- By October 17th, 2014Read More »
Software has a supply chain. Just like your servers, laptops, routers and other hardware, software is assembled. Each line of code came from somewhere, was tested by someone and was packaged together before you brought it into your organization.
If you’re not thinking about your software in terms of supply chain, you’re not alone.
Of course, your enterprise is also probably vulnerable as a result.
- By July 29th, 2014Category:Read More »
At NJVC, IT means innovative technology.
If you live in the Washington, D.C. area, this post is probably not the first time you've heard that sentiment. Those six words start our latest ad campaign on area radio stations.
While you'll hear it often in the coming weeks, we promise not to venture into HeadOn territory.
- July 25th, 2014Read More »
Aaron Arseo has no regrets, but he does have one simple piece of advice.
"Just do it," he says. "Don’t put it off. Don’t be scared. Be prepared to manage your time, but just do it."
In March 2015, the 30-year-old Arseo will proudly receive his master’s degree in IT management, one of several NJVC employees slated for continuing-education degrees in the next 12 months, the result of a little help from his company and a big gamble on himself.
- July 13th, 2014Read More »
- By July 2nd, 2014Read More »
Editor's Note: This is the second of a three-part series on industry cyber security reports, covering an additional three vendor data summaries. Click here for Part I, covering four data summaries. Part III of the series will cover industry surveys and will be available July 14.
- June 24th, 2014Read More »
When it comes to HIPAA compliance and cyber security, your business associates are as much your organization as your own employees. In a June 26 presentation to the North Carolina Healthcare Information & Communications Alliance, Phyllis Patrick & Associates Founder and President Phyllis Patrick and NJVC Cyber Security Principal Robert J. Michalsky explained how your organization can implement an effective training policy, and why truly effective cyber security is about much more than HIPAA compliance.
- June 23rd, 2014Read More »
Editor's Note: This is the first of a three-part series on industry cyber security reports. Part I discusses their importance and covers four data summaries, Part II covers an additional three data summaries and Part III covers industry surveys.
- June 11th, 2014Read More »
The U.S. military, like other federal government entities, is transitioning to the cloud due to a variety of critical factors, particularly mission interoperability and diminishing budgets. However, military IT decision makers still have many questions impacting the pace of migration.
- What are the real benefits of the cloud?
- When is it best to move to a private or public cloud environment?
- What are cloud service brokers and what role do they play?
- June 5th, 2014Category:Read More »
NJVC has always planted our flag in support of science, technology, engineering and mathematics (STEM) education. On a late April Saturday, we let a robot do it for us.