Barker Management Consulting ensures that business technology is mission oriented, strategic, and secure for service-based industries and government contractors.
CASE STUDY #1
Workflow Strategy Expansion
A technological non-profit has been tasked with assisting localities with expanding rural broadband. The non-profit had a solid process for evaluating the current infrastructure in place and identifying expansion priorities.
They wanted to expand their support in helping localities get out of the gate with actual implementation.
CASE STUDY #2
Federal Gov’t Web Services Support
The federal government was executing a significant expansion of a support program for active duty, retired, and military spouses. The platform has a global reach with over 400,000 users. The expansion saw a significant uptick in the amount of personnel needed to support the web portals.
To accommodate for the increase of client users, support staff, and future services significant processes and procedures needed to be designed to streamline operations and create a smooth experience for the client users.
News and Notes: Expand your Knowledge
ZOOMpocalypse: 6 Tips for Secure, Efficient Virtual meetingson April 13, 2020 at 1:55 pm in Broadband, Management, Technology, agenda, broadband, comcast, cybersecurity, data, data cap, gotomeeting, hosting, internet, isp, meeting agenda, meetings, rural broadband, security, virtual meetings, virtual summit, webex, webinar, wifi, wireless communication, wireless internet, zoom
There is only one thing on people's minds in the last couple of weeks, Covid-19. I believe The post ZOOMpocalypse: 6 Tips for Secure, Efficient […]
Bug Bounty FAQ: Top Questions, Expert Answerson September 26, 2020 at 10:01 am in Bug Bounty, Hacks, Vulnerabilities, bug bounty, Bugcrowd, Casey Ellis, Chloé Messdaghi, Mike Takahashi, Point3 Security, Tommy DeVoss, Unix System, VDP, vulnerability disclosure policy
Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity […]
Twitter bug may have exposed API keys, access tokenson September 26, 2020 at 3:18 am in Security News, Vulnerabilities
Twitter warned developers that a bug could have exposed their API keys and access tokens in their browser’s cache. The social media platform […]
COMMENTS AND REVIEWS
“John has always been an exceptional industry partner with a clear command of information technology, running the spectrum from policy to implementation. He brings both complementary and force-multiplying skills to every initiative we’ve undertaken. A true asset and go-to teammate.”
Michael Ferritto – Aquila Technology
“I have had the privilege of knowing and working with John Barker for 17 years. His business solutions are both thoughtful and practical. He is a life learner, so I know when I work with John, I am getting the latest thinking across the industry of thought leaders. His tools and templates have provided me with realistic and practical prompts to get started on various projects.”
Cara Parker – CParker Consulting