Barker Management Consulting ensures that business technology is mission oriented, strategic, and secure for service-based industries and government contractors.
CASE STUDY #1
9-Figure Organization and Gambling
A horse training organization was having issues with the technology implemented and proper cybersecurity. Gambling was a main driver for the organization.
They need a full evaluation: worflows, process and procedures, and technology.
CASE STUDY #2
Federal Gov’t Web Services Support
The federal government was executing a significant expansion of a support program for active duty, retired, and military spouses. The platform has a global reach with over 400,000 users. The expansion saw a significant uptick in the amount of personnel needed to support the web portals.
To accommodate for the increase of client users, support staff, and future services significant processes and procedures needed to be designed to streamline operations and create a smooth experience for the client users.
CASE STUDY #3
Workflow Strategy Expansion
A technological non-profit has been tasked with assisting localities with expanding rural broadband. The non-profit had a solid process for evaluating the current infrastructure in place and identifying expansion priorities.
They wanted to expand their support in helping localities get out of the gate with actual implementation.
News and Notes: Expand your Knowledge
ZOOMpocalypse: 6 Tips for Secure, Efficient Virtual meetingson April 13, 2020 at 1:55 pm in Broadband, Management, Technology, agenda, broadband, comcast, cybersecurity, data, data cap, gotomeeting, hosting, internet, isp, meeting agenda, meetings, rural broadband, security, virtual meetings, virtual summit, webex, webinar, wifi, wireless communication, wireless internet, zoom
There is only one thing on people's minds in the last couple of weeks, Covid-19. I believe The post ZOOMpocalypse: 6 Tips for Secure, Efficient […]
Top Illicit Carding Marketplace UniCC Abruptly Shuts Downon January 14, 2022 at 5:31 pm in Privacy, Web Security
UniCC controlled 30 percent of the stolen payment-card data market; leaving analysts eyeing what’s next.
- Feed has no items.