AI Over 40 Series – Week 3 Many of us have treated AI like a fickle search engine—demanding perfect queries, agonizing over keywords, and double-checking every answer for “hallucinations.” That approach quickly becomes exhausting and unscalable. In this week’s installment of our “AI for the Over 40” series, we’ll flip the script: instead of engineering… Continue reading The Art of Prompting – Basic Communication with AI
Category: How To General
Setting Up Your AI Workspace – Tools and Access
AI Over 40 Series – Week 2 Why having multiple AI platforms is like having specialized consultants on retainer (and how I learned this the hard way) As a Microsoft Business Central Partner, my instinct is to start with Microsoft solutions. It’s not just loyalty—my clients trust me to help them maximize their Microsoft investments.… Continue reading Setting Up Your AI Workspace – Tools and Access
Understanding What AI Actually Is – and How to Work with It
AI Over 40 Series – Week 1 I’ve been chasing the promise of AI for years. Long before ChatGPT became a household name, I was installing aftermarket tech in my SUV to make it self-driving—much to my wife’s dismay. (Ironically, she now prefers driving that car thanks to the AI features.) Despite my enthusiasm—and even… Continue reading Understanding What AI Actually Is – and How to Work with It
4 Techniques to Optimize Jet Reports for Faster Run Times
Oh, if only there were a set of steps that, if followed, would guarantee a fast Jet Report. Given the nuances and intricacies in the design of many reports, combined with other factors, like the more complex database structure of BC compared to NAV, the size of your data, and your network or internet speed,… Continue reading 4 Techniques to Optimize Jet Reports for Faster Run Times
Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud
Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud
Password Security and Protection Has Never Been More Important
How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important
Remaining Vigilant: External threat detection with OSINT
For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT
Phishing, Quishing, Vishing, and Smishing
Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing
Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central
Migrating historical data for GP customers to Microsoft Dynamics 365 Business Central can cause a good deal of concern due to complexity, costs, and preferred data formats. But companies rely on historical data and want access to older accounts, sales orders, inventory summaries, and invoices. One solution to help companies move forward and avoid a… Continue reading Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central