Joseph Gulla

Joseph Gulla




Bookmark and Share
RSS

Recent Posts

  • Let’s Focus on Ops
    October 22, 2018
  • The Future of Jobs in IT
    October 15, 2018
  • Jobs in IT are Very Diverse
    October 8, 2018
  • Who Does What Job in IT?
    October 1, 2018
  • Skills, Experience and Accreditations for Project Management
    September 24, 2018
  • Some Favorite Things: The Evolution of IBM Z

    This is the first of a few planned posts about what I would characterizes as “a few of my favorite things” like the lyric in the movie—you know which one. I am looking back over the last 40 years and I see at least four areas in IT where the impact of a certain kind of computing technology has had a huge impact on the industry and the world that it supports. Let me start with the machine.

    Read More

    Posted: June 4, 2018 |

    2018 ECC Conference

    The purpose of this post is to make you aware that Marist College, with collaboration and support from academic and industry partners and sponsors, will host the 10th annual Enterprise Computing Community conference. This year’s conference is June 17-June 19. Registration is still open but will likely reach the 300-person limit soon. The conference has two themes: disruptive technologies in the enterprise and the Internet of Things.

    Read More

    Posted: May 28, 2018 |

    Three Rs in Context

    In this post, I finish up this series on the three Rs. In the first post in this series, I asked, “Is there a model that will help us analyze and begin to address difficult obstacles regarding needed change, expansion of method or complexity?” The model I proposed involved three Rs: renew, refresh and rework. 

    Read More

    Posted: May 21, 2018 |

    IT Change and Rework

    In this post, I concentrate on the times when rework is needed. It could be to fix something that was not done correctly or to make a modification to an existing solution to enhance its usefulness. As you know, rework is not always so black and white, fix or enhancement. 

    Read More

    Posted: May 14, 2018 |

    A Focus on Refresh

    In this post, I concentrate on approaches and tactics to refresh aspects of a computing portfolio. In the first post in this series, I asked, “Is there a model that will help us analyze and begin to address difficult obstacles regarding needed change, expansion of method or complexity?” The model I proposed involved three Rs: renew, refresh and rework. Last week , we explored renew, now let’s consider refresh using an example featuring Java. 

    Read More

    Posted: May 8, 2018 |

    IT Change and Renewal

    In this post, I concentrate on approaches and tactics to address challenges like breathing new life into applications.

    Read More

    Posted: April 30, 2018 |

    Keeping Up with IT Requires Thoughtful Change and Renewal

    In this post, I concentrate on dealing with change by focusing on taking control and managing the key wants and needs that impact specific IT challenges. The framework for this model is a discussion of wants and needs, approaches and tactics, and expected outcomes. 

    Read More

    Posted: April 23, 2018 |

    IT Security and Data

    This week, I’ll continue with the computer security topic with a focus on data and computer security. According to Techopedia, data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption.

    Read More

    Posted: April 16, 2018 |

    IT Security Standards

    This week, I continue the computer security topic with a discussion of security standards used by security professionals. An example is ISO/IEC 27001, a standard that specifies a management system that is intended to bring information security under explicit management control. This standard is part of a growing family of information security management standards.

    Read More

    Posted: April 9, 2018 |

    IT Security People

    This week, I continue the computer security topic with a look at what “security people” do on a day-to-day basis. So far, I have discussed hardware and software, and now I want to explore the human aspects of security and security administration. Last week, I wrote about identity and access management products, endpoint security and messaging security programs like secure email gateways. Security specialists install and maintain products in these categories but the job of security specialist is bigger than that.  

    Read More

    Posted: April 4, 2018 |

    Displaying results 21-30 (of 252)
     |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|