Allan Hoffman

Working with Embedded Systems

Microprocessors are everywhere. Digital cameras have them. So do ATM machines, microwaves -- even door locks. If you start to look around you, youre bound to realize youre surrounded...

Novell Certification

Novell was once a name synonymous with technology certifications. The company pioneered certification programs as continuing education and a recognized credential for IT pros. Now, with certifications proliferating --...

The OOP Edge

Object-oriented programming concepts have become accepted practice within the programming world, but thats not to say object-oriented programming -- OOP, as its often called -- is universally appreciated or...

Citrix Certification

System administrators and network engineers often yearn for a hot certification to make them more marketable. In reality, certification alone -- without hands-on experience -- isnt worth much. But...

Selling Yourself, Part I

Wesley Jost didnt have to do much more than place his resume on an online job site or two to find his last job, working for a London software...

Latest Posts

Komprise’s Krishna Subramanian on Managing Unstructured Data

I spoke with Krishna Subramanian, President and COO of Komprise, about best practices in managing unstructured data, a data type that many companies are...

Software AG CEO Sanjay Brahmawar on the Truly Connected Enterprise

I spoke with Sanjay Brahmawar, CEO of Software AG, about how connecting people, processes and technology enables a company to become a truly connected...

Top 5 Announcements From Cisco Live 2022

Recently, network market leader Cisco held its annual event, Cisco Live, in Las Vegas. It’s been three years since the network giant held the event...

4 Challenges of the SOC: How Decision Intelligence Can Help

Networks and the valuable data they hold are under attack as never before. That’s bad timing for today’s digital organizations, as they continue to...

Splunk vs. ELK: Log Management and Analysis Comparison 2022

ELK and Splunk are both well respected vendors in the log management and analysis space. Both offer broad monitoring and data analytics of security...