Skip to main content

Posts

I am a PMP®, Now What?

 Excited to share that I am now a PMP certified project manager. I passed the PMP exam in my first attempt, above target in all domains. If you’ve made the decision to get your Project Management Professional (PMP)® credential, it’s a big step in your career but it can be a time-consuming and difficult journey. However, the certification is definitely worth the effort. Thousands of project managers have walked before you, gaining those extra letters after their name. Those letters demonstrate their commitment to project management as a career, their detailed knowledge of the topics in A Guide to the Project Management Body of Knowledge and their prior experience.
Recent posts

Women in Tech Texas 2023

  What an unforgettable experience attending Women in Tech Texas 2023! It was great meeting so many intelligent, supportive and talented women. The keynotes were mesmerizing, and the workshops were unforgettable. Amazing hearing from leaders in diverse industries. What an honor to listen to such smart women, including Gwynne Shotwell, President & COO of  SpaceX discussing the future of space exploration.  Also Santander’s @Dr. Virnitia Dixon riveting and emotional presentation on human connections to Shell’s @Anu Krishnan discussing how energy transition and digitalization are changing business models.   Can’t wait to see what next year brings!

What can I do? Protecting your privacy

  Secure Your Devices o    Your phone is your ultimate endpoint. You carry it everywhere and it usually holds your most personal secrets and sensitive information. Your iPhone encrypts as soon as  you lock your screen (even the feds can't access it), but Android devices  have to be shut down entirely . o     Learn the appropriate methods to secure your device.      Old Links ==> Here's a guide on how to  secure your iPhone , and here's another guide for  most Android devices . TURN OFF FINGERPRINT PHONE UNLOCK o    Your Touch ID or fingerprint sensor is meant to keep your data more secure. However, in some cases federal agents can  force you to unlock your phone  with your fingerprint, because the courts have determined that it is not a violation of the Fifth Amendment, which protects against self-incrimination. The feds however cannot force you to turn over your passcode. BE MINDFUL OF EVERY APP YOU INSTALL SET A STRONG PASSCODE REDUCE YOUR ONLINE FOOTPRI

A BITx Discussion: Protect Your Children Online

  You tube link: https://youtu.be/QzsQrB5jI8Q 

A superior ECM solution starts with a great team

I recently had the opportunity to host a session at the Louisiana Technology Conference to  revisit  the  Enterprise Content Management  project for DOTD. I reviewed where the agency started with the migration and FileNet implementation, where they are now and a vision for the future with a mature, scalable ECM solution.  Kathy Ruegg, Business Analyst for the project, presented a new workflow solution and truly engaged with the audience.  I also loved providing swag for the attendees at my session.  The insulated bags were really popular!  This was my first in-person conference session since the pandemic started in 2020 and  I had a great time. I really enjoyed seeing everyone in person again. 

Influential Black Computer Scientists

  Highlighting  Kimberly Bryant is an African American electrical engineer who worked in the biotechnology field at Genentech, Novartis Vaccines, Diagnostics, and Merck. In 2011, Bryant founded Black Girls Code, a nonprofit organization that focuses on providing technology and computer programming education to African-American girls. After founding Black Girls Code, Bryant was listed as one of the “25 Most Influential African-Americans In Technology” by Business Insider. Learn more about Kimberly Bryant Annie Jean Easley was an American computer scientist, mathematician, and rocket scientist. She worked for the Lewis Research Center of the National Aeronautics and Space Administration and its predecessor, the National Advisory Committee for Aeronautics . She was a leading member of the team which developed software for the Centaur rocket stage, and was one of the first African-Americans to work at NASA. Easley was posthumously inducted into the Glenn Research Hall of Fame in 2015. On F
When your sort algorithm does more harm than good.   --- I've noticed an annoying trend lately from some of the designer fashion brands and major retailers.  No Sorting by price is allowed! A Sorting Algorithm is used to rearrange a given array or list of elements according to a comparison operator on the elements. The comparison operator is used to decide the new order of elements in the respective data structure. Sorting allows users to rearrange products so that those of most interest are at the top of product list.  Allowing users to sort by “Price”, “User Rating”, “Best-Selling”, and “Newest”. If I want to sort by price, why would a company purposely prevent me, the consumer, from browsing the goods in the order that I choose? And using a range sort is a lazy rationalization.  As a consumer, I will immediately exit a website if I cannot sort by price.    Tom Brokaw used to have an  occasional feature on NBC Nightly News called “ The Fleecing of America ". I consider the