Adam E. Williams | #RoadmapForSuccess
Leader. Visionary Strategist. Incisive Tactician. Entrepreneur. Old World Dreamer. New World Geek.
Pat and Lisa ARE BACK! Thanks to our 14 listeners for your patience. Pat recently got a residual check from his stint on “Bill Nye The Science Guy”. And even though Pat and Lisa sometimes… Seattle Radio personalities (and we use that term loosely) Pat Cashman and Lisa Foster are BACK and on DEMAND talking
Read MoreMaybe some last names should be changed, like William Crotch. Hot dog eating contests are nauseating to watch. How tolerant are you of hosting long term house guests? Lisa is considering ditching the… Seattle Radio personalities (and we use that term loosely) Pat Cashman and Lisa Foster are BACK and on DEMAND talking about stuff
Read MoreAs organizations worldwide start to migrate en masse toward remote and hybrid work models, there is a noticeable concurrent trend toward data center transformation. IT leaders are figuring out that the old model doesn’t work anymore – you can’t survive by simply keeping your data in one location, on premises. When you have people distributed
Read MoreOver the last few years, we’ve witnessed a rapid change in the way patients, physicians, and healthcare providers create and use data. As the world discovers new patient care strategies, new approaches to remote and mobile care, and new communication channels, a proliferation of data is underway – and with it comes a need for
Read MoreAll across the business world, the year 2022 has unfortunately come to be defined by disruption. It’s happening everywhere. Price increases are making it difficult for companies to secure the raw materials they need. Unrest in international relations is making an economic impact as well. And of course, a global pandemic rages on, which makes
Read MoreThe sad truth about today’s business environment is that cyberattacks are inevitable. Somewhere in the world, a new attack is happening every few seconds – and the majority of the time, the business being attacked lacks the infrastructure needed to defend themselves. For today’s corporate leaders, the challenge is to find security fortification tools that
Read MoreIn NIST SP 800-207, The National Institute of Standards and Technology (NIST) defines zero trust (ZT) as “a new model for cybersecurity” where a Zero Trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement.” One fundamental tenet is
Read MoreSadly, lots of deaths in the music world recently. And we want to thank our PecPod contributors! Pat and Lisa reminisce about the beloved butterhorn pastry thanks to our listener Bill Kuder. How… Seattle Radio personalities (and we use that term loosely) Pat Cashman and Lisa Foster are BACK and on DEMAND talking about stuff
Read MoreAs we’ve entered a new era of remote work, employees everywhere have uncovered major benefits. By doing their jobs outside of the traditional office, people have come to discover entirely new levels of flexibility, productivity, and convenience. And by and large, their employers are happy too. But there is one red flag for companies and
Read More