our Work

A selection of work done for various clients over the years

Featured Project

11,000-word e-book for Thycotic

Project created from existing marketing materials and SME interviews.

From the Introduction:  When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are
its endpoints. And not just any endpoints, but those running
Windows, Linux, macOS, or Unix operating systems. These
endpoints represent fertile ground for attacks because, more
often than not, their users, applications, and services have
elevated privileges that give cyber criminals an easy on-ramp
to the inner workings within your organization.


But you can fight back. Endpoint privilege management (EPM)
is a set of technologies IT security teams can use to automatically contain threats long before they become exploits. It all
comes down to applying the cyber security strategy of least
privilege. By limiting access to just the functionality each user,
application, and service needs to do its job, EPM and least
privilege ensure that if malware or a cyber criminal gain a
foothold, the threat is eviscerated and the damage contained.

Testimonials

Allen served as our subject matter expert and was the contributing writer for over 35 articles. This was a high pressure project with tight deadlines that required extreme detail. Allen was a committed and reliable force in creating our content and getting the site live as scheduled, ensuring our success.

Chris Saccone, Account Director, MRM/McCann

Allen is one of those rare writers and editors who truly understands what’s going on in business and IT and can properly write about the intersection of the two.

Todd Tucker, General Manager, TBM Council

Allen has a really strong understanding enterprise software marketing, from products and technologies to the organizational stakeholders in IT, line of business and executive levels. For marketing content needs, I would highly recommend working with Allen

Shahed Ahmed, SVP, Merrit Group

Recent Projects

What is Shadow IT?

What is Shadow IT?

ABB Ability™ Performance Optimization for power generation

ABB Ability™ Performance Optimization for power generation

COVID-19 Driving Increased Robotic Process Automation Adoption

COVID-19 Driving Increased Robotic Process Automation Adoption

Try these tactics to help IT staff avoid burnout

Try these tactics to help IT staff avoid burnout

A Mid-Market Supply Chain Manager’s Roadmap to Mobile

A Mid-Market Supply Chain Manager’s Roadmap to Mobile

The ROI of Digitalization

The ROI of Digitalization

5 STEPS TO FUTURE-PROOF YOUR CLOUD MIGRATION STRATEGY

5 STEPS TO FUTURE-PROOF YOUR CLOUD MIGRATION STRATEGY

10 things you thought you knew about blockchain that are probably wrong

10 things you thought you knew about blockchain that are probably wrong

What is Industry 4.0?

What is Industry 4.0?

Top 5 skills needed for the industrial IoT

Top 5 skills needed for the industrial IoT

ICC to CMOs: Time to Take the Leap to Data Driven Marketing

ICC to CMOs: Time to Take the Leap to Data Driven Marketing

Technology Business Management: The Four Value Conversations CIOs Must Have With Their Businesses

Technology Business Management: The Four Value Conversations CIOs Must Have With Their Businesses

VDI Technology Better, Faster and Cheaper, But Adoption Still Slow

VDI Technology Better, Faster and Cheaper, But Adoption Still Slow

Three technologies that could demolish slow internet

Three technologies that could demolish slow internet

Pokemon GO Is So Last Summer. What’s Next For Augmented Reality?

Pokemon GO Is So Last Summer. What’s Next For Augmented Reality?

Iridium Next satellites to bring broadband IoT to every corner of the globe

Iridium Next satellites to bring broadband IoT to every corner of the globe

The ROI of Digitalization

The ROI of Digitalization

How to Categorize Risk in IoT

How to Categorize Risk in IoT

At Fidelity, TBM speeds cloud, enables app rat, and improves business alignment

At Fidelity, TBM speeds cloud, enables app rat, and improves business alignment

How digitalization improves steam power plant performance with advanced process control

How digitalization improves steam power plant performance with advanced process control

The End of Your Network as You Know It

The End of Your Network as You Know It

The current and future state of blockchain in corporate finance

The current and future state of blockchain in corporate finance

The ultimate Cloud Center of Excellence (CCoE) framework

The ultimate Cloud Center of Excellence (CCoE) framework

Evaluating the GDPR experiment

Evaluating the GDPR experiment

5 STEPS TO FUTURE-PROOF YOUR CLOUD MIGRATION STRATEGY

5 STEPS TO FUTURE-PROOF YOUR CLOUD MIGRATION STRATEGY

5 KEY BENEFITS OF BIM FOR PLANT DESIGN

5 KEY BENEFITS OF BIM FOR PLANT DESIGN

How to use mobile data to improve fleet management.

How to use mobile data to improve fleet management.

Ready to put your content to work?

Please get in touch!