• Jan 02
    2015
    One of the most important legs of any certification journey involves the long process of preparation and learning that takes place over the weeks and often months prior to scheduling an exam. Even seasoned IT pros often have quite a bit of new material to take in when contemplating a new certification. The field of study and training providers is crowded. It’s difficult to carve out a niche, and difficult ...
  • Dec 16
    2014
    What you teach employees during mentoring, coaching or skills training will be out of mind as soon as you’re out of sight unless you reinforce the learning. For that you can thank the “forgetting curve.” This psychological principle, first identified in the 19th century, posits that much of what we learn is quickly forgotten, most of it within hours. Here are five tactics you can use to help employees remember. ...
  • Dec 09
    2014
    Don't Make Virtual Meetings a Bore You have to hold a meeting, but everyone who should participate is somewhere else. What should you do? Hold the meeting virtually. More than 20 million virtual meetings are held every year. Some 85 percent of projects now include remote team members and that percentage keeps rising. If you plan it right, a virtual meeting will let you accomplish everything you could with an ...
  • Dec 04
    2014
    As featured in the Democrat and Chronicle: Depending on how you count, Logical Operations is a 2-year-old start-up firm or one of the oldest information technology training firms in the Rochester region. The first incarnation of Logical Operations came when it was founded in 1982 by two Rochester Institute of Technology professors. And it’s gone through numerous hands and incarnations since then — being bought in 1991 by Ziff-Davis Inc., ...
  • Dec 03
    2014
    The majority of successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach. However, as demonstrated by recent security breaches of several large, tech-savvy companies such as Target, LivingSocial, Facebook, Gmail, and Twitter, no set of security measures is completely infallible to a breach. What businesses of today have to then ...
  • Nov 24
    2014
    Though most organizations have made rapid strides in securing their networks, many are still vulnerable to problems from the misuse of mobile applications. As more employees are using their own devices for work, the potential for compromising security is increasing. There’s a shortage of developers with mobile app security skills. Organizations need to bring staff up to speed quickly in this vital function. Following is a curriculum for training for ...
  • Nov 21
    2014
    Financial conferences present excellent opportunities for networking. They offer opportunities to meet new people who can help you move your career forward and they can help you strengthen your relationships with your existing contacts. Here’s a guide on how to power network before, during and after the conference. Planning Learn the conference’s agenda in advance. Identify the sessions your best prospects are likely to attend and put these meetings on ...
  • Nov 21
    2014
    As featured in the Rochester Business Journal, Logical Operations has a renewed learning focus decades after its launch.