Menu
Log in
Log in


Tech News Blog

Connect with TECH NEWS to discover emerging trends, the latest IT news and events, and enjoy concrete examples of why Technology First is the best connected IT community in the region.

Subscribe to our newsletter

<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 
  • 11/04/2024 9:41 AM | Abby Pytosh (Administrator)


    Championing Tech:  The Value of Volunteerism

    For November's TECH CONNECT, a month dedicated to gratitude and giving, we’re highlighting three Tech First members who embody the spirit of service and community. Florence Renee Bacote from the Montgomery County Board of Commissioners, Jill Campbell with the Air Force Life Cycle Management Center, and Searsa Johnson of CareSource are among our most dedicated volunteers, lending their time and expertise to events like the Girl Scout Cyber Challenge and programs with the Boys and Girls Club in addition to Tech First conferences and events. Their passion for making a difference shines through in every project they touch. We sat down with Bacote, Campbell and Johnson to discuss what motivates their volunteerism and to hear their advice for those looking to get more involved.

    Read on to be inspired by their commitment to giving back!

    How did you first get involved with Technology First, and what inspired you to start volunteering?

    Bacote: I first became involved with Technology First through my employer, Montgomery County, enrollment as an attendee of the annual Tast of IT Conference and then later as a peer member of the Women 4 Tech peer group. I have always believed that volunteering can have a real impact on the lives of others in need of assistance or direction which continues to help me realize that this impact is a part of something bigger than myself.

    Campbell: There have been times in my life when I needed guidance or support and found it lacking, which has driven me to volunteer and give back to others. Volunteering offers me the chance to share my skills and expertise in ways that might benefit others and make a positive difference. I believe the knowledge exchanged through volunteering is incredibly valuable—every experience adds to my growth and understanding. Additionally, it’s rewarding to provide time and services to those who may not have access or the means to seek out this support on their own.

    What has been the most rewarding part of your volunteer experience?

    Bacote: I have really enjoyed giving my time, energy, and knowledge while connecting to others in the Dayton community. I have always enjoyed working with others and making new friends in an environment that promotes growth along with helping others learn and gain professional experience.

    Can you share a specific moment or experience that stands out to you during your time volunteering? 

    Campbell: Being sought as an expert and leader while I was facilitating a session at Taste of IT!  It was an honor to hear "I was told I needed to meet you."  To be recognized by peers as a knowledgeable leader and, in this instance, to eventually have a job offer from [the volunteer interaction], was quite a satisfying experience!

    What makes our volunteer community special, and why do you continue to give your time?

    Johnson: Connection. My continued engagement is driven by connecting with the Technology First community and their caring and dedicated staff. It is vital to be part of a community that openly discusses cyber security and evolving technology.

    How has volunteering impacted your personal or professional life?

    Bacote: Volunteering has helped keep me keen on my communication, project planning, and teamwork skills. It has also helped me to make great connections and meet new people in the Dayton community.

    Campbell:  I have been humbled by the amount of expertise I’ve been exposed to and a substantial amount of my diverse knowledge and “career wisdom” has come from the interactions with the people whom I’ve met through volunteering.  Also, it’s about the network – I can sincerely say that ALL – with the exception of TWO connections – on my LinkedIn network are people I’ve met face to face.

    What do you see as the future of volunteerism, especially within the technology sector?

    Bacote: The future of volunteerism in the technology sector will likely see a significant increase in digital volunteering, where people can use their technical skills remotely as more and more people are working in remote positions and not physically working in buildings in the community.  I still hope there will be individuals who will still want to do “in-person” volunteering.  There will always be a need for tech professionals with specific skills like web development, graphic design, and especially cybersecurity, whose technical knowledge can be more valuable when demonstrating or teaching these ideas in person with ability to give hands-on instruction or experience.  

    Campbell: The Dayton area seems to be skipped over in the areas of technology in regard to large events and connection to the surrounding areas. I believe the more volunteerism that occurs, the "louder" we can be, and the more connected Dayton will be.  Dayton is a vast source of technological knowledge and should not miss out on what is happening around us.  Lets all jump on the volunteering band wagon so we can participate in the opportunities that are happening!

    What advice would you give to someone who is considering volunteering but hasn’t taken the step yet?

    Johnson: What are you waiting for!?! For someone who is a true introvert and struggles with public speaking anxiety, volunteering with Technology First served as a steppingstone in building my confidence. These volunteering opportunities provided me a safe space to practice public speaking, enhance networking skills, and re-connecting with my peers. Sign up now!

    As we wrap up this month of gratitude, we’re reminded of the incredible impact that dedicated volunteers like Florence Renee, Jill, and Searsa have on our community. Their stories encourage us all to find ways to give back, connect, and create lasting change.

    Here’s to making a difference together!

  • 11/03/2024 10:00 AM | Abby Pytosh (Administrator)

    Conferences. Are they just a whirlwind of half hearted networking, average coffee, and questionable after-parties? Not for me! I see conferences as a goldmine – a chance to unearth valuable insights, capture educational moments, and ultimately, boost my sales.

    Here's the thing: most people attend conferences, passively absorb information, and then…crickets. But the real magic happens after the event. It's about taking those nuggets of knowledge and weaving them into your sales strategy.

    Here's how to turn conference chatter into client conversions:

    1. The "Hot-off-the-Press" Pitch:

    ● Identify Key Takeaways: Jot down the most impactful trends, innovative solutions, and industry challenges discussed.

    ● Craft a Timely Narrative: Incorporate these insights into my outreach. For example, "At the recent [Conference Name], there was a lot of buzz around [hot topic]. It got me thinking about how [your company] could help businesses like yours navigate this…" Be as specific as possible about how the learnings from the conference can apply to your specific prospects environment.

    ● Establish Thought Leadership: Sharing these timely insights positions me as an expert and demonstrates that I'm invested in staying ahead of the curve.

    2. Name Dropping Done Right:

    ● Strategic Networking: Make a point of connecting with influential speakers and industry leaders.

    ● Leverage Connections: In follow-up emails, you might say, "[Speaker Name] made a great point about [topic] at [Conference Name]. It resonated with me because…" This adds credibility and context to your outreach.

    ● Build Relationships: Conferences are a breeding ground for genuine connections. These relationships can translate into warm leads and referrals down the line.

    3. Content is King (and Conferences are the Kingdom):

    ● Repurpose Content: Leverage conference presentations, workshops, and keynotes to create valuable content for my prospects. Think blog posts, social media updates, or even short videos summarizing key takeaways. Don’t be afraid to take selfies or quick videos in the hallways.

    ● Offer Exclusive Access: Sharing exclusive insights or resources from the conference adds value to my outreach and incentivizes prospects to engage.

    4. The Follow-Up Frenzy:

    ● Strike While the Iron's Hot: Follow up with connections and leads immediately after the conference. The event is still fresh in their minds, making them more receptive to my message.

    ● Personalize Your Approach: Reference specific conversations or shared experiences to make your outreach more meaningful.

    Conferences are an investment – of time, money, and energy. But by strategically leveraging the learnings and connections, I turn that investment into a sales bonanza. So, the next time you're at a conference, remember: don't just attend, capitalize!

    About NextStep Networking: NextStep Networking partners with schools to excite and empower students, businesses that make us think, non-profits that want to maximize their impact and government agencies that rely on safety and security. We will bring new ideas and find creative and innovative ways to help your business with technology. Built on a foundation of integrity and community partnership, we believe that helping other like-minded organizations prosper will pave the way to a better future. Join our mission of making a positive impact in the lives of those we serve.

  • 11/01/2024 10:00 AM | Abby Pytosh (Administrator)


    As 2024 draws to a close, the business landscape is evolving rapidly, especially in enterprise communications, technology, and economic trends. For companies to stay competitive, it is essential to remain informed and adaptable. Below, we explore the key developments and insights that will define enterprise communications in the year ahead.

    Key Industry Trends in Enterprise Communications

    AI’s Expanding Role in Customer Experience and Call Centers
    Artificial intelligence (AI) continues to transform customer service and call centers by improving efficiency and personalization. Many businesses are integrating AI-powered tools to automate repetitive tasks, streamline interactions, and provide customized experiences. As AI becomes more advanced and accessible, its adoption will only grow, though the rising costs of implementation and maintenance remain a challenge. Maximizing the potential of AI requires leveraging its data across various departments—sales, marketing, and support—to create a seamless and integrated customer journey.

    New Compliance Regulations for Financial Services
    The European Union’s Digital Operational Resilience Act (DORA) will go into effect in January 2025, impacting financial institutions and their technology providers. These firms must meet rigorous cybersecurity and operational resilience standards, requiring gap analyses, improved risk management, and resilience testing. While DORA directly affects financial services, businesses in other sectors, including enterprise communications, will also need to prioritize securing their data and systems to stay compliant across industries.

    The Evolution of Hybrid Work

    Hybrid work models have become a permanent feature of the post-pandemic business world. Although some organizations aim for a return to full-time office work, many employees still prefer the flexibility of hybrid setups. The challenge for businesses is to sustain collaboration, productivity, and company culture in this environment. Investing in advanced video conferencing, collaboration platforms, and secure remote access tools will be critical for staying competitive and attracting talent.

    Key Timelines and Regulatory Changes

    • January 2025: DORA compliance deadline for financial services and related industries. Ensuring cybersecurity and resilience standards are met will be vital to avoid penalties.

    Challenges and Opportunities for Businesses

    Economic Uncertainty
    Inflation, layoffs, and commercial real estate challenges are contributing to an uncertain economic landscape. Businesses need to be agile, managing costs carefully while investing in technologies that will future-proof operations.

    Rising AI Development Costs
    While AI offers considerable efficiency gains in customer service and other areas, the costs associated with its deployment and maintenance are increasing. Businesses must evaluate the long-term return on investment (ROI) of AI solutions to ensure scalability and adaptability to future needs.

    Evolving Communication Tools
    The importance of video conferencing, collaboration platforms, and messaging apps has grown immensely. Companies should continually assess their tech stack to ensure they are using flexible, secure, and well-integrated communication tools that align with their broader business systems.

    Strategic Recommendations

    1. Invest in AI Thoughtfully: AI can be transformative, but strategic integration across departments is key. Focus on scalable AI solutions that deliver valuable data insights while integrating with existing technologies.
    2. Prepare for Regulatory Changes: Businesses in finance and technology must align with new regulations like DORA. Regularly review cybersecurity protocols, third-party contracts, and resilience measures to avoid compliance risks.
    3. Support Hybrid Work Models: Hybrid work is here to stay. To remain competitive, invest in technologies that enable employees to seamlessly transition between office and remote work, ensuring productivity and security.
    4. Optimize Communication Platforms: Companies should consider consolidating communication tools that offer security, resilience, and integration with IT systems to ensure smooth operations.

    Looking Ahead

    The remainder of 2024 and early 2025 will bring both challenges and opportunities, including advances in AI and tightening regulatory landscapes. By staying informed, businesses can navigate these changes effectively. Balancing innovation with economic and regulatory readiness will be crucial for long-term success.

    At NexusBlue, we are dedicated to helping businesses make informed decisions and adapt to the ever-changing enterprise communications and technology landscape. By acting now, organizations can position themselves for sustainable success and long-term resilience.

    NexusBlue
    NexusBlue specializes in rescuing, fixing, and reimagining business operations through enterprise communications, digital transformation strategies, and AI assessments. We help companies navigate the complexities of technology and regulation to drive lasting ROI in today’s fast-evolving business environment.

  • 10/01/2024 10:02 AM | Abby Pytosh (Administrator)

    As a business owner, it’s easy to focus on growth, customer service, and day-to-day operations while discounting cybersecurity. However, in a world where 46% of cyberattacks target small and medium-sized businesses, maintaining a secure digital environment is not just important—it’s critical for survival.

    This blog dives into the key cybersecurity practices for small and medium-sized businesses, to help you protect your organization from malicious threats and costly ransomware attacks.

    Why Are SMBs a Target?

    The answer lies in their limited cybersecurity infrastructure. While large corporations invest heavily in advanced security systems, smaller businesses tend to have fewer resources or budgets. However, just because your business is small doesn’t mean you have to an easy target.

    Common Cyber Threats Facing SMBs

    Understanding the types of cyber threats your business may face is the first step in building a strong defense. Preparing for security incidents is an important business practice.  Here are the common attack methods cybercriminals use:

    1. Phishing Attacks

    Phishing remains one of the most popular methods used by cybercriminals use. These attacks typically involve fraudulent emails that use urgency, deceptive visuals and links, and impersonation to trick employees into clicking on malicious links or sharing sensitive information.

    2. Ransomware

    Ransomware attacks involve encrypting a company’s data and demanding a ransom to restore access. In many cases, businesses are left crippled for multiple days or weeks without access to their own information. Even after paying the ransom, there’s no guarantee the attackers will return the data.

    3. Malware

    Malware is malicious software that can infiltrate your systems to damage, disable, or exploit your data. This broad category includes adware, spyware, and viruses designed to cause harm or steal valuable information.

    4. Weak Passwords and Credential Compromise

    Weak, reused, or stolen passwords remain one of the biggest cybersecurity risks. A compromised credential allows an attacker to bypass security protocols and gain direct access to sensitive systems.

    Small Business Cybersecurity Best Practices

    Implementing robust cybersecurity measures doesn’t have to be overwhelming. Here are practical steps you can take to protect your business:

    1. Use Multi-Factor Authentication (MFA)

    Multi-factor authentication (MFA) requires users to provide two or more verification methods—such as a password and a security code—before gaining access to the system.

    2. Regularly Update Software

    Outdated software is a major vulnerability. Whether it's operating systems, web browsers, or specialized business software, keeping everything up-to-date is essential. Many updates contain patches for security flaws that have been identified.

    3. Create Strong Password Policies

    Ensure your employees are using strong, unique longer passwords for each of their accounts. Implement a password policy that requires complex combinations of letters, numbers, and symbols, and encourage regular password changes.

    4. Educate Employees on Cybersecurity

    Your employees are your first line of defense and greatest vulnerability. Provide regular training helps them identify current phishing scams, social engineering, and recognizing and reporting potential security breaches.

    5. Conduct Regular Risk Assessments

    A risk assessment helps identify areas of vulnerability. This involves a third party evaluating your current cybersecurity practices, identifying potential threats, and implementing strategies to address them. Regular assessments help you stay ahead of evolving threats and ensure that your defenses remain effective.

    6. Backup Your Data

    Data backups are critical to recovering from a cyberattack. Ensure that your business performs regular backups of all important data to an encrypted, offline location. This way, if you do experience a breach—such as a ransomware attack—you can restore your systems faster without losing significant data.

    7. Install Firewalls and Anti-Malware Software

    Investing in firewalls and anti-malware software is a non-negotiable aspect of cybersecurity. A firewall monitors incoming and outgoing traffic and blocks suspicious activity, while anti-malware software detects and removes malicious software before it can do damage.

    8. Install Endpoint Protection

    Every endpoint (laptop, mobile phone, tablet, etc.) that connects to the corporate network is a vulnerability, providing a potential entry point for cyber criminals. It is imperative for businesses to deploy endpoint solutions that can analyze, detect, then block and contain cyberattacks on remote systems.

    9. Develop an Incident Response Plan

    An incident response plan outlines the steps to take in the event of a security breach. This plan includes who to contact, how to contain the breach, what to communicate, and the order of systems to be restored based on their importance for conducting business. Regularly practicing incident response through simulations helps your team respond effectively when a real threat arises.

    Additional Cybersecurity Considerations for SMBs

    While the best practices outlined above are foundational, you can further strengthen your business’s security posture by considering these additional measures:

    1. Mobile Device Management

    As more employees work remotely or bring their own devices to work (BYOD), managing mobile security becomes critical. Implement mobile device management (MDM) software that enables your business to monitor, secure, and manage all employee devices that have access to company data. This allows you to enforce security policies and wipe devices remotely if they’re lost or stolen.

    2. Secure Your Wi-Fi Networks

    Unsecured Wi-Fi networks are an open invitation for hackers. Ensure your business’s Wi-Fi networks are encrypted, and consider segmenting networks for employees, guests, and business systems. This prevents unauthorized access and reduces the risk of data interception.

    3. Perform Penetration Testing

    Penetration testing involves simulating cyberattacks on your system to identify weaknesses before actual attackers can exploit them. Hire a cybersecurity professional to conduct these tests to provide recommendations on how to address vulnerabilities.

    Free Small Business Resources

    There are a number of free resources available from the federal government and the State of Ohio to reduce your risk to potential cybersecurity threats including:

    Final Thoughts

    By following these cybersecurity best practices, your company can create a strong digital defense and focus on what really matters—growth and success. Remember, being cyber aware means being cyber prepared.

    Author Bio: As the CEO and Founder of Secure Cyber Defense, Shawn leads a dedicated team committed to safeguarding organizations across the entire spectrum of cybersecurity needs. From perimeter defense to secure network design, and vulnerability discovery to intrusion detection systems, Secure Cyber Defense offers comprehensive solutions tailored to meet the evolving challenges of today’s digital landscape. With over two decades of experience in cybersecurity and information systems, Shawn brings a wealth of expertise to the table. He specializes in leading security teams to bridge the gap between technology and business objectives, empowering informed decision-making that protects assets from both internal and external threats.

  • 10/01/2024 10:00 AM | Abby Pytosh (Administrator)

    As Cybersecurity Awareness Month kicks off in October, it’s a great time to remind everyone at your company to practice cybersecurity awareness to protect against cyberattacks and data breaches. Of course, there’s no completely foolproof way to keep threat actors from attempting to infiltrate your network. But taking these four preventative steps can significantly reduce your cyber risk.

    Use strong passwords

    Using strong passwords is an easy way to safeguard your apps and digital accounts. At Pondurance, we recommend that users choose passwords with at least 16 characters including uppercase, lowercase, numbers, and symbols. Also, we suggest that users choose a unique password for each of their accounts and never reuse their personal passwords for company accounts.

    Like most people, you probably have dozens of accounts with passwords, and remembering all those passwords is a difficult task. That’s where the use of a password manager comes in. A password manager program generates strong passwords, stores them, and autofills the passwords. That way, you don’t have to remember your passwords or write them down. But be sure to use a strong master password that you can easily memorize for the password manager account.

    Implement MFA

    Turning on multifactor authentication (MFA) can make it especially tough for a threat actor to access your accounts. That’s because MFA requires two or more factors, such as a password, PIN, or verification code, to authenticate your identity at login. The added layer of protection may be the single most important thing you can do to defend against threat actors. Your company should have MFA implemented on every device to avoid being vulnerable to exploitation.

    MFA has even become a strict requirement to qualify for a cyber insurance policy. Increasingly, cyber insurers want to see that companies have MFA implemented on every device on a company’s network.

    Identify phishing

    The Pondurance security operations center (SOC) team ranks phishing as the top method of credential compromise for email users. During a phishing attack, a user gets an email from someone claiming to be a known, reliable source and is fooled into providing credentials, such as passwords, credit card numbers, or bank accounts. The team reports that phishing emails with a financial lure are common fraud schemes during tax season, and malware delivery via phishing emails is an increasing threat. FBI data confirms the team’s conclusions, showing that phishing/spoofing is reported over five times more often than any other type of cybercrime.

    In past years, phishing emails were often easy to identify due to their awkward language and poor grammar. Today, it’s not as easy to distinguish a phishing email. Artificial intelligence (AI) services, such as ChatGPT, are now making phishing emails more difficult to detect because AI helps threat actors use convincing language and proper grammar in the email text.

    To reduce the risk of an attack, the SOC team suggests that you set inbox rules to detect any unauthorized activity and provide user awareness training for everyone at your company. User awareness training helps your employees, executives, and board members identify phishing emails and learn how to report suspicious activity.

    Make updates

    Updates fill the gaps or vulnerabilities that threat actors look to exploit in operating systems, software, and apps. Making updates can fix security bugs, protect against malware, improve performance, and more. The cybersecurity team at your company should stay informed about newly disclosed vulnerabilities and perform needed updates and patches as quickly as possible to keep threat actors out of your network.

    Conclusion

    Making cybersecurity awareness a priority at your company can help you protect against cyberattacks and data breaches. Using strong passwords, implementing MFA, identifying phishing, and making updates are four preventative steps that can significantly reduce your cyber risk during Cybersecurity Awareness Month and all year long.


    Author Bio: Mike has enjoyed a career of more than forty years of operations and sales experience in the information technology and cybersecurity industry at IBM, Siemens, Sprint, and AT&T as well as several smaller and startup businesses. He has spent the past twelve years at Pondurance helping organizations tackle the challenges of cybersecurity to better protect their clients and their hard-earned brand reputation. Mike is active in the Central Indiana Information Systems Security Association (ISSA) chapter and is a member of InfraGard, a partnership between the FBI and members of the private sector.

  • 09/01/2024 10:03 AM | Abby Pytosh (Administrator)

    After the successful launch of Technology First's Emerging Tech Leaders program, we sat down with Coach Mike for an insightful Q&A. In this conversation, he delves into the inspiration behind the program, the pressing need to cultivate the next generation of IT leaders, and his thoughts on the evolving role of IT leadership in shaping the future.

    Question: What inspired you to design the Emerging Tech Leaders program?

    Coach Mike: It was a combination of a several things, but I think they all had the same underlying theme which was the massive gap in leadership and people-management focus in IT. We are a population of engineers and technical-minded people who have lived our lives relying on our logic and reason to solve everything. So often people are promoted into leadership positions and are never prepared or trained to digest and respond to the complexities of balancing technical decisions with the emotional needs of people and maintaining business relationships.  

    Question: What key skills and competencies do participants develop in the program?

    Coach Mike: Over 12 weeks and six sessions, we explore:

    • participants’ leadership styles and values,
    • performance management and measuring success,
    • recruiting and onboarding,
    • relationships, alliances, and politics,
    • as well as looking at IT from a business perspective rather than from a technical perspective.

    I could probably spend six-weeks on any one of those topics, but the goal is to provide participants with exposure to experiences that we don’t talk about often or hear about but haven’t gone through. Then, help the participants understand the mechanics of each topic. Each session in the course is designed to equip attendees with insights, new tools, and various perspectives on how to navigate complex situations when they return to their roles.

    Question: How does the program's interactive, scenario-based approach enhance leadership learning?

    Coach Mike: Consistently, people say “I’m a hands-on learner.” In fact, I can’t think of a single time anyone has ever said to me “I can’t learn anything hands-on; what I need is a good PowerPoint presentation.” As we cover these principles, we put participants in complex scenarios, and the scenarios compound over the program. By the end of the course, we’re able to look at a scenario and consider the results of an action, balancing the financial, emotional, and relational aspects and perspectives of our customers, teams, and leadership.

    Most of the scenarios are not meant to be “solved;” it’s not even about finding a “right” answer; instead, it’s about managing complexities and understanding the impact of decisions.

    Question: Can you share an example of a scenario participants might encounter during the program?

    Coach Mike: We had talked about who we are as a leader and started to inspect our competencies and areas of growth, as well as how that aligned with the organization we are in. In the week this scenario was presented we were discussing performance management and measurement.

    The class was asked to consider all aspects of the scenario and put together a plan.

    The point is not necessarily to solve the situation, but more to consider – and manage - all the dimensions at play. There’s no “right” answer; the appropriate or productive actions to take can vary wildly depending on the organization’s expectations and principles as well as the managers personal management style and values.

    Also worth mentioning is that this is one of seven possible scenarios that groups are given, and this is probably one of the less complex situations.

    Question: What unique challenges do new and aspiring IT leaders face today, and how does the program address them?

    Coach Mike: IT leaders experience many of the same challenges that plague other leaders, especially ones who are leading highly specialized functions. And like other leaders, one of the most common challenges is often lack of training.

    What I see that is unique to IT is the perception that IT is nothing more than a service center for the business. Pair that with technology solutions being oversimplified and the entire vocation seemingly being “magic,” and we are often overlooked when key decisions are made. We’re brought in far too late or handed a solution which is not viable for various reasons. Our Emerging Tech Leaders program helps by addressing this potentially detrimental dynamic, putting an emphasis and awareness around building a strong professional network, building business alliances, presenting IT as a business solution in clear, relatable terms, and making the IT team easy to work with as a partner.

    Question: How do peer group collaborations contribute to the learning experience?

    Coach Mike: This is one of my favorite things about the program! Having a diverse mix of industries, experience, and company sizes has proven to be very valuable, enriching our discussions. There are perspectives that people in small companies have that can influence a department leader to think more broadly, such as customer impacts. Conversely, a larger business typically has a very broad range of controls and policies that small groups may not be aware of, but either need or will need, such as IT Security or DevOps.

    Sharing perspectives on team culture, hiring practices and relationship building from various backgrounds helps broaden everyone’s understanding and approaches.

    Question: How does the program help participants navigate the unique challenges of the tech industry?

    Coach Mike: Tech can be a bit of a black-box and sort of magical to a lot of people, so one of the biggest challenges of working in tech is trying to relate what we’re doing to objectives that make sense to others and building confidence in our business partner. Our program focuses on giving participants the tools to navigate their work culture and figure out messaging that instills trust in their organization. Inspiring trust and comradery goes much further than a lot of buzzwords and generic communication strategies that are too vague to apply to complex cultures and relationships.

    Question: What advice would you give to someone considering joining the next cohort?

    Coach Mike: I’d advise them to just sign up! This isn’t your typical training. We don’t hand out scripts. Instead, we explore how to grow as leaders, peers, and team members.

    You’ll develop a cohort of peers, work closely with them on common goals, share insights, and solve problems together. Every session we explore lessons learned since the previous session; demonstrating how the principles we discuss influenced real actions.

    Question: How do you see the role of emerging tech leaders evolving over the next few years?

    Coach Mike: Over the past few years, I’ve seen growth in “functional” leadership. Roles like Scrum Masters and Technical Leads as well as Senior Technologist and Architects are establishing themselves as valuable leaders to have at the table. Leadership is shifting from purely technical roles to business partners.

    Some of the best leaders I have worked for were more skilled in project management and navigating relationships than in technical disciplines.

    The best organizations are moving toward enabling leaders and managers to focus on career development, coaching, organizational relationships, coordination and planning. Ultimately, organizations that embrace autonomy and self-regulation, empowering leaders to navigate and collaborate - versus a hierarchical and/or matrix structure - will be leaders in their industries, realize increased productivity and deliver more success.

    Author Bio: After decades in the IT industry, moving in and out of various technical and leadership positions, Coach Mike Czarnecki was introduced to a transformational leadership coach. Working with a coach changed his life and made him realize that his love of people and personal accomplishment could be more than a task that he was expected to do off the side of his desk. With nearly 30 years of experience in large, medium, and small business, as an individual contributor and leader, a full-time employee and consultant, an employee and business owner, Mike turned his passion into reality by adding IT coach to his resume.

  • 09/01/2024 10:02 AM | Abby Pytosh (Administrator)


    For the first time in United States history, we have five different generations in the workplace.

    • Traditionalists – born 1925 – 1945
    • Baby Boomers – born 1946 – 1964
    • Generation X – born 1965 – 1980
    • Millennials – born 1981 – 2000
    • Generation Z – born 2001 – 2020

    As an employer, the quicker you understand the skills and motivation each generation brings to your company the better. The interaction of these different generations is a valuable asset for your company. Working together, they can assist you in building the most productive and innovative workforce in your company's history.  Each generation has unique lived experiences - ranging from the Great Depression and WWII to the Vietnam War, September 11th and prolonged unrest in the Middle East, as well as many other important cultural and historical events.

    These diverse experiences lead to varying values and expectations in the workplace. For these reasons, employers face challenges in setting up compensation and benefit systems as well as creating workplace cultures that reflect the needs of all generations. This is potentially the most challenging time in history for Human Resource professionals to build effective teams and for Leaders to guide them to ultimate success.

    1. Understanding Experiences and Expectations: The first step to managing a multi-generational workforce is to understand each generation's experiences and expectations to best meet and address their needs. This infographic from Purdue highlights trends within each of the generations.
    2. Strategy of Strengths: Once your company understands these generational differences, you can begin to build your workforce strategy in order to best incorporate the strengths of the different generations. A solid workforce strategy will help ensure sustainability, healthy growth, and success. This strategy can help you identify talent and skills gaps, forecast supply and demand, and ensure that you have the right people to meet your strategic objectives. Benefits of a solid workforce strategy include reduced hiring costs, fewer talent gaps, increased retention, and better management of risk.
    • There are several steps to building a workforce strategy and the process always starts with defining workforce needs based upon your strategic organizational goals. Next, analyze market trends for each need as well as your internal trends (e.g. retention, turnover). After you have defined your needs, evaluate your current talent and figure out how you can tap into other sources of manpower to fill your needs. It is always recommended that your workforce strategy is diverse and tailored to your specific company. Tap into the plethora of resources in our region including interns, new graduates, mid-senior level transfers, upskilling, and a diverse range of candidates including older adults, veterans, new Americans, reentered citizens, and people with disabilities. With a robust balance of employee sources, you can ensure a strong workforce as well as a deep bench of new employees.

    3. Monitor & Adjust: After you develop your workforce strategy, it is crucial for your company to continue to assess your plan, your outcomes, and your success in order to make necessary adjustments to ultimately achieve your company’s goals. 

    Embrace the opportunities a diverse generational workforce presents to create a robust culture capable of tackling challenges and driving growth and success. 


    Author Bio: Cassie Barlow is the President of SOCHE, a non-profit organization that collaborates with Higher Education, K-12, employers and government in order to impact economic development through education and employment.

  • 09/01/2024 10:01 AM | Abby Pytosh (Administrator)


    I recently presented at my company’s Board of Advisors meeting. After I shared several technical slides on progress, challenges, and next steps, a trusted board member observed that, while the information was good, I am not an IT leader: I am a “Business Leader who just happens to lead the IT function.” What a valuable and validating reminder! Valuable, because you should always deliver messaging from IT using a business framework—a fact I temporarily forgot in my excitement to share the impressive work my team had accomplished. Validating, because I don't have deep technical knowledge; but, while IT knowledge is important, you can be a great IT leader without knowing how to build a server or develop an application. 

    I have spent most of my corporate career leading enterprise project management offices (ePMOs).While most of those projects had an IT component, and somewhere wholly focused on IT, leading an IT group is another task entirely. By nature, the ePMO is controlled and predictable (I'm very good at planning and controlling—I often say that I am a control enthusiast ;)). But good planning and control will only take you so far in IT. The rest of the journey requires that you build a clear strategy, foster a strong leadership team, and stay aligned to the business’s mission. 

    When I was offered the VP of IT position at LION, I was excited about the role and knew that I could do it well. I must admit, though, that I didn't sleep much the first few months. There are many things that weigh heavily in IT: the seeming inevitability of cyber-attacks, being responsible for reliable and secure infrastructure, simply ensuring that every employee can do their job every day, and that's before the forward-looking innovation and AI activities expected from any business-focused IT group! When it comes to leadership, it is unreasonable to think that a single person would, or could, have a deep understanding of it all. 

    Perhaps because of this, it’s becoming common for IT leaders to have a general technical background but proven success leading teams. I believe that is due, in part, to the breadth of IT topics and the pace at which technology changes. So, while I'm still learning new things every day, I'm sleeping better at night. Here are a few things that have helped and that I would recommend to others. 

    • Find awesome mentors: First and foremost, ask for help in the early days. Find mentors you trust, preferably outside of your organization like board members or people from your network. Take folks to lunch and ask them to share their own experiences. Listen intently and ask clarifying questions but recognize when you’ve heard enough. It’s easy to become paralyzed by a large amount of advice from great mentors, so once your brain is at capacity, trust your gut to create a cohesive strategy that meets the needs of your department. It doesn’t have to be perfect; your plan will evolve over time.  

    • Identify your leaders: In the beginning, spend a good deal of time listening to your team. You’ll quickly learn who the natural leaders are and who is interested in a leadership position. Make a distinction between technical and people leadership, communicate the importance of both, and be sure people are in the right roles. More than anything else, identify great leaders who balance your own skills, put them in place, and trust them to do their job.  

    • Become a deep generalist: To compensate for a lack of deep technological background, embark on a journey to become a deep generalist in all things IT. Join professional networks like Technology First, keep in touch with your mentors, read industry related articles, and sign up for newsletters that will keep you up to date on technology trends.    

    • Focus on the foundation: Be sure you have a solid foundation on which to build your IT future. In today’s world, security is a key priority. Make sure that you have a robust cyber security posture that includes user training and awareness. If you don’t, or are unsure, hire someone to do an assessment. In addition, be sure your IT Service Management (ITSM) tool meets your needs and provides the data necessary for informed decisions. Finally, to achieve business goals, it is important to have a flexible and scalable infrastructure. Consider cloud solutions, integration software, and a data architecture that will help you quickly meet business needs. 

    • Prioritize the work: As any good leader knows, there will always be twice as many things that you want to do than what you have the capacity, time, and money for! Prioritize the work and communicate the plan to your team so everyone stays focused on the most important things. I’m lucky enough to have a strong ePMO that helps us develop the project list and prioritize with consideration for business requests and overall strategy. If you aren’t as lucky, be sure to develop and communicate your own priority standard to set expectations across the board. 

    Stepping into the IT leadership role has been both challenging and rewarding. It has required me to shift my perspective to a broader business narrative, ensuring that IT's contributions align with the company's strategic goals. By embracing the mindset of a business leader, I've learned that successful IT leadership isn't about mastering every technical detail. It’s about guiding the team with a clear vision, fostering strong leadership within the team, and ensuring that our IT initiatives support the business's growth and resilience. Though IT is at the heart of modern business, the most important function of any IT leader is to connect the dots between technology and the business outcomes that drive success. 

    Author Bio: Apryl Van Oss joined LION in May 2019 and accepted the position of Vice President of Information Technology in August of 2023. In this role, Apryl is committed to building a strong team that is ready to optimize LION systems and processes for organizational growth, efficiency, and innovation. Prior to joining LION, Apryl spent over 20 years working in diverse environments and has established several successful enterprise-wide Project and Portfolio Management Offices across various industries including legal, business, healthcare, insurance, and manufacturing.

  • 09/01/2024 10:00 AM | Abby Pytosh (Administrator)


    As we navigate the ever-evolving landscape of the technology industry, I am thrilled to share our organization’s unwavering commitment to workforce development. Our mission is clear: to connect, strengthen and champion the technology community. 

    The Power of Skill Enhancement 

    In an era where innovation drives progress, investing in skill enhancement is paramount. Our programs, workshops, and leadership training initiatives empower individuals to upskill, reskill, and adapt to emerging trends. Whether it’s mastering cloud computing, honing data analytics expertise, or diving into cybersecurity protocols, we believe that continuous learning is the cornerstone of success. 

    Bridging the Diversity Gap 

    Diversity fuels innovation. We recognize that a vibrant tech ecosystem thrives on varied perspectives, backgrounds, and experiences. Our commitment to inclusivity extends beyond mere rhetoric. Through our Women 4 Tech conferences and peer group meetings, targeted outreach, scholarships, and partnerships with organization like NPower, Sinclair College and so many more, we are bridging the diversity gap. Together, we can create a tech workforce that mirrors the world we aspire to build. 

    Nurturing Future Leaders 

    Our vision extends beyond immediate skill acquisition. We are passionate about nurturing future leaders. Our Emerging Tech Leaders program connects seasoned professionals with aspiring talent, fostering a culture of knowledge-sharing and growth. And we celebrate the achievements of our current leaders at the annual Leadership Awards. We also invest in the potential of those who will shape the industry’s trajectory through annual scholarships to college students. 

    Industry-Driven 

    The tech landscape evolves swiftly, and so must our educational offerings. Our conferences, events, workshops and programs are designed in collaboration with industry leaders, ensuring that you are equipped with relevant, real-world skills. From agile development methodologies to ethical AI practices, our offerings prepare individuals to thrive in dynamic workplaces. 

    Your Role in Our Journey 

    You play a pivotal role in our journey. Your insights, support, and advocacy drive our initiatives forward. As we embark on this exciting path of workforce development, I invite you to engage actively, share your expertise, and champion our cause. Together, we can build a resilient, adaptable workforce that propels the technology industry to new heights. 

    Thank you for your unwavering commitment to our shared vision. Let us continue to shape the future, one skill at a time.

    #UniteDaytonTech 


  • 08/01/2024 9:21 AM | Abby Pytosh (Administrator)

    Introduction

    In today's rapidly evolving technology landscape, sustainability is a critical consideration. Balancing innovation with environmental impact is essential for organizations aiming to reduce waste and resource consumption. One area where sustainable practices can make a significant difference is in managing the lifecycle of personal computers (PCs).

    The Windows Dilemma

    Windows 10 End of life
    As Windows 10 reaches its end of life – October 2025, organizations face a challenge. Many PCs running Windows 10 won't meet the hardware requirements for Windows 11, leaving users with outdated systems. The traditional approach would be to replace these PCs with new ones, resulting in increased e-waste and unnecessary expenses.

    Instead, is it time to rethink your desktop strategy?

    The Alternative: Cloud-Based Solutions
    Amid the Windows 10 End of Life challenge, organizations must consider sustainable alternatives. Let’s delve into three cloud-based solutions that extend PC lifecycles and reduce e-waste:

    1. Cloud PCs

    Cloud PCs offer an innovative solution. By moving desktop environments to the cloud, organizations can extend the life of existing hardware. Here's how it works:

        Virtual Desktops: Microsoft's Azure and Windows 365 offer virtualized Windows desktops accessible from any device with an internet connection. With the ability to scale Cloud PCs up or down according to your needs, provide secure access from remote locations, and support key scenarios like bring-your-own-device (BYOD) programs, Windows 365 helps lower environmental impact [1].

    2. Thin Client and Virtual Desktops

        Thin client such as IGEL OS: Instead of replacing hardware, consider loading a thin client like IGEL OS onto existing devices. IGEL OS is a lightweight, read-only operating system designed for secure access to virtual desktops and applications. It extends the life of older PCs by repurposing them as thin clients, reducing e-waste and saving costs.

        Virtual Desktop Infrastructure (VDI): Implementing VDI solutions allows users to access their desktops and applications remotely. By centralizing management and security, organizations can reduce the need for resource-intensive agents on individual endpoints.

    Benefits of Sustainable Approaches
    While virtual desktops are not a new concept, there’s a common perception that they’re an expensive solution. However, this doesn’t have to be the case. As we come full circle, let’s explore additional benefits of adopting a new desktop strategy:

    1. Cost Savings: Avoid unnecessary hardware purchases and reduce IT management costs associated with maintaining multiple endpoints.

    2. Environmental Impact: By extending PC lifecycles, we decrease e-waste and contribute to a more sustainable future.

    3. Security: Read-only operating systems like IGEL OS enhance security by minimizing attack surfaces and reducing vulnerabilities.

    Conclusion
    As IT leaders, CIOs, and IT managers, embracing sustainable technology practices is not only responsible but also economically advantageous. By leveraging cloud-based solutions and repurposing existing hardware, organizations can extend the life of PCs, reduce costs, and contribute to a greener planet.

    Remember, the future of technology lies in our hands—let's make it a sustainable one! [1]  [2].

    Disclaimer: The information provided in this article is for educational purposes only. Always consult with your organization's IT experts before implementing any changes.

    References:

    1. Reducing the environmental impact of Windows devices
    2. Microsoft Cloud for Sustainability: Empowering organizations on their path to net zero
    Source: Conversation with Copilot, 7/25/2024
    1.  Reducing the environmental impact of Windows devices
    2. Microsoft Cloud for Sustainability: Empowering organizations on their ...
    3. Tech Trends: Windows PCs help Microsoft meet its commitments to ...

    Author Bio: Todd Wind has 13 years in the technology consulting industry serving the Cincinnati/Dayton business community. At CPC, Todd focuses on helping clients deliver a fast, secure, reliable, and consistent experience to their employees as they access the applications and data needed to run the business. 

<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 


Meet Our Partners

Our Cornerstone Partners share a common goal: to connect, strengthen, and champion the technology community in our region. A Technology First Partner is an elite member leading the support, development, and expansion of Technology First services. In return, Partners improve community visibility and increase their revenue. Make a difference in our region and your business. 

Become A Partner

Cornerstone Partners



1435 Cincinnati St, Ste 300, Dayton Ohio 45417

Info@TechnologyFirst.org
937-229-0054

Cancellation Policy | Event Terms and Conditions | Privacy Statement