Friday 30 December 2016

Give Old Electronics a Second Life

You just got new electronic, communications or computing devices as gifts. Don’t throw the old out. There are many ways to give them a second life instead of sending them to leach heavy metals and toxins into a landfill.

from Tom's IT Pro
via CERTIVIEW

Microsoft Updated MCSE and MCSD Requirements for 2017

On March 31, 2017, most of the MCSE and MCSD credentials retire, leaving only new items active and available.

from Tom's IT Pro
via CERTIVIEW

Thursday 29 December 2016

Windows 10 Insiders Get Green Screen of Death

The Blue Screen of Death is no more for Windows 10 Insiders.

from Tom's IT Pro
via CERTIVIEW

Amazon Announces Digital Day Discounts

Have some budget left in December? Amazon has a way you can spend it. The retailer announced its first annual Digital Day for Dec. 30, 2016, in an effort to boost post-holiday sales with discounts on thousands of products. The discounts will largely be fo

from Tom's IT Pro
via CERTIVIEW

Best Lenovo Laptops for Business in 2016

The best Lenovo ThinkPad laptops for business offer solid security, manageability and high-quality components. Check out our top-rated picks here.

from Tom's IT Pro
via CERTIVIEW

Lenovo Upgrades ThinkPad Line with New CPUs, Thunderbolt 3

Lenovo is upgrading its venerable ThinkPad laptops with 7th generation Intel Core processors and is adding Thunderbolt 3 ports.

from Tom's IT Pro
via CERTIVIEW

What is AWS X-Ray and How to Use It?

Amazon’s AWS X-Ray can help developers debug applications, if you know how to use it.

from Tom's IT Pro
via CERTIVIEW

Wednesday 28 December 2016

7 Tips to Speed Up Windows 10

With these seven tips you can make sure Windows 10 is as responsive and sleek as it can be.

from Tom's IT Pro
via CERTIVIEW

Snowball Edge: Who Needs It and Why

Snowball Edge is Amazon's answer to customers' complaints about the lack of support for on-premise data management use cases where the cloud networks are limited by the data bandwidth and geography.

from Tom's IT Pro
via CERTIVIEW

Tuesday 27 December 2016

How to Build a Dynamic Inventory with Red Hat's Ansible

With Ansible, admins can build a configuration and deliver that configuration to one, 100, or 1,000 servers with a single command, thanks to its running inventory.

from Tom's IT Pro
via CERTIVIEW

Slack vs. Microsoft Teams: Which is Best for Business?

With Microsoft Teams, the software giant is getting in on the group chat trend that Slack basically invented. But which is better for your business?

from Tom's IT Pro
via CERTIVIEW

Monday 26 December 2016

Tuesday 20 December 2016

Top 5 Blog Posts of 2016

Global Knowledge’s top blogs of 2016 spotlight the rise of developers, the fear of hackers and an overwhelming love of tech toys.

We learned plenty about our readers when examining the most-viewed posts of the year.

They sought solutions—how can organizations improve software delivery to customers?

They sought security—how is the federal government planning to protect the data of private citizens?

They wanted a peek at the hottest gadgets—who doesn’t?

Here are our top 5 blog posts of 2016:

5. How the First Email Message was Born

“That first email was sent from one Digital Equipment Corporation computer to another DEC-10, which happened to sit beside each other in (Ray Tomlinson’s) lab.”

We send and receive so many emails a day that we tend to take it for granted. Well, so did its creator, Ray Tomlinson.

Tomlinson sent the first email in 1971 and thought so little of it that he didn’t even save the test message as a keepsake. It was so insignificant to Tomlinson that he only vaguely remembers the original message—it was something resembling “QWERTYUIOP.”

In fact, he didn’t realize the significance of his invention until he later showed it to a colleague.

Tomlinson passed away in March at the age of 74.

4. Federal Agencies Prepare for Massive Cybersecurity and Privacy Revamp

“The president’s unprecedented plan is a 35 percent increase in government-wide cybersecurity spending from the 2016 federal budget.”

This blog is probably more relevant now than when it posted in March. With Yahoo’s massive data breach and the recent DDoS attacks that impacted major web properties such as Netflix and Twitter, cybersecurity is a major concern for both businesses and consumers.

Recent intelligence findings concerning Russia’s influence in the presidential election have intensified fears as well. Can the federal government protect its own citizens from hackers?

In February, President Barack Obama created the Cybersecurity National Action Plan (CNAP), proposing a $19 billion budget to fund cybersecurity and update the government’s outdated IT systems. This post examines the details of the president’s plan and how Global Knowledge cybersecurity training can aid federal employees.

3. What Developers Can Expect in 2016

“As professional developers, we should know more than one programming language. … The question always remains, ‘Which language should I learn?’”

Author and developer Bradley Needham made some spot-on predictions in this early-2016 post.

He anticipated the importance of DevOps and tools that aid its success. He suggested developers learn more than one programming language and foresaw advancements in wearable tech and the software that drives them.

Needham also touches on artificial intelligence concerns that are sweeping the industry and stresses the need for software professionals to proactively work together to make sure “we get it right.”

2. Are DevOps and ITIL® in Conflict or Complementary?

“DevOps provides us with a fresh perspective to examine the ITIL framework in several key areas that will improve core processes, functions and principles within ITIL.”

Author Paul Dooley doesn’t leave any gray area here—the answer, resoundingly, is “complementary.” Dooley notes there are no conflicts between DevOps and ITIL, and the collaborative nature of DevOps adds value to service transition, service operation and the Continual Service Improvement process.

Since ITIL is the hub of best practices for the IT industry, service providers benefit greatly by incorporating harmonizing services like DevOps. If implemented correctly, this type of practice should strengthen the alignment between the business and customer.

1. Tech the Halls: Top 12 Gadgets of the Holiday Season

“Whether you prefer to stand in line for hours to buy the newest smartphone or long for the days of 8-bit gaming, there’s a perfect tech toy for you this holiday season.”

Virtual reality gaming, video doorbells, app-controlled droids … the future is here when it comes to the most coveted tech toys for the 2016 holiday season.

Global Knowledge’s tech lovers selected the gizmos they want most this year. Some are easier to come by than others. (Apologies to anyone hoping to find an NES Classic under their tree on Christmas morning. Most stores sold out the day they went on sale.)

Whether you want an iPhone 7 or a new pair of wireless headphones, the best part about filling out your tech toy wish list is feeling like a kid again.



from
CERTIVIEW

Best VPS Web Hosting Services for Business

A reliable VPS web hosting service focuses on the technical functionalities to maintain the website for the business owner at a data center. We found the best.

from Tom's IT Pro
via CERTIVIEW

Monday 19 December 2016

Best IT Certifications For 2017

Here are some of the most valuable and in-demand IT certifications available in 2017. Information security, cloud, virtualization, forensics and more.

from Tom's IT Pro
via CERTIVIEW

LinkedIn's Lynda.com Hit by Hack

The skills learning platform was forced to change the passwords of up to 55,000 users.

from Tom's IT Pro
via CERTIVIEW

Internet of Things: Small Business’s Latest Security Threat

Every wireless sensor or networked device, including those IoT items, could let attackers into your system.

from Tom's IT Pro
via CERTIVIEW

Friday 16 December 2016

MCSE and Other Evergreen IT Certifications For 2017

Looking for credentials that will help advance your IT career in the coming year? Here are the best choices for evergreen IT certifications for 2017, including MCSE, CISSP and ITIL.

from Tom's IT Pro
via CERTIVIEW

Best Apps for Getting Organized

You know you've been meaning to get organized. With the right app that doesn't need to be so hard.

from Tom's IT Pro
via CERTIVIEW

Thursday 15 December 2016

Best Time and Attendance Software

Looking for the best time and attendance software? We evaluate and rank TSheets, TimeForce, stratustime and our other top picks.

from Tom's IT Pro
via CERTIVIEW

Best Computer Programming Certifications For 2017

These computer programming certifications are in demand in 2017. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Cisco's Still Doing Certification Right

The Cisco Learning Network and its collection of specialist and professional certifications offers the real deal. The more you dig into their program and its supporting materials and infrastructure, the more you'll find to like about it.

from Tom's IT Pro
via CERTIVIEW

Wednesday 14 December 2016

Tuesday 13 December 2016

Mobile Device Management: Vendors And Comparison Guide

This comparison guide will introduce you to seven mobile device management vendors and their enterprise MDM solutions.

from Tom's IT Pro
via CERTIVIEW

Best Information Security Certifications For 2017

These information security certifications are in demand in 2017. Find the most valuable certification for your career path on Tom’s IT Pro.

from Tom's IT Pro
via CERTIVIEW

How to Overcome Gender Bias in Tech

While gender bias is a complex issue, there are several tactics companies can put to work for them tomorrow to create an immediate, positive impact on their culture.

from Tom's IT Pro
via CERTIVIEW

Monday 12 December 2016

Can You Run A Business via a Smartphone?

Smartphones have come so far in the last decade. But could you ditch your laptop for one? The answer is maybe.

from Tom's IT Pro
via CERTIVIEW

5 Best Augmented Reality Use Cases

Technology industry analysts and innovation visionaries say augmented reality (AR) will revolutionize business. But how?

from Tom's IT Pro
via CERTIVIEW

Sunday 11 December 2016

DDoS Blog Series Part 2: How Do Consumers and Businesses Protect Against Cyber Crime?

ddos-attacks-300x300_yellow“This demonstrates the fragility of the network and infrastructure.”Shawn Henry, chief security officer, Crowdstrike

Several spectacular attacks in the past few months have demonstrated the power of distributed denial-of-service (DDoS) attacks and the importance of cybersecurity. DDoS attacks against blogger Brian Krebs, hosting provider OVH and domain name system provider Dyn crippled a reporter’s web site, shut down cloud-based customers and blocked access to major services such as Twitter, Amazon, Netflix, Airbnb and Etsy.

What can individuals and organizations do to prevent themselves from becoming an unwitting accomplice to an attack? Furthermore, what can organizations do to protect themselves?

A denial-of-service (DoS) attack allows cybercriminals to disable an organization’s Internet presence or block access to the business’s networks. Identifying these attacks are more straightforward, or at least easier to resolve, because they seem to originate from identifiable Internet Protocol (IP) addresses. The victim can then block incoming Internet traffic from the specific IPs.

When hackers launch a DDoS assault, the problem becomes much larger for two reasons:

  1. The number of computers performing the attack can be huge—an estimated tens of millions in the case of Dyn.
  2. The volume of the attack magnifies dramatically—an estimated 1.2 terabits per second in the Dyn attack, according to Chief Strategy Officer, Kyle York.

Many hackers deploy a remote access Trojan (RAT) to control usurped computers. If a hacker controlled one system and used it to attack and deny service to another organization, that wouldn’t be very effective. On the other hand, large-scale remote-control networks are often called Botnets, made up of malware (“bots”) or infected devices (“zombies”). Under direction of massive command-and-control networks, Cybercriminals use these hijacked systems to carry out a DDoS attack.

In the latest series of attacks, hackers used software called Mirai, an Internet-of-Things (IoT) Botnet. Instead of using infected home computers, they used smart devices found in everyday homes—webcams, DVRs, thermostats, TVs and refrigerators. Many IoT devices have built-in vulnerabilities, such as weak default passwords and extraneous network protocols. Mirai was able to exploit these weaknesses and launch massive data floods across the Internet.

There are numerous ways for consumers to protect against these kinds of attacks:

  • Keep up to date on your vendor’s security patches. This includes Microsoft, Apple, Adobe and Google software.
  • Have a currently-licensed copy of highly-rated antivirus or anti-malware software and keep the signatures current. When in doubt, check one of the sites that rank these products. This doesn’t need to be an expensive proposition—there are several free antivirus products with high ratings in the industry that suffice. Further, some Internet service providers, like Comcast, supply you with software as part of your subscription. If you or a direct family member work for the U.S. government, you are entitled to free antivirus protection as well.
  • Practice vigilance on the Internet; watch for suspicious web sites or browser behavior. Also, understand that one of the largest vectors for malware is through email attachments.
  • If it’s free on the Internet, it’s too good to be true—including pirate sites for downloading movies, TV shows, music, games and software.
  • For your IoT devices, set them up with long, strong and complex passwords. If you can, look for services such as Telnet and Secure-Shell (SSH) and disable them. Occasionally, visit the vendor’s web sites to make sure you have the latest software for your smart devices. Lastly, when a manufacturer recalls their IoT-based product because of software insecurities, make sure you take advantage of it!

Any organization that has an Internet-facing presence could be the subject of a DDoS attack, which can be crippling, even for the largest companies. There are basic protections and mitigations any organization can invoke. These include:

  • Follow industry-standard best practices:
    • Be certain that each Internet-facing server only performs a single task, such as being a web server or responding to DNS queries.
    • Perform system hardening by removing unnecessary services and staying current with security patches.
    • Monitor your systems for signs of an attack.
  • Prioritize redundancy by utilizing:
    • multiple Internet service providers.
    • multiple infrastructure resource servers, such as DNS on different IP networks.
    • geographically-distributed data centers and processing.
  • Consider using an anti-DDoS service such as Akamai/Prolexic, Amazon CloudFront or Cloudflare. Some of these organizations even offer free basic anti-DDoS products. Alternately, every major Internet service provider has services they can activate within their networks.

Related Post
DDoS Blog Series Part 1: Evolving Internet Attacks Turn Smart Devices Against You

Related Courses
Cybersecurity Foundations
Certified Network Defender (CND)
Certified Ethical Hacker v9



from
CERTIVIEW

Friday 9 December 2016

Best Laptop Briefcases for IT Professionals

The right laptop bag can help you make a good impression, but it's also a functional piece of your toolbox as an IT pro. Here are our top picks.

from Tom's IT Pro
via CERTIVIEW

Thursday 8 December 2016

The Cult of Constant Learning in IT

In a field where skills and knowledge turn over constantly, dedicated professionals need to cultivate a mindset of constant learning. There's always more to learn about what you work with, and new tools and technologies coming down the road. The only way

from Tom's IT Pro
via CERTIVIEW

Best Twitter Handles for IT Professionals to Follow

Twitter can be overwhelming, but with a nicely curated list you can stay up to the second on all things infotech.

from Tom's IT Pro
via CERTIVIEW

Wednesday 7 December 2016

4 Reasons Why Now is the Right Time to Learn Web Development with TypeScript

TypescriptWide-1Whether you’re a JavaScript beginner, expert or fanatic—now is a great time to learn TypeScript, a programming language designed to make JavaScript strongly typed and capable of supporting large-scale web applications. TypeScript is a superset of JavaScript, and its recent release, TypeScript 2.0, adds extra features, such as glob support, to make a developer’s life easier. It provides the flexibility to write JavaScript programs that can grow over time without becoming too unwieldy and frees you to concentrate on learning JavaScript frameworks, such as Express and Angular, that empower you to build both RESTful web services and modern client applications.

I just authored a new 5-day course on TypeScript—Essential TypeScript 2.0 with Visual Studio Code—a culmination of a four-month odyssey in which I not only had to learn TypeScript grammar and syntax, but also master an entirely new technology stack and toolchain. Here is a list of topics included in the course:

  1. Introduction to TypeScript
  2. TypeScript Language Basics
  3. Using Visual Studio Code with TypeScript
  4. Task Automation, Unit Testing, Continuous Integration
  5. The TypeScript Type System
  6. Functional Programming
  7. Asynchronous Programming
  8. Object-Oriented Programming
  9. Generics and Decorators
  10. Namespaces and Modules
  11. Practical TypeScript with Express and Angular

I thoroughly enjoyed the process of adding a new weapon to my arsenal as a software developer and the chance to venture off in an entirely new direction. Here are four reasons why now is the right time for you to learn TypeScript.

1. Revenge of JavaScript

A compelling reason to learn JavaScript is that it can be used to write apps for more than just web browsers–you can use it to write desktop and mobile apps, as well as back-end services running in the cloud. JavaScript has unwittingly become one language to rule them all.

Web development has also matured to the point where it’s possible to write an app that has nearly the same interactivity and responsiveness as a traditional desktop application. With the advent of Single Page Applications (SPAs), turbocharged JavaScript engines quickly render rich, interactive web pages. It’s the perfect time to build SPAs because second generation frameworks have emerged that take web development to a whole new level and implement the Model-View-ViewModel (MVVM) pattern (or some MV-* variation), providing benefits such as better separation of concerns, testability and maintainability. Frameworks like Angular, Aurelia and React-Redux also provide tools for quickly scaffolding new applications and preparing them for production.

TypeScript has emerged as the language of choice for building many of these kinds of modern web apps because strong typing enables features we take for granted, such as interfaces and generics. It also provides capabilities most developers couldn’t live without, such as intellisense, statement completion and code refactorings.

2. JavaScript Has Grown Up

In 2015, JavaScript had its most significant upgrade since it was created in 1995 by Brendan Eich in a 10-day hackathon. With the release of ECMAScript 2015, JavaScript received a slew of new features, including classes, inheritance, constants, iterators, modules and promises. TypeScript not only includes all ES 2015 features, but it fast forwards to future versions of ECMAScript by supporting proposed features such as async and await operators, which help simplify asynchronous code. TypeScript lets you use advanced features of JavaScript by transpiling down to ES5, a flavor of JavaScript compatible with most browsers.

When you put modern JavaScript together with TypeScript, you get a powerful combination that gives you just about everything you might want for building SOLID applications that can run in the browser, on the server or on mobile and desktop platforms.

3. Shiny New Tools

The nice thing about TypeScript is that you’re free to use whatever tool you like, from a full-fledged IDE like Visual Studio or Web Storm, to a lightweight code editor, such as SublimeText, Atom, Brackets or Visual Studio Code.  While there’s nothing wrong with any of these options, I prefer using VS Code for TypeScript development because it comes with TypeScript in the box and the team eats their own dog food by using TypeScript to build the editor.

Coming from a C# background, where I was confined to using Visual Studio on Windows, I appreciate being able to run VS Code on my Mac. VS Code starts quickly and I can open it at a specific folder from either the Finder or Terminal. I also found navigation in VS Code to be straightforward and intuitive, and you can perform many tasks from the command palette, including custom gulp tasks. VS Code functions as a great markdown editor with a side-by-side preview that refreshes in real time as you make changes. It has Git integration and debugging support, as well as a marketplace of third-party extensions that provide a variety of nifty services, such as TypeScript linting and Angular 2 code snippets. Put it all together and VS Code is a perfect fit for TypeScript development.

4. Living in Harmony

One of the most compelling reasons I can think of for picking up TypeScript is that it’s the brainchild of the same person who created C#, Anders Hejlsberg, who also invented Turbo Paschal and Delphi. Having such an amazing track record, I have a high degree of confidence in following him into the world of web and native JavaScript development. Anders has made it possible to be more productive and write code that is more resilient because the TypeScript compiler is able to catch problems at development time that would otherwise only become apparent at runtime.

Lastly, it’s significant that Anders did not choose to create a language that is different than JavaScript, such as CoffeeScript, but rather one that includes all of JavaScript with optional type annotations that disappear when TypeScript is compiled down to plain old JavaScript. In fact, all JavaScript is valid TypeScript, and you can insert annotations or leave them out wherever you like, giving you the best of both dynamic and static typing. In other words, TypeScript does not dictate that you follow any of its prescriptions.

All in all, the latest version of TypeScript gives developers what they pine for—additional features that create flexibility, productivity and power. But most importantly, it creates less headaches. I look forward to you joining me in the Essential TypeScript 2.0 with Visual Studio Code course to discover TypeScript’s capabilities.

Happy coding!

Related Courses
Essential TypeScript 2.0 with Visual Studio Code



from
CERTIVIEW

Best Business Continuity And Disaster Recovery Certifications For 2017

These business continuity and disaster recovery certifications are in demand in 2017. Find the most valuable BCP/DRP certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

What Businesses Need to Know About Augmented Reality

What is Augmented Reality (AR), what does the app market look like and should your organization adopt AR now?

from Tom's IT Pro
via CERTIVIEW

Tuesday 6 December 2016

Monday 5 December 2016

How to Issue WMI Queries from Linux

Querying Windows Management Instrumentation (WMI) to gather information about a computer is second nature on a PC for some. But working with it on Linux not-so-much. Here's what you need to know.

from Tom's IT Pro
via CERTIVIEW

Decommissioning Old IT Equipment Made Easy

If done wrong, getting rid of old hardware can be a dangerous security leak and bad for the environment. Here's some tips on how to do it right.

from Tom's IT Pro
via CERTIVIEW

Sunday 4 December 2016

DDoS Blog Series Part 1: Evolving Internet Attacks Turn Smart Devices Against You

ddos-attacks-300x300_purple“Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down.”Bruce Schneier, security expert

A denial-of-service (DoS) attack is a cyber assault intended to block legitimate access to organizations and servers on the Internet. There are two types of DoS attacks: a standard DoS and a distributed denial-of-service (DDoS).

A classic DoS attack is initiated by only a small number of Internet Protocol (IP) addresses—often the assault originates with a single computer or network.

A DDoS attack uses hundreds, thousands or even millions of IP addresses and systems. On Oct. 21, in the largest attack of its kind, hackers used vulnerable home devices such as DVRs and webcams to flood the services of Internet infrastructure provider Dyn. This DDoS attack overwhelmed the victim’s Domain Name System (DNS) servers and made many well-known Internet domains, such as Netflix and Twitter, unavailable for a short period of time.

The attack against Dyn used a Botnet of web-facing devices under control of hacker software called Mirai. Traditionally, hackers use Botnets made up of compromised home computers, PCs and other general purpose systems. Unsuspecting end users open malicious email attachments or respond to prompts and pop-ups from malicious web sites, thereby infecting their computers and becoming part of the Botnet. Mirai was different; it used smart devices like web-accessible baby monitors, surveillance cameras, printers and other Internet of Things (IoT) devices to flood Dyn’s servers on behalf of the attackers.

Typically a simple DoS attack depends on someone sending a malcrafted message across a network—such as the infamous WinNuke—to a target system or have someone open a poisoned file in an application. This could cause a program to close involuntarily, a Blue Screen of Death in Windows or a kernel panic on Mac OS X.

Malcrafted message DoS are effective as single attacks until the victim strengthens their network or patches their systems, at which point hackers are blocked and the attack fails.

Whether a DoS or DDoS, cybercriminals can use three or four other nefarious attack mechanisms:

  • Application floods—servers providing Internet resources are overwhelmed by malicious requests. These could be, for example, against a company’s web servers or against supporting infrastructure. The hacker group Anonymous famously targeted the Church of Scientology with an application flood in 2008, overwhelming their servers and knocking their web site offline for a short time.
  • State-Exhaustion attacks—similar to application floods, these render the underlying computer or network software incapable of response by targeting the connections that are initiated to the victim systems. Whether to web servers or DNS, a system that is deluged cannot respond to legitimate connection requests.
  • Volumetric attacks—as the name implies, they inundate a company’s customer-facing portal or their ISP with malicious network traffic beyond the victims’ ability to respond.
  • Protocol attacks—the objective is to disable complete networks and organizations by misusing normal network traffic, violating the rules for standard communication. This disrupts the ways computers connect to each other or exchange information. Many of the Internet protocols we use today were developed in a far more simplistic time. Hackers can read the Internet standards (called a Request for Comments or RFC) and look for opportunities to use these protocols in a criminal way.

Between the work done by Internet service providers, regulators and the government, efforts are underway to remove the underlying mechanisms used in DoS and DDoS attacks. Part 2 of this blog series will examine how organizations and individuals can avoid becoming victims.

Related Post
How the Seismic DDoS Attack on Dyn Shook the Internet

Related Courses
Cybersecurity Foundations
Certified Network Defender (CND)
Certified Ethical Hacker v9



from
CERTIVIEW

Thursday 1 December 2016

Best Computer Networking Certifications For 2017

These networking certifications, such as CCNP Certifications, are in demand in 2017. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Wednesday 30 November 2016

Office 365 Gets New Collaboration Features

You can now co-author in PowerPoint, upload attachments in Outlook and use a new Shared With Me view across Office 365 apps.

from Tom's IT Pro
via CERTIVIEW

Android Malware Aid Theft of More Than 1.3 Million Google Accounts

A strain of Android malware may be involved in a record number of Google account thefts.

from Tom's IT Pro
via CERTIVIEW

Time for Your Annual Certification Check-up

It's time to take stock of your IT certifications. Here's a quick checklist for you to put to work to decide what certs to keep active and which to replace.

from Tom's IT Pro
via CERTIVIEW

Confessions of an IT Pro: Communication Means More Than You Think

Angela Dugan took a path less traveled into IT, and learned how much communication matters along the way.

from Tom's IT Pro
via CERTIVIEW