Is Tailoring Sales Training for Boomers or Millennials Worth It?

Research shows that when implementing change management, effective organizations can dramatically improve results if they tailor training for their generational audiences, whether it’s Boomers, Gen-Xers or Millennials – and those who do realize at least a 66% positive net effect.

Read more

Tips and Tricks for Expediting Service Resolution in Your POWER Server Environment: Part 1

Over the course of the past 28 years or so, I’ve been called upon to assist clients with resolving existing service-related POWER Systems issues, both hardware and software (configuration / application performance) related. Expediting the resolution of service-related issues is key to maintaining a successful environment. Whether you’re a newly initiated or seasoned system administrator, there are three critical elements involved in expediting service resolution: documentation, preparation and conversation!

Read more

Key Management in the Cloud

In my previous cloud security blogs, I mentioned the need to use key-based encryption for protecting data. Whether the data is in flight (i.e., being transmitted) or at rest (i.e., stored), it must be encrypted to ensure confidentiality, integrity and availability. Managing encryption keys can be challenging. There are different key types (symmetric vs. asymmetric), key strengths (128-bit through 2048-bit and greater), key usage (privacy, key exchange, authentication and digital signature) and key encryption algorithms (AES, 3DES, SHA-1, SHA-2, MD5, etc). Furthermore, each data end point, like storage or server, requires an integration point that also needs to be managed. For example, for storage we need an encryption integration point for each storage medium (disk, SAN, NAS or tape).

Read more