MarkMillerITPro  ツ Sr SysAdm1n DCOps

@MarkMillerITPro

Infinite Computer Solutions | | Views mine, wife's daughters' sons' cats' dogs'. Endless Opinions ¯\_(ツ)_/¯

Greater LA CA area - Appsurd Cats
Vrijeme pridruživanja: travanj 2011.

Tweetovi

Blokirali ste korisnika/cu @MarkMillerITPro

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MarkMillerITPro

  1. Prikvačeni tweet

    Ok, so all my skills aren't listed on my redone LinkedIn Profile. But you get the idea. Be sure to click on "Contact Info" for Portfolio link that includes my new resume.

    Poništi
  2. You are 40 times more likely to receive an opportunity through LinkedIn if your profile is complete.

    Poništi
  3. Many professionals have incomplete & inaccurate social profiles—notably on LinkedIn.

    Poništi
  4. Candidates who complete LinkedIn Skill Assessments are significantly more likely (~30%) to get hired.

    Poništi
  5. (s) - get two to five times more engagement on their posts.

    Poništi
  6. Automation, 5G, robotics, Internet of Things & enable many new applications & business models, but already produce a large amount of data today. To ensure these data can be processed efficiently & quickly on site, mini, micro & Edge are used.

    Poništi
  7. Practice protected powering. Apple & Android phone makers have taken steps to stop charger port attacks by disabling data transfer capabilities of charger port by default. Users will be asked if they want to transfer data before sharing process begins.

    Poništi
  8. googlewallet So easy. Forgot my wallet at Safeway, had my phone :-)

    Poništi
  9. New model of : multifactor authentication, behavioral analytics, deception tech. Behavioral analysis & deception technology provide more comprehensive monitoring & protection based on assumption attackers will get thru—that “them” is “us” & they are already inside

    Poništi
  10. "Creating an IT architecture is not easy. It is a hard job to do. As IT architect you need to address a lot of stakes, concerns, issues, politics, trends & other matters at the same time. To be a successful IT architect requires years of training and practice."

    Poništi
  11. Syndicated blog posts. Share what you've written elsewhere on your LinkedIn profile “This post originally appeared on …” as an intro.

    Poništi
  12. Practice protected powering Attack known as “juice jacking.” No cases of it have been found out there in the real world. A problem waiting to happen. Public USB charging stations. Charging cords can carry power as well as data. Hacker could add storage device to distribute s…

    Poništi
  13. I designed & programmed slot machines & video poker using when I lived in Vegas. MarkMillerITPro

    Poništi
  14. Your Digital Identity has Become Your First Impression.

    Poništi
  15. Why we don’t know as much as we should about police surveillance technology via

    Poništi
  16. CTO stays informed about up-and-coming technological innovations & evaluates their usefulness to the tech infrastructure of a company.

    Poništi
  17. An IT disaster recovery plan is a plan that outlines an organization’s policies and procedures that ensure the safety and continuity of its IT environment following a disaster.

    Poništi
  18. recognize a Fake Follower? The Twitter account has hardly any tweets or no tweets.

    Poništi
  19. Employees are viewed as most credible source of info about a company and clients treat them as ambassadors for the company.

    Poništi
  20. Every employee is selling in some capacity — even if they don’t think they are.

    Poništi
  21. Those that don’t get on board with soon risk becoming metaphorical typewriters in the age of computer processors.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·