavor is to leverage technology to enhance our leadership, improve operations, and drive organizational growth in a world where technology continuously reshapes our landscape.

    Bio: Kalen Howell has a master's degree in computer science from Franklin University and an MBA from the University of Dayton and has worked in the software development industry for over 20 years. Today, as CIO, Kalen leads a technology team, IT OPS, and Software Development, with huge digital initiatives rolling out to organizations across the US, Canada, and Mexico.

  • 03/27/2024 10:44 AM | Marla Halley (Administrator)

    My youngest son has no fear of technology and, until recently, no programming experience. That dramatically changed when his logistics professor asked his business school students to build an interactive digital map of the world depicting the sourcing, manufacturing, shipping, and receiving patterns for a fictitious, complex supply chain case study.

    My son, in a few days, used an Excel data file and OpenAI’s GPT-4 to create and edit code in RStudio and build the interactive model. This exemplifies the democratization of skills previously accessible only to a subset of the population.

    As a result, we are going to see an explosion of innovation as creative people around the globe tap into this power.

    Applying AI to Solve Healthcare Problems

    In healthcare, we've leveraged algorithm-based machine learning for years. Our primary applications in imaging studies have quickly identified tissue abnormalities, genetic assessments to understand the future risk of cancer, and predictive models to catch infections early so they can be treated before becoming life-threatening.

    Generative AI is going to positively impact healthcare, and Kettering Health will see initial benefits in three areas: 

    • Provider workload: Chart summaries can be automatically prepared to share with the patient or referring provider. Inbox assistants help the clinician quickly reply to patient questions.
    • Rare disease management: Analytics assistants will help clinicians find other patients with rare symptoms like the ones they are treating and help the clinician connect with that care team so a treatment plan can be developed.
    • Revenue cycle efficiency: Existing automation opportunities will be enhanced to increase the efficiency of burdensome diagnostic coding and billing processes.

    Most healthcare organizations don't have the deep pockets needed to invest in this technology to be on the cutting edge. But the good news is that Epic (our electronic healthcare record systems partner) and Microsoft are making huge investments in generative AI.

    Because of that, we can partner with our providers to prototype features in the three areas I listed to determine which are the most valuable, integrate them into their workflows, and then continue to learn as more practical applications are developed.

    Our first serious venture into generative AI is to use it to assist our physicians to select the appropriate diagnosis codes while charting, saving time and increasing accuracy. We are piloting a solution in one of our hospitals—with plans to scale throughout our system’s acute locations.

    It’s More Than Hype

    This technology is exciting, and no one is completely sure of its future benefits. We’ve seen careless accelerated approaches to adopting AI lead many organizations, across all industries, into the troubled waters of IP law, copyright infringement, plagiarism, and even moral calamity.

    However, as my son’s experience illustrates, the potential value is real.

    I look forward to when more of us adopt these skills and move beyond generative AI applications that save time or reduce the burden of repetitive tasks to truly life-enhancing innovations for our community.

    Bio: Eric Crouch serves as the Chief Information Officer (CIO) and Vice President for Information Services at Kettering Health. He oversees the strategic planning, implementation, and management of information technology and digital transformation initiatives. The people at Kettering Health serve in medical centers and outpatient locations throughout western Ohio and are dedicated to elevating the health, healing, and hope of the community.

  • 03/27/2024 10:36 AM | Marla Halley (Administrator)

    Quantum computing is a massive leap forward in computational capabilities potentially revolutionizing whole industries and solving previously intractable problems. Quantum computing relies on highly specialized technology (hardware and algorithms) that takes advantage of quantum mechanics to process information in ways that would have been considered science fiction not long ago. Quantum computers can solve extraordinarily complex problems that even supercomputers can’t solve in a reasonable amount of time, like before the sun burns out. Let’s take a deeper look at quantum computing.

    What is quantum computing?

    Quantum computers use quantum bits, or qubits, as basic informational units. Unlike traditional bits which can represent either 0 or 1, a qubit can exist in a state of 0, 1, or both at the same time thanks to the quantum phenomenon known as superposition. This allows quantum computers to explore multiple possibilities simultaneously, and in conjunction with other quantum phenomena such as entanglement and interference, solve highly complex problems much faster than traditional computers.

    The quantum theory of physics was born in 1900 when physicist Max Planck published his study on the effect of radiation on a “blackbody” substance. As a subset of quantum physics, quantum computing is a relatively new field. It began to take off in 1994 when Peter Shor developed a quantum algorithm for factoring integers with the potential to crack public-key encryption schemes such as RSA or ECC. Astounding progress has been made in the decades since, major milestones include:

    • 1995: David Deutsch and Richard Jozsa demonstrate the first quantum algorithm that can outperform any traditional algorithm on a specific problem.
    • 1996: Lov Grover invents a quantum search algorithm that sports a quadratic performance improvement over traditional algorithms.
    • 2001: IBM builds the first quantum computer to execute Shor's algorithm.
    • 2007: D-Wave Systems demonstrated the first commercial quantum computer.
    • 2019: Google claims quantum supremacy by performing a random circuit sampling in 200 seconds versus 10,000 years on a state-of-the-art supercomputer.
    • 2020: IBM announces quantum advantage by performing a financial portfolio optimization task in 2 minutes versus 6 hours on a state-of-the-art supercomputer.
    • 2020: China achieves quantum supremacy by performing a Gaussian boson sampling task in 200 seconds versus 2.5 billion years on a state-of-the-art supercomputer.

    2023: IBM announces plans to build a 100,000-qubit machine that will work alongside traditional supercomputers to achieve breakthroughs in drug discovery and other advanced applications.

    Quantum computing technology continues to advance rapidly. Industry leaders such as IBM, Google, and D-Wave, as well as academic institutions and startups continue to push the boundaries of what's possible. Currently, most work in the field is focused on reducing error rates, developing error correcting algorithms, increasing the number of qubits, and improving qubit coherence times which is length of time a qubit can maintain quantum state.

    Common Benefits of Quantum Computing

    The advent of quantum computing brings a host of benefits including:

    • Speed: Quantum computers can solve certain problems exponentially faster than traditional computers. Shor's algorithm could factor a 2,048-bit number in about 10 minutes, versus billions of years on a traditional supercomputer. It’s worth noting that this has raised strong concerns about the future of encryption.
    • Efficiency: Quantum computers can solve certain complex problems with fewer resources than traditional computers.
    • Power: Quantum computers can manage more complex problems, even problems that were previously unsolvable.
    • Security: Quantum computing introduces new paradigms in encryption.
    • Innovation: Quantum computing enables breakthroughs by handling extraordinarily complex simulations and calculations that are impractical if not impossible for traditional computers.

    Common Challenges of Quantum Computing

    Quantum computing is not without challenges, including:

    • Hardware: Quantum computers are complex, expensive and difficult to build and operate. They currently require extreme cooling and specialized equipment to maintain the quantum states of qubits, making them impractical for widespread use.
    • Software: Quantum computing requires new programming languages, algorithms, and tools.
    • Threats: Quantum computing poses a significant threat to current cryptographic standards putting vast amounts of sensitive data at risk.
    • Technical Challenges: Quantum computing is an immature and rapidly advancing field. Error rates and qubit coherence must be overcome to fully realize quantum computing’s benefits.
    • Ethics: Quantum computing poses profound social and ethical implications. It creates the potential for new forms of power and influence, as well as new forms of harm, inequality, and conflict. For additional insights, check out this article from Deloitte Quantum computing may create ethical risks for businesses. It’s time to prepare”.

    How Quantum Computing Is Currently Used

    • Despite challenges and concerns, quantum computing has the potential to revolutionize industries including artificial intelligence, physics, medicine, chemistry, logistics, finance, cryptography and more. Current applications for quantum computing include:
    • Advanced simulations: Quantum computers could simulate the behavior of molecules, atoms, and subatomic particles leading to breakthroughs in the design of new materials, drugs, and energy sources.
    • Optimization: Quantum computers could tackle complex optimization problems that require finding the best solution from a vast number of possibilities. Examples include scheduling, routing, and planning.
    • Accelerating machine learning: Quantum computers could enhance the performance and capabilities of machine learning models through faster training, better accuracy, and less complexity.
    • Cracking encryption: Quantum algorithms like Shor’s pose a significant threat to data secured by current encryption schemes. Cybersecurity experts have speculated that adversarial nation state actors (APTs) are collecting as much data as possible now knowing that quantum computing will soon make it feasible to crack current encryption schemes and unlock vast troves of stolen data.
    • Improving encryption: Quantum cryptography promises strong encryption that will be virtually unbreakable. NIST has announced four post-quantum resistant encryption algorithms designed to withstand quantum attacks.
    Conclusion: Facing Our Quantum Future

    Quantum computing is a new paradigm that transcends the limits of traditional computing by harnessing the power of quantum physics to perform calculations that are impractical if not impossible for traditional binary based computers. While still in its developmental stages, quantum computing shows the potential to radically transform our world.

    For technology professionals, quantum computing presents unprecedented opportunities and challenges. Understanding its principles, applications, benefits, and risks will allow us to play a pivotal role in shaping this technology, addressing ethical concerns raised by it, and developing secure, equitable access to quantum technologies.

    The journey into the quantum future is just beginning, and its impact on society, science and the economy will be profound. It’s an exciting time to be alive and to be in tech as we now have the opportunity to shape this future and ensure the power of quantum computing achieves its most beneficial potential.

    Bio: Dave Hatter – CISSP, CISA, CISM, CCSP, CSSLP, PMP, ITIL, is a cybersecurity consultant at Intrust IT. Dave has more than 30 years’ experience in technology as a software engineer and cybersecurity consultant and has served as an adjunct professor at Cincinnati State for nearly 20 years. He is a privacy advocate and an Advisory Board member of the Plunk Foundation. Follow Dave on X (@DaveHatter) for timely and helpful technology news and tips.

  • 02/27/2024 1:26 PM | Marla Halley (Administrator)

    In the ever-evolving realm of technology, companies are beginning to realize that diversity and inclusion are critical factors for innovation and progress. Even with this new burgeoning era of understanding, it's clear that women, though brimming with potential, are still vastly underrepresented. Bridging this gender gap requires a concerted effort to empower, encourage, and lead women to pursue careers in technology. One impactful approach to this issue is through skill-based education, providing women with the tools and knowledge they need to excel in the world of tech.  

    The Gender Disparity in Tech  

    Historically, the tech industry has been male dominated, with women comprising a small percentage of the workforce. This disparity is not due to a lack of interest or capability of women but is often attributed to systemic barriers and societal stereotypes that discourage them from pursuing tech-related careers. From high school advanced math programs that historically target males to pop culture and media consistently showing only men as the tech guru sidekicks who help the heroes outwit the villains, the narrative to women and young girls has been, “technology is not the space for you.”  

    The Power of Skill-Based Education 

    Skill-based education serves as a powerful equalizer. By focusing on tangible skills and hands-on learning, women can build the confidence and competence needed to break through barriers in the tech industry. It allows women to equip themselves with coding prowess, data analytics finesse, and cybersecurity wizardry through online courses, coding bootcamps, and engaging workshops, with much less financial cost.  

    Creating Inclusive Learning Environments 

    Imagine this: vibrant communities, mentorship bonds, and initiatives celebrating the triumphs of women in tech. That's the environment we need to foster—one where diversity is not just acknowledged but celebrated. Educational institutions and organizations must actively break down biases within their curricula, ensuring that every woman feels seen and supported.  

    Overcoming Stereotypes 

    Let’s be candid; stereotypes often portray women as less suited for STEM fields, perpetuating the myth that certain professions are a man's world. But within the realm of skill-based education, we shatter these stereotypes, spotlighting the accomplishments of remarkable women who have not only excelled but thrived in tech.  

    Building Confidence Through Hands-On Experience 

    One of the key benefits of skill-based education is the emphasis on practical, hands-on experience. By working on real-world projects, women can gain the confidence and expertise necessary to navigate the tech industry. This approach not only equips them with technical skills but also develops problem-solving abilities and critical thinking—strong qualities for success in any role. Studies have long shown women hesitating to apply for tech roles, even when their skills rival their male counterparts. Skill-based education addresses this by providing a clear pathway for women to develop and showcase their abilities. As they witness the tangible results of their learning, barriers begin to break down, and confidence soars.  

    Conclusion 

    Let's dismantle the barriers, champion diversity, and celebrate the triumphs of women in tech. By investing in skill development and providing accessible learning opportunities, we aren't just shaping individual success stories; we're creating a platform for women to stand shoulder to shoulder, their brilliance resonating in every innovation and breakthrough. It’s time to make tech an inclusive space. It's time to harness the full potential of diverse talent and build a future where women are equally represented and celebrated in the world of technology, where their unique contributions produce of story of empowerment and achievement. 


  • 02/27/2024 12:59 PM | Marla Halley (Administrator)

    In the dynamic world of technology, authenticity is not just a choice; it's a superpower that propels women forward in their journey through challenges and opportunities alike. As a woman in IT, I've found that embracing authenticity has been the key to navigating the twists and turns of my career with unwavering determination and a commitment to staying true to myself. In this blog, I invite you to join me on a transformative journey of self-discovery, resilience, and empowerment in the ever-evolving field of IT. 

    Authenticity is the key to success for women in IT. By embracing our true selves, we unlock our full potential, inspire others, and drive meaningful change in the industry. 

    Amidst the challenges of my journey in IT, one of the most profound experiences was my transition from India to the US. Moving to a new country brought with it a host of challenges, including language barriers and the longing for family back home. These challenges quickly led to negative self-talk and resulted in me diminishing my own skills that I had acquired and learning that I’d received till that point.  

    Despite these obstacles, I embraced the opportunity with courage and determination, seeking out entry-level positions in IT while simultaneously mastering US English. Through perseverance and resilience, I overcame these challenges, created a version of myself that was able to start over, while building on strengths I already had and achieving my goals regardless of what challenges I had to surmount. This proved to me and others that authenticity knows no boundaries and that embracing our true selves is the ultimate path to empowerment. 

    Overcoming Imposter Syndrome: Embracing Opportunity and Change 

    "Always be a first-rate version of yourself, instead of a second-rate version of somebody else." - Judy Garland 

    I have held roles of Software Developer, Business Analyst, Technical Writer, Project Manager, Program Leader, IT Dev Team Manager, Agile Transformation Leader and PMO Director in various organizations in FinTech, Healthcare and Marketing industries. All this while organically growing by learning each skill at the most foundational level, by doing it myself.  

    As women in IT, we often face imposter syndrome, doubting our abilities and downplaying our achievements. But success comes from embracing opportunities and challenges, believing in us, and taking bold steps forward. Even if that means asking for the compensation we deserve, a promotion we have been eyeing, or applying for an opportunity we may have already talked ourselves out of, in our mind. 

    Along the way I found many mentors who I ingratiate myself to this day! For those reading this you know who you are, and I thank you from the bottom of my heart! 

    Continuous Learning, Mentoring, and Modern-Day Skills: 

    We find this world of IT constantly evolving and changing with rapid technical advancements. When we stop learning, we stop growing. In addition to the skills these roles have required, I have recently delved into the realms of Generative AI and Cloud Infrastructure Strategy. Continuously learning and adapting to modern-day technologies is essential in staying relevant and effective in the rapidly evolving field of IT. These skills have not only expanded my expertise but have also enabled me to contribute meaningfully to innovative projects and initiatives. 

    Along my journey in IT, I always look forward to giving back. I've had the privilege of mentoring four talented women in IT, guiding them on their paths while learning valuable lessons from their unique perspectives and experiences. This journey of mentorship has reinforced the importance of giving back and helping others achieve their goals. By lifting each other up and fostering a culture of support and collaboration, we can create a more inclusive and empowering environment for women in the tech industry. 

    A Leap of Faith: Balancing Education, Parenthood, and Career Ambitions 

    "The only limit to the height of your achievements is the reach of your dreams and your willingness to work for them." - Michelle Obama 

    As a mother and a woman in IT, I faced a pivotal moment in my career journey when I decided to pursue higher education while juggling the demands of motherhood and a full-time job. With my first baby just 13 months old, I embarked on the challenging yet rewarding journey of earning an MBA. Balancing late-night study sessions with diaper changes and boardroom meetings, I learned the true meaning of resilience and determination. Despite the obstacles in my path, I refused to let anything hold me back from achieving my goals. Along the way I did turn some naysayers into believers and friends by achieving precisely what I was told ‘I can’t do’! 

    Practical Tips for Embracing Authenticity: 

    1. Stay True to Your Values: In a fast-paced industry like IT, it's easy to get swept up in trends and expectations. Stay grounded by reminding yourself of your core values and beliefs, and let them guide your decisions and actions. 

    2. Embrace Vulnerability:Don't be afraid to show your vulnerabilities and imperfections. It's okay to ask for help, admit when you don't have all the answers, and share your struggles with others. Vulnerability fosters connection and empathy, making you more relatable and approachable. 

    3. Seek Mentorship and Support: Surround yourself with mentors, colleagues, and friends who uplift and support you on your journey. Seek out opportunities for mentorship and peer support, and don't hesitate to reach out for guidance when you need it. 

    4. Celebrate Your Achievements: Take time to celebrate your successes, no matter how small they may seem. Recognize your achievements, acknowledge your progress, and give yourself credit for your hard work and perseverance. 

    Seizing the Moment: Leading with Purpose and Passion 

    "Success is not about the destination but the journey of embracing opportunities and challenges along the way." - Angela Duckworth 

    Authenticity empowers us to lead with purpose and passion, embracing vulnerability and transparency in our interactions with others. By sharing our stories of growth and transformation, we inspire our colleagues and peers to embrace their authenticity, unleash their potential, and pursue their dreams with unwavering conviction. Bringing our whole self to work, being open and honest and leading with purpose and values has continuously proven to be the recipe for success in my career. 

    Conclusion: 

    As I reflect on my journey of growth and empowerment in IT, I'm reminded of the incredible potential that lies within each of us. By embracing authenticity, seizing opportunities, and staying true to ourselves, we can overcome any obstacle and achieve our wildest dreams. Together, let's rewrite the narrative of women in IT, one story at a time. 

    Ashima Sharma works is Senior Director IT at CareSource. Her expertise is in the field of PMO leadership, digital transformation, Agile development business analysis and change management. Ashima has over 20 years of leadership and strategy experience in the IT industry.

  • 01/30/2024 10:45 AM | Marla Halley (Administrator)


    Why attend conferences? 

    In our current state of virtual interactions, overwhelmed by Zoom meetings and conference calls, the allure of in-person conferences may seem diminished. The hesitations around handshakes, proximity, and shared spaces are understandable, especially considering the prevailing concerns about health and hygiene. However, it's crucial to reevaluate the significance of attending conferences and consider making them a priority, period. 

    Networking Extravaganza 

    One of the most apparent benefits of attending conferences is the unparalleled opportunity to network with individuals you might not encounter otherwise. Conferences serve as a melting pot of leaders in specific fields, subject matter experts, and peers facing similar challenges or operating within comparable environments. The importance lies in the exposure to diverse experiences within our own fields, offering fresh perspectives on problems that may have seemed insurmountable. This exposure broadens our horizons, enabling us to learn new approaches and ideas that we might never have encountered in our routine professional circles. 

    The chance encounters, often referred to as "drive-byes," present themselves in the hallways, between sessions, and even during meal breaks. Some of my most enriching conversations and discussions on various topics have unfolded spontaneously during these breaks and lunches at conferences. These unplanned interactions have provided invaluable opportunities to broaden my network. Remarkably, the connections made in such informal settings have proven to be exceptionally beneficial over the years, even in situations where I hadn't anticipated needing that resource. These connections have evolved into some of my most trusted professional relationships, with whom I remain closely connected to this day. 

    Meeting Influential Leaders and Your Heroes 

    Conferences offer a unique opportunity to rub shoulders with influential leaders, industry titans, and even your professional heroes. Whether it's participating in a panel discussion, attending keynote addresses, or simply engaging in networking sessions, the chance encounters with individuals who have shaped your industry can be transformative and inspiring. The individuals you encounter at conferences are often considered experts and influencers within the conference's subject matter, and sometimes, even beyond. Reflecting on an experience at the BoxWorks conference, I found myself in the front row listening to Neil deGrasse Tyson. The impact of his wisdom, shared amidst the excitement of the crowd, resonated with me on a personal level. This profound experience would not have been as impactful had I not been physically present, feeling the collective energy in the room. Simultaneously, during the Women in IT sessions, I had the privilege of hearing Jill Biden speak. Her insights, especially on navigating personal challenges, deeply affected me. Engaging with her one-on-one after the session was an opportunity, I might have missed had I not attended the conference. 

    Continuous Professional Development 

    Conferences are veritable gold mines of knowledge, providing a unique platform to expand your expertise, learn from industry experts, and improve your skill set. Workshops, presentations, and interactive sessions offer hands-on experiences that go beyond the theoretical realm, fostering a continuous learning environment that can significantly contribute to your professional growth. The smaller group settings can allow for more interpersonal conversation and provide more opportunities for questions to be heard and discussions to be more conclusive. More than once, I have learned a different approach, a new application, or even a new technology I was not aware of that solves a problem my organization had been facing. Attending a conference allowed me to have an impromptu conversation with a vendor, another attendee, or a technology expert that I would not have even known to have sought out. 

    Insights into the Latest Trends 

    Staying ahead of the curve is essential in any industry, and conferences are the hotspots for unveiling the latest trends, innovations, and technological advancements. Engaging with thought leaders and industry pioneers provides a front-row seat to the future landscape of your field. These events serve as dynamic forums where groundbreaking ideas are discussed, emerging technologies are showcased, and visionary strategies are unveiled. 

    Conferences offer a unique opportunity to gain a deep understanding of the current market dynamics and where it's headed. Attendees often have the privilege of participating in discussions and sessions that delve into cutting-edge concepts, disruptive technologies, and transformative industry shifts. Keynote speakers, who are often influential figures with their finger on the industry's pulse, share invaluable insights into the direction of the market, helping attendees anticipate changes and adapt their strategies accordingly. 

    Moreover, these gatherings facilitate direct interactions with industry experts and innovators who are driving the latest trends. Networking sessions, panel discussions, and collaborative workshops create an environment where professionals can engage in meaningful conversations about the challenges and opportunities posed by emerging trends. These interactions not only provide theoretical knowledge but also offer practical insights on how to implement and leverage these trends in your specific professional context. 

    Conferences act as accelerators for staying informed about the newest methodologies, tools, and best practices that are reshaping the industry landscape. Whether it's the integration of artificial intelligence, the evolution of sustainable practices, or the latest advancements in digital transformation, conferences offer a comprehensive and firsthand view of the trends that will define the future of your profession. 

    Enhancing Your Professional Profile 

    Attending conferences isn't just about accumulating knowledge; it's about showcasing your commitment to professional development. Including conference participation on your resume demonstrates your proactive approach to staying informed, engaged, and connected within your industry. It signals to potential employers that you are dedicated to continuous improvement and staying abreast of the latest industry trends.  It may also lead to topical conversation within an interview conversation that sets you apart from other candidates! 

    By immersing yourself in the immense opportunity of insights presented at conferences, you not only gain a competitive edge but also position yourself as a forward-thinking professional. These events empower you to become a trendsetter within your organization, bringing back actionable knowledge that can shape strategies, influence decision-making, and contribute to the success of your team or business. In essence, attending conferences becomes a strategic investment in your professional acumen, ensuring that you are not just keeping up with the latest trends but actively shaping and leading the way forward. 

    Jill Campbell is a seasoned IT leader known for her successful track record in crafting clear and compelling IT and Digital strategies. She is an expert in developing detailed transformation IT roadmaps, aligning IT organizational models, and optimizing business systems. She has excelled in leadership roles within both commercial and defense sectors and currently enjoys consulting in both higher education and non-profits.

  • 01/30/2024 9:46 AM | Marla Halley (Administrator)


    Navigating the ever-evolving landscape of cyber insurance is something that we cannot rest on. As the year begins, most of us are looking into what this year holds. As we know, the rapidly changing landscape of IT is evolving and will always be presenting a myriad of challenges and opportunities. Among these, one significant change that is poised to shape the future is the transformation of cyber insurance. We will touch on the changing dynamics of cyber insurance and how the effects of these changes will impact organizations of all sizes.

    As we are gearing up for this new year and moving 2023 to our rear-view mirror, some interesting things are occurring in all facets of IT. One factor that will become more and more prevalent in 2024 and beyond is what Cyber Insurance will cover and what will be changing in this space. One of the cornerstones of the insurance world, Lloyds of London announced in 2023 that they have a significant exclusion. They will refuse to cover “nation state attacks” and this move has caused a ripple effect that is impacting organizations seeking cyber insurance. Additionally, we have even seen certain clients denied cyber insurance which raises concerns about the sustainability of the cyber insurance landscape.

    As we gaze into the future, it is becoming increasing evident that cyber insurance will fall into one of these distinct buckets:

    1. Pricey Proposition- Premiums will soar past what they are currently with the number of cyber threats growing, the complexity of the threats, and ransoms increasing. Cyber Insurance companies are facing the risks and are likely to place the burden onto those getting insured, making this a costly investment.
    2. Denial Dilemma- With the scope of coverage shrinking, organizations may face getting denied cyber insurance as criteria for approval will become more stringent.
    3. Condensed Coverage- With cyber insurance coverage being reduced and some attacks not being covered from the get-go, some organizations will wonder what is point of being insured at all.
    4. Independently Self- Insured- Facing expensive premiums, denials, condensed coverage, some organizations will consider self-insuring and taking on the risks of what those entails.

    A recent cyber insurance policy, seen below, that took effect on January 1st, 2024, shows exactly what organizations are up against when looking into cyber insurance.


    If we are being honest what DOESN’T constitute “cyber warfare”? As the lines of cyber warfare are blurred, cyber insurance organizations will have to narrow down what they will and will not cover. As cyber insurance companies grapple with these nuances, organizations are left navigating a complex landscape where the terms and conditions are constantly under review.  This will greatly impact both costs to the end-user, and at some point, users will have to decide IF they will choose to continue insurance coverage or not.

    In conclusion, the shifting of cyber insurance in 2024 demands that organizations are informed of the changes and proactively looking at what the cyber insurance companies are doing. The trends indicate that higher costs, increased denials, and reduced coverage are coming. Navigating this requires a deep understanding of the evolving landscape, a commitment to robust cybersecurity practices, and a readiness to adapt to the changing norms within the insurance industry.

    As we start the new year, organizations must critically evaluate their cyber insurance needs, reassess their risk tolerance, and chart a course that aligns with the evolving realities of the digital age. The journey ahead is complex, but with informed decision-making and a resilient cybersecurity strategy, organizations can navigate the challenges and uncertainties that lie on the horizon.

    Seth Marsh is a security specialist with over 30 years of experience in the IT industry. Before leading Sales & Marketing at TMG, Seth led sales for a global full-service security provider and served as a VAR rep focusing on security during his last 12+ years specifically while working with Cisco. This breadth of experience allows him to understand clients’ needs and the ins and outs of the supplier and distribution side.

<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 


Meet Our Partners

Our Annual Partners share a common goal: to connect, strengthen, and champion the technology community in our region. A Technology First Partner is an elite member leading the support, development, and expansion of Technology First services. In return, Partners improve community visibility and increase their revenue. Make a difference in our region and your business. 

Become A Partner

Cornerstone Partners



1435 Cincinnati St, Ste 300, Dayton Ohio 45417

Info@TechnologyFirst.org
937-229-0054

Cancellation Policy | Event Terms and Conditions | Privacy Statement