Menu
Log in
Log in


Tech News Blog

Connect with TECH NEWS to discover emerging trends, the latest IT news and events, and enjoy concrete examples of why Technology First is the best connected IT community in the region.

Subscribe to our newsletter

  • 02/27/2024 1:26 PM | Marla Halley (Administrator)

    In the ever-evolving realm of technology, companies are beginning to realize that diversity and inclusion are critical factors for innovation and progress. Even with this new burgeoning era of understanding, it's clear that women, though brimming with potential, are still vastly underrepresented. Bridging this gender gap requires a concerted effort to empower, encourage, and lead women to pursue careers in technology. One impactful approach to this issue is through skill-based education, providing women with the tools and knowledge they need to excel in the world of tech.  

    The Gender Disparity in Tech  

    Historically, the tech industry has been male dominated, with women comprising a small percentage of the workforce. This disparity is not due to a lack of interest or capability of women but is often attributed to systemic barriers and societal stereotypes that discourage them from pursuing tech-related careers. From high school advanced math programs that historically target males to pop culture and media consistently showing only men as the tech guru sidekicks who help the heroes outwit the villains, the narrative to women and young girls has been, “technology is not the space for you.”  

    The Power of Skill-Based Education 

    Skill-based education serves as a powerful equalizer. By focusing on tangible skills and hands-on learning, women can build the confidence and competence needed to break through barriers in the tech industry. It allows women to equip themselves with coding prowess, data analytics finesse, and cybersecurity wizardry through online courses, coding bootcamps, and engaging workshops, with much less financial cost.  

    Creating Inclusive Learning Environments 

    Imagine this: vibrant communities, mentorship bonds, and initiatives celebrating the triumphs of women in tech. That's the environment we need to foster—one where diversity is not just acknowledged but celebrated. Educational institutions and organizations must actively break down biases within their curricula, ensuring that every woman feels seen and supported.  

    Overcoming Stereotypes 

    Let’s be candid; stereotypes often portray women as less suited for STEM fields, perpetuating the myth that certain professions are a man's world. But within the realm of skill-based education, we shatter these stereotypes, spotlighting the accomplishments of remarkable women who have not only excelled but thrived in tech.  

    Building Confidence Through Hands-On Experience 

    One of the key benefits of skill-based education is the emphasis on practical, hands-on experience. By working on real-world projects, women can gain the confidence and expertise necessary to navigate the tech industry. This approach not only equips them with technical skills but also develops problem-solving abilities and critical thinking—strong qualities for success in any role. Studies have long shown women hesitating to apply for tech roles, even when their skills rival their male counterparts. Skill-based education addresses this by providing a clear pathway for women to develop and showcase their abilities. As they witness the tangible results of their learning, barriers begin to break down, and confidence soars.  

    Conclusion 

    Let's dismantle the barriers, champion diversity, and celebrate the triumphs of women in tech. By investing in skill development and providing accessible learning opportunities, we aren't just shaping individual success stories; we're creating a platform for women to stand shoulder to shoulder, their brilliance resonating in every innovation and breakthrough. It’s time to make tech an inclusive space. It's time to harness the full potential of diverse talent and build a future where women are equally represented and celebrated in the world of technology, where their unique contributions produce of story of empowerment and achievement. 


  • 02/27/2024 12:59 PM | Marla Halley (Administrator)

    In the dynamic world of technology, authenticity is not just a choice; it's a superpower that propels women forward in their journey through challenges and opportunities alike. As a woman in IT, I've found that embracing authenticity has been the key to navigating the twists and turns of my career with unwavering determination and a commitment to staying true to myself. In this blog, I invite you to join me on a transformative journey of self-discovery, resilience, and empowerment in the ever-evolving field of IT. 

    Authenticity is the key to success for women in IT. By embracing our true selves, we unlock our full potential, inspire others, and drive meaningful change in the industry. 

    Amidst the challenges of my journey in IT, one of the most profound experiences was my transition from India to the US. Moving to a new country brought with it a host of challenges, including language barriers and the longing for family back home. These challenges quickly led to negative self-talk and resulted in me diminishing my own skills that I had acquired and learning that I’d received till that point.  

    Despite these obstacles, I embraced the opportunity with courage and determination, seeking out entry-level positions in IT while simultaneously mastering US English. Through perseverance and resilience, I overcame these challenges, created a version of myself that was able to start over, while building on strengths I already had and achieving my goals regardless of what challenges I had to surmount. This proved to me and others that authenticity knows no boundaries and that embracing our true selves is the ultimate path to empowerment. 

    Overcoming Imposter Syndrome: Embracing Opportunity and Change 

    "Always be a first-rate version of yourself, instead of a second-rate version of somebody else." - Judy Garland 

    I have held roles of Software Developer, Business Analyst, Technical Writer, Project Manager, Program Leader, IT Dev Team Manager, Agile Transformation Leader and PMO Director in various organizations in FinTech, Healthcare and Marketing industries. All this while organically growing by learning each skill at the most foundational level, by doing it myself.  

    As women in IT, we often face imposter syndrome, doubting our abilities and downplaying our achievements. But success comes from embracing opportunities and challenges, believing in us, and taking bold steps forward. Even if that means asking for the compensation we deserve, a promotion we have been eyeing, or applying for an opportunity we may have already talked ourselves out of, in our mind. 

    Along the way I found many mentors who I ingratiate myself to this day! For those reading this you know who you are, and I thank you from the bottom of my heart! 

    Continuous Learning, Mentoring, and Modern-Day Skills: 

    We find this world of IT constantly evolving and changing with rapid technical advancements. When we stop learning, we stop growing. In addition to the skills these roles have required, I have recently delved into the realms of Generative AI and Cloud Infrastructure Strategy. Continuously learning and adapting to modern-day technologies is essential in staying relevant and effective in the rapidly evolving field of IT. These skills have not only expanded my expertise but have also enabled me to contribute meaningfully to innovative projects and initiatives. 

    Along my journey in IT, I always look forward to giving back. I've had the privilege of mentoring four talented women in IT, guiding them on their paths while learning valuable lessons from their unique perspectives and experiences. This journey of mentorship has reinforced the importance of giving back and helping others achieve their goals. By lifting each other up and fostering a culture of support and collaboration, we can create a more inclusive and empowering environment for women in the tech industry. 

    A Leap of Faith: Balancing Education, Parenthood, and Career Ambitions 

    "The only limit to the height of your achievements is the reach of your dreams and your willingness to work for them." - Michelle Obama 

    As a mother and a woman in IT, I faced a pivotal moment in my career journey when I decided to pursue higher education while juggling the demands of motherhood and a full-time job. With my first baby just 13 months old, I embarked on the challenging yet rewarding journey of earning an MBA. Balancing late-night study sessions with diaper changes and boardroom meetings, I learned the true meaning of resilience and determination. Despite the obstacles in my path, I refused to let anything hold me back from achieving my goals. Along the way I did turn some naysayers into believers and friends by achieving precisely what I was told ‘I can’t do’! 

    Practical Tips for Embracing Authenticity: 

    1. Stay True to Your Values: In a fast-paced industry like IT, it's easy to get swept up in trends and expectations. Stay grounded by reminding yourself of your core values and beliefs, and let them guide your decisions and actions. 

    2. Embrace Vulnerability:Don't be afraid to show your vulnerabilities and imperfections. It's okay to ask for help, admit when you don't have all the answers, and share your struggles with others. Vulnerability fosters connection and empathy, making you more relatable and approachable. 

    3. Seek Mentorship and Support: Surround yourself with mentors, colleagues, and friends who uplift and support you on your journey. Seek out opportunities for mentorship and peer support, and don't hesitate to reach out for guidance when you need it. 

    4. Celebrate Your Achievements: Take time to celebrate your successes, no matter how small they may seem. Recognize your achievements, acknowledge your progress, and give yourself credit for your hard work and perseverance. 

    Seizing the Moment: Leading with Purpose and Passion 

    "Success is not about the destination but the journey of embracing opportunities and challenges along the way." - Angela Duckworth 

    Authenticity empowers us to lead with purpose and passion, embracing vulnerability and transparency in our interactions with others. By sharing our stories of growth and transformation, we inspire our colleagues and peers to embrace their authenticity, unleash their potential, and pursue their dreams with unwavering conviction. Bringing our whole self to work, being open and honest and leading with purpose and values has continuously proven to be the recipe for success in my career. 

    Conclusion: 

    As I reflect on my journey of growth and empowerment in IT, I'm reminded of the incredible potential that lies within each of us. By embracing authenticity, seizing opportunities, and staying true to ourselves, we can overcome any obstacle and achieve our wildest dreams. Together, let's rewrite the narrative of women in IT, one story at a time. 

    Ashima Sharma works is Senior Director IT at CareSource. Her expertise is in the field of PMO leadership, digital transformation, Agile development business analysis and change management. Ashima has over 20 years of leadership and strategy experience in the IT industry.

  • 01/30/2024 10:45 AM | Marla Halley (Administrator)


    Why attend conferences? 

    In our current state of virtual interactions, overwhelmed by Zoom meetings and conference calls, the allure of in-person conferences may seem diminished. The hesitations around handshakes, proximity, and shared spaces are understandable, especially considering the prevailing concerns about health and hygiene. However, it's crucial to reevaluate the significance of attending conferences and consider making them a priority, period. 

    Networking Extravaganza 

    One of the most apparent benefits of attending conferences is the unparalleled opportunity to network with individuals you might not encounter otherwise. Conferences serve as a melting pot of leaders in specific fields, subject matter experts, and peers facing similar challenges or operating within comparable environments. The importance lies in the exposure to diverse experiences within our own fields, offering fresh perspectives on problems that may have seemed insurmountable. This exposure broadens our horizons, enabling us to learn new approaches and ideas that we might never have encountered in our routine professional circles. 

    The chance encounters, often referred to as "drive-byes," present themselves in the hallways, between sessions, and even during meal breaks. Some of my most enriching conversations and discussions on various topics have unfolded spontaneously during these breaks and lunches at conferences. These unplanned interactions have provided invaluable opportunities to broaden my network. Remarkably, the connections made in such informal settings have proven to be exceptionally beneficial over the years, even in situations where I hadn't anticipated needing that resource. These connections have evolved into some of my most trusted professional relationships, with whom I remain closely connected to this day. 

    Meeting Influential Leaders and Your Heroes 

    Conferences offer a unique opportunity to rub shoulders with influential leaders, industry titans, and even your professional heroes. Whether it's participating in a panel discussion, attending keynote addresses, or simply engaging in networking sessions, the chance encounters with individuals who have shaped your industry can be transformative and inspiring. The individuals you encounter at conferences are often considered experts and influencers within the conference's subject matter, and sometimes, even beyond. Reflecting on an experience at the BoxWorks conference, I found myself in the front row listening to Neil deGrasse Tyson. The impact of his wisdom, shared amidst the excitement of the crowd, resonated with me on a personal level. This profound experience would not have been as impactful had I not been physically present, feeling the collective energy in the room. Simultaneously, during the Women in IT sessions, I had the privilege of hearing Jill Biden speak. Her insights, especially on navigating personal challenges, deeply affected me. Engaging with her one-on-one after the session was an opportunity, I might have missed had I not attended the conference. 

    Continuous Professional Development 

    Conferences are veritable gold mines of knowledge, providing a unique platform to expand your expertise, learn from industry experts, and improve your skill set. Workshops, presentations, and interactive sessions offer hands-on experiences that go beyond the theoretical realm, fostering a continuous learning environment that can significantly contribute to your professional growth. The smaller group settings can allow for more interpersonal conversation and provide more opportunities for questions to be heard and discussions to be more conclusive. More than once, I have learned a different approach, a new application, or even a new technology I was not aware of that solves a problem my organization had been facing. Attending a conference allowed me to have an impromptu conversation with a vendor, another attendee, or a technology expert that I would not have even known to have sought out. 

    Insights into the Latest Trends 

    Staying ahead of the curve is essential in any industry, and conferences are the hotspots for unveiling the latest trends, innovations, and technological advancements. Engaging with thought leaders and industry pioneers provides a front-row seat to the future landscape of your field. These events serve as dynamic forums where groundbreaking ideas are discussed, emerging technologies are showcased, and visionary strategies are unveiled. 

    Conferences offer a unique opportunity to gain a deep understanding of the current market dynamics and where it's headed. Attendees often have the privilege of participating in discussions and sessions that delve into cutting-edge concepts, disruptive technologies, and transformative industry shifts. Keynote speakers, who are often influential figures with their finger on the industry's pulse, share invaluable insights into the direction of the market, helping attendees anticipate changes and adapt their strategies accordingly. 

    Moreover, these gatherings facilitate direct interactions with industry experts and innovators who are driving the latest trends. Networking sessions, panel discussions, and collaborative workshops create an environment where professionals can engage in meaningful conversations about the challenges and opportunities posed by emerging trends. These interactions not only provide theoretical knowledge but also offer practical insights on how to implement and leverage these trends in your specific professional context. 

    Conferences act as accelerators for staying informed about the newest methodologies, tools, and best practices that are reshaping the industry landscape. Whether it's the integration of artificial intelligence, the evolution of sustainable practices, or the latest advancements in digital transformation, conferences offer a comprehensive and firsthand view of the trends that will define the future of your profession. 

    Enhancing Your Professional Profile 

    Attending conferences isn't just about accumulating knowledge; it's about showcasing your commitment to professional development. Including conference participation on your resume demonstrates your proactive approach to staying informed, engaged, and connected within your industry. It signals to potential employers that you are dedicated to continuous improvement and staying abreast of the latest industry trends.  It may also lead to topical conversation within an interview conversation that sets you apart from other candidates! 

    By immersing yourself in the immense opportunity of insights presented at conferences, you not only gain a competitive edge but also position yourself as a forward-thinking professional. These events empower you to become a trendsetter within your organization, bringing back actionable knowledge that can shape strategies, influence decision-making, and contribute to the success of your team or business. In essence, attending conferences becomes a strategic investment in your professional acumen, ensuring that you are not just keeping up with the latest trends but actively shaping and leading the way forward. 

    Jill Campbell is a seasoned IT leader known for her successful track record in crafting clear and compelling IT and Digital strategies. She is an expert in developing detailed transformation IT roadmaps, aligning IT organizational models, and optimizing business systems. She has excelled in leadership roles within both commercial and defense sectors and currently enjoys consulting in both higher education and non-profits.

  • 01/30/2024 9:46 AM | Marla Halley (Administrator)


    Navigating the ever-evolving landscape of cyber insurance is something that we cannot rest on. As the year begins, most of us are looking into what this year holds. As we know, the rapidly changing landscape of IT is evolving and will always be presenting a myriad of challenges and opportunities. Among these, one significant change that is poised to shape the future is the transformation of cyber insurance. We will touch on the changing dynamics of cyber insurance and how the effects of these changes will impact organizations of all sizes.

    As we are gearing up for this new year and moving 2023 to our rear-view mirror, some interesting things are occurring in all facets of IT. One factor that will become more and more prevalent in 2024 and beyond is what Cyber Insurance will cover and what will be changing in this space. One of the cornerstones of the insurance world, Lloyds of London announced in 2023 that they have a significant exclusion. They will refuse to cover “nation state attacks” and this move has caused a ripple effect that is impacting organizations seeking cyber insurance. Additionally, we have even seen certain clients denied cyber insurance which raises concerns about the sustainability of the cyber insurance landscape.

    As we gaze into the future, it is becoming increasing evident that cyber insurance will fall into one of these distinct buckets:

    1. Pricey Proposition- Premiums will soar past what they are currently with the number of cyber threats growing, the complexity of the threats, and ransoms increasing. Cyber Insurance companies are facing the risks and are likely to place the burden onto those getting insured, making this a costly investment.
    2. Denial Dilemma- With the scope of coverage shrinking, organizations may face getting denied cyber insurance as criteria for approval will become more stringent.
    3. Condensed Coverage- With cyber insurance coverage being reduced and some attacks not being covered from the get-go, some organizations will wonder what is point of being insured at all.
    4. Independently Self- Insured- Facing expensive premiums, denials, condensed coverage, some organizations will consider self-insuring and taking on the risks of what those entails.

    A recent cyber insurance policy, seen below, that took effect on January 1st, 2024, shows exactly what organizations are up against when looking into cyber insurance.


    If we are being honest what DOESN’T constitute “cyber warfare”? As the lines of cyber warfare are blurred, cyber insurance organizations will have to narrow down what they will and will not cover. As cyber insurance companies grapple with these nuances, organizations are left navigating a complex landscape where the terms and conditions are constantly under review.  This will greatly impact both costs to the end-user, and at some point, users will have to decide IF they will choose to continue insurance coverage or not.

    In conclusion, the shifting of cyber insurance in 2024 demands that organizations are informed of the changes and proactively looking at what the cyber insurance companies are doing. The trends indicate that higher costs, increased denials, and reduced coverage are coming. Navigating this requires a deep understanding of the evolving landscape, a commitment to robust cybersecurity practices, and a readiness to adapt to the changing norms within the insurance industry.

    As we start the new year, organizations must critically evaluate their cyber insurance needs, reassess their risk tolerance, and chart a course that aligns with the evolving realities of the digital age. The journey ahead is complex, but with informed decision-making and a resilient cybersecurity strategy, organizations can navigate the challenges and uncertainties that lie on the horizon.

    Seth Marsh is a security specialist with over 30 years of experience in the IT industry. Before leading Sales & Marketing at TMG, Seth led sales for a global full-service security provider and served as a VAR rep focusing on security during his last 12+ years specifically while working with Cisco. This breadth of experience allows him to understand clients’ needs and the ins and outs of the supplier and distribution side.

  • 12/20/2023 2:27 PM | Marla Halley (Administrator)

    • Whether an individual, a small business, or an enterprise – cybercrime doesn’t discriminate. All things “cyber” continue to grow, unfortunately including cybercrime (cyberattacks, cyberthreats, hacking, phishing, etc.). Follow along to learn what cyber challenges we are anticipating in 2024 and how you can manage.

      Growth in Cybercrime

      Cybercrime has been on a steep rise over the past several years. With ransomware and “data extortion” breaches making the news almost daily, attackers have turned these activities into profitable revenue streams that are unlikely to stop soon. While risks are at an all-time high, the task of protecting networks is becoming harder for businesses of all sizes. As we migrate to de-centralized cloud-based applications, the traditional “castle” method of defense with building walls around our most valued assets will no longer work.

      The number of applications used by a typical organization has rapidly grown in the last few years. According to recent reports, organizations use 130 SaaS apps, which is up from just 16 five years ago. The problem is then compounded by bringing more and more of our devices online, which creates additional “attack vectors” for cybercriminal to target within our environments. Forecasts say there will be 41.6 billion IoT (Internet of Things) * devices by 2025. These include POS and entertainment systems, cell phones and computers, digital signage, printers and more. Not to mention, the software and firmware running these systems sit atop increasingly complex codebases.

      So, what can you do?

      Business size plays little part in who is or is not attacked. As the “business of cybercrime” has grown, there are now attackers that fit victims of every size. Unfortunately, there is no one-size-fits-all solution for this complicated problem.

      Individuals and small businesses have limited financial resources dedicated to cybersecurity, making it crucial to prioritize and allocate resources effectively. As businesses grow and become more valuable, it is critical that they continue to increase their security posture at the same rate to address new risks and prevent increasing potential losses.

      The Federal Trade Commission lists five principles of sound data security:

    1.     Take stock: Inventory the office and know what information you have – where is it stored and who has access? What do those people or businesses do with the information they have access to?
    2.     Scale down: Retain only what you need. The more information you hold the greater the risk that personal information will get exposed.
    3.     Lock it: Providing the minimal amount of access needed to people and devices generally leads to better overall security. On your network, two things you can do are:
    a.    Using advanced firewall with security features like intrusion detection, content filtering and built-in malware scanning. This will help prevent customers and your team from mistakenly navigating to malicious websites and help stop already malicious devices from connecting back to their servers.
    b.    Segment your network to reduce the impact if there is a breach. Create smaller “Virtual Networks” (VLANs) in your environment to virtually split up which devices can communicate with each other. A common setup for small to midsize businesses might be to build four “virtual networks” like…
    • Network for devices that fall under compliance, like your POS systems.
    • Network for normal business devices, like a desktop computer or a laptop.
    • Network for your customers.
    • Network for all your IoT devices that don’t fall into one of the other categories.
    4.     Pitch it: If you don’t need it, get rid of it securely. Create a retention schedule and have appropriate disposal processes and devices.
    5.     Plan ahead: Create a policy and procedure regarding cybersecurity and invest in the correct technologies and partners if it’s not your expertise. Use reputable vendors for purchasing hardware and services, and stick with trusted brands – especially when it comes to internet connected devices. Many IoT devices found online are made by fly-by-night manufacturers and have been found to come with “backdoors” built in, but even those not compromised from the start are often not supported long term by the makers and become security risks.
    • And finally, never neglect your people. Even a perfect fence can’t work if someone accidentally leaves the gate open. So, invest in employee training and security awareness.

      A few key practices to highlight: **

      • Secure personal devices like laptops and phones, especially when in public places. Be sure to lock your screen if your computer is unattended, and don’t install software that isn’t authorized on work devices.
      • Educate employees on the signs of a cyberattack, especially phishing, and the laws that apply to data they may handle.
      • Make sure employees know who to turn to and feel they can come to you if an issue arises, it takes the whole team to fight these threats.
      • Remove employee access if they are no longer with the company even if you don’t think the person is a risk. User accounts no one is using leaves the door cracked open for attackers.

    As we approach 2024, individuals and businesses must be prepared to tackle the evolving cyberthreat landscape. Understanding the seriousness of cybersecurity, identifying your unique needs, and addressing the practices above are great ways to start.

    *Stats found in Harvard Business Review: https://hbr.org/2023/04/cyber-risk-is-growing-heres-how-companies-can-keep-up  

    **Principles and practices found from Protecting the Unprotected: Data Breach Prevention and Response – A Guide for Businesses and Charities by Dave Yost

    Jordan is a Senior Manager of Security and Cloud Services at Hawaiian Telcom, a company under altafiber’s family of companies. He has spent nearly two decades helping organizations implement technology to solve business challenges. Jordan has a Master of Science in Leadership and Management and has earned CSSP, C|CISO, and GCFA certifications. He will happily talk your ear off regarding anything with technology, organizational culture, or the best ways to cook meat with fire!

  • 12/20/2023 2:11 PM | Marla Halley (Administrator)

    The Crisis We Are In

    The pandemic changed a lot!!   Trust and confidence in IT have increased as a result of the support the organization received from IT when the pandemic was at the most volatile stage. Expectations for IT are also higher now as a result.  While worker productivity was proven to reach, or even surpass, pre-pandemic levels for IT performance, attitudes and expectations of IT staff have also shifted as a result. 

    The "great resignation" emerged - and continues to some extent.  IT staffing functions (both recruiting and retention) are in a state of "crisis" - whether it involves bringing talent in through the front door or preventing them from wanting to leave.  While many organizations have adjusted as a result of living through the pandemic, many more have not - with some that are even still waiting for the "right time" to move back to old practices.

    The staffing crisis is acute enough to put business goals and objectives at serious risk.  While seemingly not a glamorous technology "trending" topic, it continues to rank as one of the highest areas of impact to IT organizations as we move into 2024 - certainly one of the top three across the majority of the 30+ CIO clients I work with and advise.  Many CIOs are battling against antiquated HR-related policy and an organizational culture that works to their disadvantage.  My repeated advice to my clients is not to get caught in the "victim" mentality - but to do more to lead the changes that might be necessary. 

    Staffing (recruiting and retention) as a Core Competence

    Staffing is a multi-dimensional function - encompassing attracting, hiring, and retaining resources.  Too many IT leaders are focused almost exclusively on the hiring function and ignore what it takes to attract and to retain the talent they need. 

    At the same time, workers’ expectations have shifted - whether as a part of living through the pandemic or as a function of the shifting norms and nuances of different generations - work-life balance is higher on the list of important considerations than ever.  The CIO needs to have a strong partner in the CHRO (and support from above) to tackle some of the foundational elements that can positively impact the CIO's staffing functions.

    IT leaders also need to better understand what factors influence the Employee Value Proposition (EVP) of the candidates and employees who are making decisions every day whether to join, stay, or leave.

    Sourcing IT Candidates

    Traditional recruiting channels do not continue to deliver as in the past while direct recruiting of experienced workers is more competitive than ever before.  College Internships as a way of "sourcing" inexperienced candidates continues to change - with candidates entering internship programs earlier in their college years and receiving offers from potential employers much earlier than before.  It's not unusual to see internships attracting sophomores and freshmen while organizations try to lock in earlier on students with potential.

    As a result, non-traditional sourcing channels are gaining attention and interest.  IT Apprenticeship programs have been growing in popularity - targeting "2nd career" candidates in their 30's and 40's as a way of introducing them to more entry-level IT functions such as help desk, deskside support, security monitoring, testing, and even early data analytics. 

    Also, focusing more broadly across all employee demographic categories is important.   More formalized Women in IT programs with specific attention is needed to address the unique needs and interests of women as that demographic continues to see less candidates entering college IT curriculums.  Also, DEI programs are getting more attention to address areas of interest that will help in attracting and retaining talent.

    Retention

    The economics and benefits of focusing more on retention efforts are clear.  It is easier, less expensive, and less risky to retain a skilled employee who is performing well than to find a new one.  Especially given that much of the job-at-hand is unique to the organization regardless of the core functions that underly the position (and are considered "transferable" skills).

    Understanding what factors drive retention is often a gap for many managers.  Putting too much emphasis on compensation is a common problem. 

    Likewise, assuming that certain retention factors are the same across all workers is another problem.  While trends may seem to emerge across certain demographic dimensions (age, gender, nationality, etc.) knowing your employees well is the best way to know what factors are important to each one.

    Some popular targets in the area of staff retention include developing programs and adjusting policy to:

    o   Allow for flexible work arrangements (location as well as time of day) based on the position 

    o   Accelerate opportunities and timelines for career advancement

    o   Expose employees to other technical (or functional) areas of interest that they aren't currently exposed to - and provide more opportunities for education that can be leveraged

    o   Strengthen performance measurement programs in order to more accurately reward high performers, improve marginal performers, and remove non-performers

    o   Reskill employees and business technologists to fill gaps created by the shift from legacy technologies to emerging ones

    Bottom Line

    The organization relies on the ability of the IT function, more than any other, to achieve its bottom line and to accomplish its goals and objectives - whether it's strategically transforming itself or operating in a business-as-usual mode of operations.   IT leaders need to continually articulate the direct correlation between their ability to perform and "deliver" - and the business outcomes that their IT services are expected to enable or influence.   

    It should be a pretty straightforward value proposition when it comes to getting the attention (and at times the additional investment) needed to address the necessary changes or enhancement. 

    As IT leaders we need to take greater interest, control, and influence over something that is so impactful and influential to our success - and ultimately the success of the organization.

    Paul Stoddard is an Executive Partner with Gartner’s Executive Programs. He works to provide expertise and guidance to his CIO clients as a trusted advisor to help them realize their strategic goals and achieve their business objectives. Paul brings 35+ years of a very broad IT background as both a technology consultant and former CIO at several large-scale firms.


  • 11/29/2023 7:41 AM | Marla Halley (Administrator)


    Technology First Was the Place to Be in 2023!

    As the year draws to a close, let’s reflect on how our members lived up to Technology First’s mission to connect, strengthen, and champion the best-connected technology community in the Dayton region.

    January 

    Our Peer Resource Groups began the year strong with our Annual CIO Forecast Panel. Board Chair Treg Gilstorf, the Chief Operating Officer for Smart Data and CNBS Software moderated a discussion with J.D. Whitlock, the Chief Operating Officer for Dayton Children’s Hospital, Jon Scruggs, Director of IT for Hobart Service, and Matt Coatney, Chief Information Officer for Thompson Hine LLP. Here is how you can get involved in a Peer Resource Group in 2024.

    February

    Our Digital Mixer was a big hit! We brought education and industry together to meet workforce needs. Many thanks to Partner Wright State University for hosting. Technology First Executive Director, Melissa Cutcher, was a guest on the podcast A Greater Dayton and shared why events like the Digital Mixer make Technology First such a relevant trade association. Here is how you can participate in the 2024 Digital Mixer.

    March


    If it’s March, then it’s time for our Ohio Information Security Conference. Over 300 attendees enjoyed two keynotes, six learning tracks, one CISO panel and over 30 exhibitors ready to help solve their biggest cybersecurity challenges. Here is how you can attend #OISC24.


    April

    Technology First members love to give back and a local Girls Who Code field trip to the GRILL (Gaming Research Integration for Learning Lab) was a fun way to do it. Featuring our mosaic mural, Technology First volunteers helped the chapter learn about systems engineering. Technology First members volunteer for a variety of events throughout the year. If you’d like to join us, here is where you find opportunities for 2024.


    May

    Speaking of volunteers, our Volunteer Appreciation Night at Poelking Lanes was a strike! The VIP Suite was the perfect place to eat, drink, bowl, and network. Thank you again to everyone who gives their time and energy to strengthen our community. Thanks also to the Technology First Board members who were able to attend and thank our volunteers in person. Here are your current Technology First Board of Directors for 2024.

    June

    Executive Director, Melissa Cutcher, was invited to participate in a panel discussion for the Dayton Area Chamber of Commerce’s Gen D Ignite program. For their Personal Strength and Profession Growth program day, Melissa coached emerging young professional leaders on how to build their networks. If you are interested in helping further Technology First’s mission to build for the future, here is how you can help in 2024.

    July

    We had an amazingly positive response to our Summer Networking Series, #UniteDaytonTech. Our first happy hour event was at Off Par Golf & Social in June and the tickets sold out. It was so much fun, we did it again. This time at Warped Wing Springboro and we packed the house. These events are free to members and are a great way to connect. Here is how you can become a member in 2024.

    August

    Workforce continues to top the list of concerns for our technology community, so we invited Partner, TEKsystems, to present on the State of talent at our Tech Forum. We have several articles regarding the workforce on our TECH NEWS page. Here is where you can read them in 2024.  

    September 

    This was a busy month for the community. The Women 4 Technology Peer Resource Group held their first conference, Own IT! Over 125 women gathered to network and champion empowerment. Also in September, you raised $8000 for the Technology First Scholarship Fund at our annual Scramble for Scholarship Golf Outing. Here is how you can contribute to the Technology First Scholarship Fund in 2024.

    October

    We kicked off the regular quarterly meetings of our newest Peer Resource Group, Workforce Development. We had a very interactive panel discussion on alternative recruiting channels. Everyone is welcome to participate in this group. Here is how you can attend discussions in 2024.

    November

    The 17th Annual Taste of IT Conference sold out again this year. We met 470 of our closest friends at the intersection of tactics and trends and shared our knowledge and networks. We enjoyed a great morning keynote from Gary Sorrentino, Global CIO of Zoom, an engaging lunch panel discussion around Industrial AI, 24 breakout sessions, and solutions from 36 providers. Capping off the conference, we recognized technology talent from the Dayton region at our 10th Annual Technology First Leadership Awards. Here is information for the conference in 2024.

    Thank you to our Board, Committees, Partners, Sponsors, and Members for connecting, strengthening, and championing your community this year! We are already looking forward to what 2024 will bring!


  • 11/28/2023 11:13 AM | Marla Halley (Administrator)


    The Privacy and Security Risks of “Citizen Development 

    Marc Andreessen, founder of Netscape and a well-known technology investor, famously said “‘Software is Eating the World” way back in 2011 and it’s obvious now that he was right. We live in a Software Defined Everything (SDE) world where even your coffee maker is “smart”, and the trend of software in everything shows no signs of slowing down.In fact, it’s estimated there will be 76 billion Internet of Things (IoT) aka “smart devices”,each driven by software, online by 2025, and Microsoft has said there will be a whopping 500 million new apps built over the next five years. 

    All this software is driving the rapid digital transformation of our world and while the demand for software development has never been higher, it greatly outstrips the available supply. Gartner reported that demand for software development will grow five times faster than conventional IT departments and the average IT project backlog is between 3 and 12 months per Appian. 

    Compounding the issue is the growing shortage of software developers. Forrester has reported that there will a shortage of 500,000 developers in the United States by 2024 and IDC has reported the shortage of software developers may reach 4,000,000 worldwide by 2025.  

    To quench the demand for software development and to accelerate value delivery many organizations have embraced “Citizen Development”. Citizen Development democratizes software development by allowing “Citizen Developers”- individuals with little or no programming experience - to use low-code or no-code (LCNC) tools to quickly build and deploy software applications. LCNC tools are rapidly growing in popularity, Gartner predicts that by 2025, 70% of enterprises will use LCNC tools and LCNC platforms expected to reach $187 billion in sales by 2030 according to Research and Markets. 

    This is a fundamental shift in how organizations build and maintain software applications. Individuals without an extensive technical background can build business ready applications using visual interfaces and pre-built components with little or no coding required. Readily available LCNC tools such asMicrosoft Power Apps, Appian, Zoho, Quickbase, and Salesforce Lightning allow business professionals with domain knowledge to create applications tailored to their specific needs without waiting for or relying on traditional software developers in the IT department or at an external consulting company.  

    The reasons for the growing popularity of Citizen Development include: 

    • Speed: Citizen developers can build and deploy applications very quickly compared to traditional approaches. 
    • Agility: Non-technical people can meet business needs and address challenges themselves. Additionally, these solutions are typically easy to modify as business needs evolve. 
    • Empowerment:Virtually any knowledgeable and motivated employee can contribute directly to digital transformation efforts. 
    • Cost: Organizations can reduce their reliance on professional programmers, cutting costs and allowing better use of resources. 
    • Innovation: Domain experts can quickly build prototypes or fully working applications with little effort or risk. 

    As a result of the exploding popularity of LCNC tools and the benefits they deliver, organizations of all sizes may find themselves leveraging LCNC tools. And while the democratization of software development can significantly speed project delivery and reduce demand on traditional IT departments, like many “Shadow IT” solutions that originate outside the IT department, Citizen Development introduces privacy and security concerns for organizations that employ it. For example, non-technical users might not be aware of privacy concerns or security best practices, leaving their applications more susceptible to attacks or leaks.Increasingly frequent and increasingly devastating cyberattacks demand that organizations understand and address these concerns. Let’s examine each in more detail. 

    Citizen DevelopmentPrivacy Risks: 

    • Compliance Issues: Privacy regulations such as GDPR, HIPAA and CCPA require organizations to protect personal data. Lack of compliance creates the potential for large fines. 
    • Data Leakage/Theft: Citizen developers may inadvertently expose sensitive data through misconfigured access controls, misconfigured platforms or by sharing data with unauthorized users. This can result in data breaches, regulatory fines, and reputational damage. 
    • Lack of Encryption: Citizen developers may not understand and/or prioritize encryption when designing applications, leaving data vulnerable to interception or theft. 

    Citizen Development Security Risks: 

    • Authentication and Authorization Issues: Citizen developers may not be aware of best practices to secure user accessor may not understand the sensitivity of data leading to unauthorized access and/or data breach. 
    • Patch Management: Citizen developers may not keep tools updated with the latest security patches. This can leave applications exposed to known vulnerabilities. 
    • Software Vulnerabilities: Citizen-developed applications may be missing proper security measures, making them susceptible to all-too-common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). 
    • Integration Risks: Integrating citizen-developed applications with existing systems can introduce security vulnerabilities that cascade across systems. 
    • Backup and Disaster Recovery: Citizen developers may not understand the terms of service of LCNC platform-as-a-service (PaaS) offerings or prioritize continuity of critical systems which could lead to gaps in data protection and downtime. 
    • Vulnerabilities in Third-Party Components: LCNC platforms often rely on third-party components and integrations whose lineage and security posture are unclear. Security vulnerabilities in third-party components can expose applications to attacks. This speaks strongly to the need for a Software Bill of Materials (SBOM) to understand dependencies and lineage. 
    • Limited Testing: Citizen developers may not have the expertise or resources to conduct thorough security testing. 

    Organizations should ensure they address the following to reduce the risks of Citizen Development: 

    • Training and Awareness: Require training programs to educate citizen developers about privacy and security best practices to ensure they take prudent steps to protect the privacy and security of LCNC applications. 
    • Secure By Design: Security should never be an afterthought or retrofitted to existing applications. Ensure that citizen developed applications are secure by design. Involve security professionals to provide guidance and to design security into applications.  
    • Access Controls and Permissions: Ensure that developers understand the sensitivity of the data they have access to and implement robust access controls and permissions commensurate with the data sensitivity. Regularly review and update permissions. 
    • Integration with Identity and Access Management (IAM): Integrate LCNC platforms with organizational IAM systems to ensure that user identities are managed securely and consistently. For example, Single Sign On (SSO) with Active Directory. 
    • Encryption: Encourage the use of encryption for sensitive dataat rest and in transit. 
    • Regular Auditing and Monitoring: Continuously monitor and audit citizen-developed applications for unusual activity or unauthorized access. Implement automated alerts for anomalous behavior. 
    • Centralized Governance: Establish a governance framework to centralize control over citizen-developed applications including approval processes, version control, maintenance, and compliance checks. 
    • Vendor Assessment: Assess vendor security and compliance measures to ensure they meet organizational standards and compliance requirements. For example, review their SLA/SLO’s, ask for an independent SOC 2 Type 2 audit, and request a Software Bill of Materials (SBOM). 
    • Data Lifecycle Management: Define clear data retention policies for citizen-developed applications. 
    • Penetration Testing: Conduct regular penetration testing to identify and correct vulnerabilities. 
    • Leverage existing resources: The Project Management Institute (PMI) has excellent vendor-agnostic educational resources and tools for Citizen Development. I recently completed the PMI Citizen DeveloperTMPractitioner course and recommend it for those looking to engage in Citizen Development. You can learn more here.  

    The advent of LCNC platforms has revolutionized the way software is developed and it offers immense potential for organizations seeking speed, agility and efficiency.  However, the convenience and accessibility of citizen development brings inherent privacy and security risks that must be addressed proactively, and organizations should strive to strike a balance between fosteringCitizen Development and safeguarding sensitive data. 

    A well-executed citizen development strategy can empower employees, drive innovation, and significantly contribute to the overall success of digital transformation initiatives.By investing in training, robust security, trustworthy platforms and a good governance framework, organizations can leverage the power of Citizen Development while minimizing the associated risks.

    Dave Hatter, Cybersecurity Consultant, Intrust IT – CISSP, CISA, CISM, CCSP, CSSLP, PMP, PMI-ACP, PMI-PBA, PSM 1, PSD1, ITIL 

  • 10/29/2023 4:34 PM | Marla Halley (Administrator)

    During the COVID pandemic, we experienced lockdowns, illness and death, loneliness, working from home, learning from home, disrupted supply chains, overtaxed health systems, non-stop media reports about COVID, and daily anxiety and stress.   Although U.S. and global health organizations declared the end of the COVID public health emergency, the effects linger, including many workplace disruptions.  Being a good leader of people in any industry means reflecting on social context and social disruptions and how our own leadership skills and style must adapt.  Because every organization’s competitive advantage relies increasingly on technology in this age, it is even more important for technology leaders to pivot to changing workplace conditions. How are you adjusting in response to these disruptions? 

    1. Hybrid and Remote Workplace 

    For many roles in the workplace, we are not going back to the old way of working - physically in the office building five days a week, 8 am-5 pm.  According to Forbes, of the jobs that can be done remotely, 7% of workers were fully remote before the pandemic, and in 2023, it is five times higher at 35%.   Workers are very clear about what they expect from their employer, according to Forbes’ remote work statistics,  “98% of workers want to work remotely at least some of the time and 65% of workers want to work remotely ALL of the time.  Fifty-seven percent of workers would look for a new job if their current company didn’t allow remote work.” 

    But there are also downsides to remote work. From the same Forbes report, “69% of remote workers report increased burnout from digital communication tools, 53% of remote workers say it’s harder to feel connected to coworkers, and 23% of remote workers struggle with loneliness.” 

    Many large corporations have recently begun return-to-office mandates:  Google, Meta, JP Morgan Chase, Amazon, Apple, Starbucks, Disney, Lyft, and Zoom. This has set up a conflict between what employees want and what employers want.   Currently, organizations that can give workers some flexibility will be better poised for recruiting and retaining talent.   If you do implement a mandate for in-person work, CNBC Leadership Insights recommends: 

    • Explain the specific “Whys”   
    • Look closely at individual and team performance data 
    • Leave room for exceptions 
    • Build flexibility in other ways 
    • Watch for proximity bias  
    • Be ready to lose employees 

    2. Stress, Trauma, Mental Health 

    There has been a measurable rise in negative emotions around the globe, including stress, sadness, anger, and worry, according to an annual measure by Gallup. The pandemic caused a spike in the world of unhappiness and we have not yet recovered.

        

    In the workplace, Gallup finds that employee engagement dropped in 2021 for the first time in a decade and dropped again in 2022. Our workforce is unhappy and disengaged at record levels. Why? 

    CAUSE #1 – POST-COVID STRESS DISORDER -“Illness, grief, job loss, social isolation, uncertainty, and other pandemic-driven stressors have contributed to an increase in psychological stress,” according to Yale School of Medicine. There is a new disorder identified as Post-COVID Stress Disorder, which presents similar to PTSD including increased reaction to stimuli, avoidance, focusing on the negative aspects of a situation, incessant contemplation of negative events, and anxious arousal associated with memories of the COVID-19 pandemic.   

    CAUSE #2 – SOCIAL MEDIA -  National Institutes of Health states that social media is strongly correlated with “anxiety, depression, insomnia, stress, decreased happiness, and a sense of mental deprivation.” This correlation is caused by the “negative impact on self-esteem through unhealthy comparisons, social media burnout, stress, lack of emotional regulation due to social media preoccupation, and development of social anxiety due to decreased real-life social interactions.” FOMO (Fear Of Missing Out) is a real thing, with real mental health consequences.  

    Because our workforce is seeing heightened stress and general unhappiness, leaders must be aware of, and manage, employee engagement and well-being. 

    3. Generational Disruption 

    In conjunction with disruptions related to the pandemic, Gen Z’s entry into the workforce is driving change, due to different norms and values regarding workplace atmosphere, culture, and support. By 2030, Generation Z will constitute about 30% of the workforce. While generational stereotypes are not 100% accurate for each individual, data from Johns Hopkins University indicates that, in general, “Baby Boomers sought job security, Generation X sought work-life balance and professional progress, Millennials and Generation Z are seeking greater Diversity, Equity, and Inclusion (DEI), greater flexibility, and a focus on ethics and social awareness of a company.” Gen Z is also seeing a lack of engagement at work leading to lower retention and higher levels of stress that impact work performance.   

    According to McKinsey, factors that motivate Gen Z to stay in a job aren’t the same as those for other generations. Gen Z, for example, considers compensation less important than flexibility, career development, meaningful work, and a safe, supportive work environment. 

    Have you heard of “Quiet Quitting,” “Bare Minimum Monday”, and “Time Blindness”?  These terms, and the values they represent, may at first seem incomprehensible to older generations, but leaders cannot easily dismiss this if they want to recruit and retain a thriving workforce.  Seek first to understand the different generations. 

    Artificial Intelligence (AI) 

    How will AI disrupt the workplace in the next ten years? Some industries and roles will be affected more than others, and leaders will need to be ready to reskill their workforce. McKinsey Global Institute reports that an increase in labor demand is predicted for health professionals, health technicians, and STEM Professionals (a 30% increase).  A 15-20% decrease in labor demand is predicted for office support, customer service, and sales.  In the fields of education and workforce training, business and legal professionals, creatives, and arts management, not a large change in demand is predicted, but a high change in work activities. “Workers in lower-wage jobs are up to 14 times more likely to need to change occupations than those in highest-wage positions, and most will need additional skills to do so successfully.”    

    These changes will not happen immediately, but leaders should begin preparing.  Remember this famous quote from Bill Gates in 1996: 

    We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten. Don’t let yourself be lulled into inaction.”   

    Reskilling your workforce is a strategic imperative and it is the responsibility of every leader and manager. Leaders will need to understand and embrace these shifts if they hope to adapt to the rapidly evolving new era of automation and AI. 

    In conclusion, technology leaders are surely already noticing these workplace disruptions. Great leaders will acknowledge these changes and will reflect on how their personal leadership style and skills must adapt. These are the leaders who will continue to deliver results and enable their organizations to be successful in this age of ever-increasing digitization.   
  • 10/29/2023 4:25 PM | Marla Halley (Administrator)

    In today's fast-paced technology landscape, the integration of Artificial Intelligence (AI) has become a game-changer for businesses seeking to enhance internal and external customer experiences. For professionals well-versed in various aspects of the technology industry, understanding the simplicity of AI and the crucial steps required for success can be a significant advantage. In this blog post, we'll delve into the core concepts of AI, outline the key steps for technology teams to excel, and offer valuable tips for getting data sources right.

    The Simplicity of AI
    Despite its reputation for complexity, AI can be simplified into its fundamental components. At its core, AI is about teaching machines to learn from data and make intelligent decisions. For our audience of technology professionals, this means understanding that AI isn't magic, but a tool driven by algorithms and data.

    Key Components of AI:

    1.    Data: Data is the lifeblood of AI. Accurate, relevant, and diverse data is essential for training AI models. Ensure that your data sources are comprehensive and up to date.
     
    2.    Algorithms: Algorithms are the brains behind AI. These mathematical instructions process data and make predictions or decisions. Familiarize your team with various AI algorithms and their applications.
     
    3.    Model Training: Training AI models involves exposing them to data to learn patterns and make predictions. It's an iterative process that requires constant refinement.  It is very important that the models being trained are consistent with your organization’s culture.
     
    4.    Evaluation and Testing: Rigorous testing is crucial to ensure AI models perform as expected. Monitor their performance and fine-tune them as needed.  Make sure that you include your customers in the evaluation and testing process.
    Steps for Technology Teams to Succeed with AI
    1.    Define Clear Objectives: Start by defining your AI project's objectives. What specific problem are you trying to solve, and how will AI help achieve this? Clear goals are essential.
     
    2.    Assemble the Right Team: Form a cross-functional team with data science, software engineering, and domain knowledge expertise. Collaboration is key.
     
    3.    Data Quality Matters: Garbage in, garbage out. Ensure your data is clean, relevant, and well-structured. Invest in data quality tools if necessary.
     
    4.    Choose the Right Tools: Select AI frameworks, libraries, and tools that align with your project's requirements. Consider open-source options and cloud platforms.
     
    5.    Iterate and Improve: AI is an ongoing journey. Continuously evaluate and refine your models to adapt to changing conditions and data.
    Tips for Getting Data Sources Right
    1.    Data Diversity: Gather data from diverse sources to minimize bias and enhance model performance.
     
    2.    Data Governance: Establish clear data governance policies to ensure data integrity, security, and compliance.
     
    3.    Data Preprocessing: Clean, preprocess, and normalize data before feeding it to AI models to improve accuracy.
     
    4.    Feature Engineering: Craft meaningful features from raw data to enable better model insights.
     
    5.    Data Validation: Implement rigorous data validation processes to detect and rectify errors early on.

    In conclusion, AI need not be shrouded in mystery for technology professionals. By understanding its core components, following the right steps, and paying attention to data quality, your technology team can harness the power of AI to deliver exceptional internal and external customer experiences. Stay informed, collaborate effectively, and embrace the AI revolution to stay ahead in the ever-evolving technology industry.

    Remember, AI is not just a buzzword—it's a transformative force, and you have the knowledge and tools to leverage it effectively.

    Bill Magnuson is the co-founder and CEO of BindMyIT, a leading technology solution consulting company. With over 26 years of experience in the tech industry, Bill is passionate about harnessing AI's potential to drive innovation and improve customer experiences.


Meet Our Partners

Our Cornerstone Partners share a common goal: to connect, strengthen, and champion the technology community in our region. A Technology First Partner is an elite member leading the support, development, and expansion of Technology First services. In return, Partners improve community visibility and increase their revenue. Make a difference in our region and your business. 

Become A Partner

Cornerstone Partners



1435 Cincinnati St, Ste 300, Dayton Ohio 45417

Info@TechnologyFirst.org
937-229-0054

Cancellation Policy | Event Terms and Conditions | Privacy Statement | Inclement Weather Policy