Sunday, December 27, 2009

Learning from a successful coach

IT Leadership:



  1. The ability to have every one focus on a common goal
  2. Get the team to commit and devote to the process (role model)
  3. Commitment in your focus -- conversations, promptness, attention to detail, show concern for people
  4. Empowerment -- get feed back, ideas, and input on decisions
  5. Set expectations for yourself and staff
  6. Coordinate team events such as: service projects, dinner parties, and various outings.
  7. Help others achieve their goals will inspire effort and enthusiasm.
  8. Establish expectations for performance and hold people accountable
  9. Find out from every one what they bring to the table
  10. Always continue to develop expertise
  11. Extra effort to develop an edge / niche in the market
  12. Continue to raise your game via networking, education, and conferences.
Develop a pattern of success.

Monday, December 21, 2009

The Year in the Executive Suite “taking stock”


As I look back and reflect on the past year, what have been the greatest successes, accomplishments, and goals achieved? In order to make this determination, I review the climb to the summit.


While reflecting on the rough economic climate in 2009, business prospects have improved especially in regard to potential cliental. There have been improvements in using social media sites such as Face book, LinkedIn, and Twitter to build a network of business contacts, industry experts, and various leaders. There has been success in building expertise in computing technology.

As many business leaders and executives truly understand the reach and power of information technology, integrating key technologies into business (is key). Being in position to develop and lead the development of key technology initiatives has been gratifying.

As a business and I.T. leader, the focus is truly understanding the business process and using technology to add value by increasing productivity, sales, and customer service. One of the prime examples is the mobile work force. Managing the mobile work force to ensure they have every thing they need at their finger tips such as: Email, Contacts, instant messaging, stock, GPS, voice mail, which provides great value.

The year has been successes by confidently bring value to the business, not just from a technology stand point, but also from a process and leadership standpoint. The end point has been the ability to help improve the way the business works utilizing key technology. The focus continues to be improving: business processes, customer interfaces, improving interaction among employees, customers, and suppliers.

Merry Christmas, Happy New year to business partners, family, and friends!

Tuesday, December 1, 2009

Security against the latest threats



Typical network security involves implementing a firewall. The firewall is a barrier between you and the evils of the internet.  Most good firewalls will examine common ports and protocols and ban and bar any suspicious packets from entry.


As many treats got more complicated, trusted sources, ports, and protocols carried any number of threats. It has become increasingly important to look inside data packets while nothing their source, destination, and type.


My typical network security  configuration deploys a firewall, content filtering, anti-virus/spam, and intrusion detection. As the number of device appliance increased, so does the cost associated with management and licensing. Out of necessity and consumer demand, unified threat manger (UTM) was designed. I will be reviewing UTM.