Blog Archive

Why IT Specialists Add More Value Than Generalists

My (much smarter than I) wife of 23 years is a nurse in Cardiovascular (CV) surgery. From a medical layman like myself, that by itself sounds like a particular specialty. When we talk about the cases she does and the surgeons she works with, I quickly realize that...

Can Your Network Handle the Digital Era? SD-WAN is the Key

As businesses evolve with more users, apps, and devices, traditional WAN architectures struggle to keep up. Our event explores how Software-Defined WANs (SD-WANs) can enhance performance, increase bandwidth, optimize cloud connectivity, and improve security posture. Learn from experts about addressing performance issues with SaaS applications, reducing WAN costs, and increasing uptime. This session is ideal for IT leaders in biotech and life sciences aiming to modernize their network infrastructure.

The Olympics are Going for the Cloud Gold

The Winter Olympics have evolved dramatically over the past 20-30 years, with innovations in equipment and performance. Classic events like downhill skiing and figure skating now coexist with cutting-edge technology, including cloud infrastructure. This shift has revolutionized the way the games are managed, reducing costs and enhancing the experience for both athletes and audiences. The cloud’s role in this transformation highlights its potential value for other organizations considering similar advancements.

PTP Gives Back: Christmas Delivery

  The PTP team continues to spread holiday cheer through our community outreach efforts. This past Christmas, our dedicated PTP “elves” worked together to bring joy to two families in need. Partnering with St. Vincent de Paul in Cincinnati, we successfully...

Meltdown and Spectre Vulnerabilities—and How to Spot Them

Understand the critical aspects of Meltdown and Spectre vulnerabilities and how to protect your systems. Meltdown allows access to other programs’ memory, while Spectre tricks programs into leaking data. These vulnerabilities can be detected and mitigated with current endpoint protections like Cybereason or Cylance. Join our session to learn about deploying patches, utilizing web proxies, firewalls, and ensuring your systems are secure. Ideal for IT professionals seeking to enhance their security posture against these threats.

Cybersecurity and the “Human Factor”

A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today’s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even...