- By January 7th, 2016Category:Read More »
Everyone tells you to get to the cloud, but no one tells you how. The good news is you've practiced for it every time you've moved your home. Find out why VHS tapes and alarm clocks tell you everything you need to know about getting started with cloud migration.
- By December 28th, 2015Read More »
Charitable hearts. Pernicious insiders. A veteran IT professional camped out under a mountain of Red Bull at a three-day hackathon. It was a year for giving, for new techniques, and for innovation in NJVCommentary. In our last post of 2015, check out some of our most popular stories from the year that was and find out why we learned to trust no one in cyber security, and cherish everyone through our work with TAPS.
- By December 18th, 2015Read More »
In the digital age, your business and mission are evolving at the speed of need. So why is your data center constrained by a reliance on technology and defined by software? Find out how the Enterprise Defined Data Center (EDDC) puts your mission in charge of your technology and creates the right mix of cloud and on-premises computing to continually optimize your IT.
- By December 10th, 2015Read More »
In the lobby of our headquarters in Chantilly, Virginia, the board games arrived one, two, sometimes three at a time. They were stacked neatly on the black tablecloth, little Lego pieces of compassion bound for tiny hands and big smiles.
- By December 2nd, 2015Read More »
Every product you've ever bought has promised to make your enterprise run smoother, faster and more efficiently. So why is enterprise IT still so hard? It's not the products you have, it's the framework you and don't and the enormous mountain range you've built for your end users to scale.
- By November 11th, 2015Read More »
NJVC is more than a company that supports veterans. We are a company led by, and shaped by veterans. On Veterans Day, we asked NJVC leaders to share the most important lesson learned in the service of our country.
- By October 26th, 2015Read More »
You have two jobs. Doing your job and finding everything you need to do your job. From applications to activity reports to timecards and travel, navigating the modern workscape and its series of passwords, vendors and multiple systems takes as much as 22 percent of employees' time. Find out how as much as one-day-a-week's labor is just a Servicefront(TM) installation away.
- By October 7th, 2015Read More »
A hackathon -- a multi-day coding competition to create functioning prototypes -- looks like Google after a tornado strike. Power strips, backpacks, white boards and energy drinks lie around like the residue of a high-tech frat party. But an NJVC engineer found that in the mess of Red Bull and re-coding, everyone can learn three important lessons.
- By September 20th, 2015Category:Read More »
Insider threat represent a unique place in the cyber security threat matrix: High likelihood of occurrence coupled with high potential damage. Even more troubling, most organizations are overly optimistic about their ability to combat insider threat. How can you defend against those you trust? Cyber Security Principal Robert J. Michalsky, who recently published a white paper on the subject, answers in a Q&A.