The Art of Prompting – Basic Communication with AI

AI Over 40 Series – Week 3 Many of us have treated AI like a fickle search engine—demanding perfect queries, agonizing over keywords, and double-checking every answer for “hallucinations.” That approach quickly becomes exhausting and unscalable. In this week’s installment of our “AI for the Over 40” series, we’ll flip the script: instead of engineering… Continue reading The Art of Prompting – Basic Communication with AI

Setting Up Your AI Workspace – Tools and Access

AI Over 40 Series – Week 2 Why having multiple AI platforms is like having specialized consultants on retainer (and how I learned this the hard way) As a Microsoft Business Central Partner, my instinct is to start with Microsoft solutions. It’s not just loyalty—my clients trust me to help them maximize their Microsoft investments.… Continue reading Setting Up Your AI Workspace – Tools and Access

Understanding What AI Actually Is – and How to Work with It

AI Over 40 Series – Week 1 I’ve been chasing the promise of AI for years. Long before ChatGPT became a household name, I was installing aftermarket tech in my SUV to make it self-driving—much to my wife’s dismay. (Ironically, she now prefers driving that car thanks to the AI features.) Despite my enthusiasm—and even… Continue reading Understanding What AI Actually Is – and How to Work with It

4 Techniques to Optimize Jet Reports for Faster Run Times

Oh, if only there were a set of steps that, if followed, would guarantee a fast Jet Report. Given the nuances and intricacies in the design of many reports, combined with other factors, like the more complex database structure of BC compared to NAV, the size of your data, and your network or internet speed,… Continue reading 4 Techniques to Optimize Jet Reports for Faster Run Times

Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important

Remaining Vigilant: External threat detection with OSINT

For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT

Phishing, Quishing, Vishing, and Smishing

Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing

Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central

Migrating historical data for GP customers to Microsoft Dynamics 365 Business Central can cause a good deal of concern due to complexity, costs, and preferred data formats. But companies rely on historical data and want access to older accounts, sales orders, inventory summaries, and invoices. One solution to help companies move forward and avoid a… Continue reading Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central