SIMNJ Roundtable Discussion
At the Dec. Roundtable, two of the top three priorities for 2021 were Cloud-related projects. In January, we will be discussing the Lessons Learned by our members as they implemented...
At the Dec. Roundtable, two of the top three priorities for 2021 were Cloud-related projects. In January, we will be discussing the Lessons Learned by our members as they implemented...
As Business Intelligence (BI) and Analytics become more entrenched within organizations, it is imperative that organizations develop a well-conceived BI/Analytics strategy to fit their culture. Jay Liebowitz, visiting professor of...
As Working From Home continues, employees’ time boundaries are not as respected as they once were. This is leading to more and more lunch time meetings or just taking any...
One could argue that the paradigm of “how we work,” one of the vestiges of the Industrial Era, has no doubt shifted. Technology, culture, and now the pandemic have not...
Do you want to share your own IT success stories, or ask other members about how they handled certain challenges? Do you have questions about NJ SIM? Want to know...
Roundtable, Wednesday, Sept 22 at 12:00pm We will also host a Roundtable discussion moderated by Kevin Northover, Lead Data Scientist for Delta Dental of New Jersey and Connecticut. During this...
Roundtable, Wednesday, Oct. 27 at 12:00pm Join us for this virtual roundtable on Wed, Oct 27 at 12:00pm, and share your insights with your peers. Attendance will be capped at...
Over 70% of enterprise IT projects fail. For larger, more complex projects over a million dollars the failure rate jumps to 95%. These failures cost US companies roughly $500 Billion...
We continue the discussion on How To Win The Talent War with the first of two Virtual Roundtables on Tues, Jan 18 at 12:00pm. The discussion will concentrate on our...
How To Win The Talent War concludes on Wed, Jan 26 at 12:00pm with a discussion on our Defensive Playbook – Retaining Talent. The roundtable will be an open...
IoT is both a buzzword and a fact of life. At home we have smart devices – thermostats, water level monitors, refrigerators, doorbells, etc. In business there are IoT devices...
Edge computing is a distributed computing architecture that brings compute and data storage closer to the sources of data. Those real time data sources are often sensors or users. IoT...
Penetration testing is one type of ethical or white hat hacking technique that helps security leaders evaluate the effectiveness of their security armor before hackers do. With cyberattacks increasingly sophisticated...
Third Party Risk Management (TPRM), sometimes known as Vendor Risk Management, is the practice of evaluating and mitigating risks introduced by third parties (suppliers, business partners, etc.) TPRM is a...
Join us at the April 19 NJ SIM Roundtable where Anubha Gaur of Quest Diagnostics will share the benefits of Quest’s journey to DevSecOps, the challenges and impediments they faced,...