Today, Zach interviews LinkedIn Top Voice and Digital Transformation Strategist, Jeff Winter. From the beginning, Jeff’s career has centered around manufacturing, with his latest focus being on Industry 4.0. You may have heard the buzzwords, but do you know what Industry 4.0 and Digital Transformation really are? Zach and Jeff dive head first into these concepts, explaining their unique meanings …
Gen AI in the Enterprise with Dr. Mark van Rijmenam
Zach hosts Strategic Futurist, TEDx speaker, and founder of The Digital Speaker, Dr. Mark van Rijmenam. Dr. van Rijemenam is a prolific, highly awarded author and speaker who lives and breathes cutting-edge techs like Gen AI. He considers himself an optimistic dystopian (a bit of an oxymoron); he believes it’s critical to understand the bad and the ugly in order to end up in the good.
Dr. van Rijemenan is a true expert on Generative AI. In fact, ChatGPT is listed as a co-author on one of his latest books! Zach asks him about the process, diving down the rabbit hole of these new techs, their appropriate uses, and strategies to mitigate risk.
What is Mainframe Modernization & How Can My Business Benefit From It?
Mainframes have long powered critical financial transactions and government operations. However, across the U.S., particularly in Kansas, these systems are showing their age. The COVID-19 pandemic exposed a critical issue: essential services like unemployment insurance were crippled by outdated COBOL systems, causing significant delays. This is more than an inconvenience; it’s a clear signal that mainframe modernization is urgently needed …
GenAI In The Enterprise: John Fly
Attention: This article was published over 2 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In this episode of Generative AI In the Enterprise, Zach hosts John Fly, CTO at FirmPilot AI today on the pod. John started coding …
Top Security Mistakes to Avoid in AppDev
Developing custom applications is one of the hardest professional endeavors, and making them secure is even harder. Malicious actors are constantly changing tactics and strategies, which, unfortunately, makes it impossible to completely eliminate any security threat.
There needs to be a balance between delivering features quickly to meet business objectives and mitigating security risks. Thankfully, these two goals are not mutually exclusive. This blog post dives into the top mistakes that can be made while developing custom applications.
These recommendations are different from what would commonly be seen in an OWASP list, and they should be used in addition to whatever security practices and procedures are already in place by an organizationโs infosec department. These recommendations are also written from an application architectโs (rather than an enterprise infrastructure) perspective, so most of them arenโt covered by existing security checklists.
- Page 2 of 2
- 1
- 2

