Building Individual and Team Capacity Through Faster, Better Decision Making

In this article, InsideOut Development Founder and President, Alan Fine, lays the foundation for building individual and team capacity through a simple decision-making framework that accelerates the speed and accuracy of day-to-day decisions and promot…

Read more

Quit Rolling the Dice in Sales

I just returned from Las Vegas where I spoke to business owners in the construction industry. I admit, I do get excited about wagering, especially in Las Vegas, but I realized how I was getting suckered in when a slot machine caught my eye. It said “99% payout guaranteed,” which sounded like a good thing.[…] Read More

The post Quit Rolling the Dice in Sales appeared first on Sales Training Blog | Sandler Training.

Read more

Virtualization for Newbies: Origins of Virtualization

The origins of virtualization began with a paper that Professor Christopher Strachey presented on time-shared computers at the UNESCO International Conference on Information Processing in June 1959. Time-sharing was a new idea, and Professor Strachey was the first to publish on the topic that would lead to virtualization. After the conference, new research was done, and several more research papers written on the topic of time-sharing began to appear. These research papers energized a small group of programmers at the Massachusetts Institute of Technology (MIT) to begin to develop a Compatible Time-Sharing System (CTSS). From these first time-sharing systems attempts, virtualization was pioneered in the early 1960s by IBM, General Electric, and other companies attempting to solve several problems.

Read more

What You Need to Know about Access Control

A major component of IT security is determining who is allowed into your structure, both physically and logically, and what they do once they have gained access. Access control determines who has how much access. To get control, organizations must lock down their systems, including hosts, networks, applications, data stores, and data flows.

Read more