Page 1

NOV-DEC 2019 - 13th annual Taste of IT Conference


Serving as the bridge since 1997…

Industry • Academic • Government

Taste of IT Conference November 13, 2019 Dayton, OH

1 Day 3 Keynotes 5 Tracks 25+ Sessions 40+ Exhibitors 350+ Participants

CIO Council • CEO Council • Cybersecurity • Data Analytics Infrastructure/Cloud • Municipality IT • Women 4 Technology

Technology… the foundation and future of every business. technologyfirst.org


Shop Local. Buy Local. Attend Local. The 2019 Taste of IT Conference is quickly approaching on November 13. This type of conference is important not only for the attendees, but the vendors that support the event, the employers who allow employees to attend, and the local community. Coming from the Healthcare Industry, there are several healthcare specific national conferences like College of Healthcare Information Management Executives (CHIME) and Healthcare Information and Management Systems Society (HIMSS). The HIMSS group also has a Central & Southern Ohio organization that holds two conferences a year, but these are usually located in the Cincinnati and Columbus regions. There is a non-industry specific national conference held by Gartner Symposium that I have attended in the past. Depending on your employees’ budgets, these national conferences can be difficult for the employees to attend, so that is why a local conference like the Taste of IT is the perfect opportunity to take time out of everyone’s busy schedules to attend at a very low expense. Attendees: Where else locally can you spend a day and have the opportunity to attend a session on the topics of Strategy, Infrastructure, Analytics, Security, and also get to hear 3 keynote speakers, while also getting to interact with local vendors. This is


Shop Local. Buy Local. Attend Local.


Upcoming Events


UPS Batteries: To restore, to refresh, or to replace?


3 Key Considerations to UCaaS Success


Tech First Update


Surviving Ransomware








The Future of the DataCenter is Multicloud

15 Microsoft OneNote Lessons Learned 17

OISC 2020 Call for Presentations


Technology First Board of Directors


2019 Infographic


Announcing: 2020 Event Dates


Technology First | NOV-DEC 2019

By: Gary Ginter, System Vice President & CIO Premier Health Technology First Board of Directors a great opportunity to meet peers from across the local industries and learn best practices from each other. In the last Technology First edition Monique McGlinch talked about Your Personal Development is Your Responsibility and what better way to work on that by attending this conference. Vendors: Vendors are an important part of these type of conferences and without their contribution, this conference would not exist. It is important to support the local vendors by talking to them at their booths to understand their services and offerings. Vendors have a hard enough time making connections inside organizations, so it is important to them that the attendees take the time to stop by to introduce themselves and if see if there is any mutual interest to continue to have further conversations outside the conference. Vendors will not sponsor a conference like this if they do not get the attendee participation, so it is vital to support each one of them by stopping by and just introducing yourself. Employers: All employers benefit from the learning each of you get at one of these conferences. It is easy to get caught up that each of our own industries we work in have their own unique set of challenges, and while that is true in some cases, there is also a lot to be gained from what others are doing in other areas. Attend this conference with an open mind and see what one thing you can take from each session you attend that can benefit the employer that supported you attending this conference. Local Community: This conference is important to our local community to continue to show that the Dayton region can support these types of events and compete with the Cleveland, Columbus, and Cincinnati markets. This area is fortunate to have an organization like Technology First that supports technology for the Dayton area. Dayton has a great history of innovation and with the help of Technology First, local employers, local Information Technology vendors, and each of you, we can continue to make Dayton Strong.


Looking for IT Talent?

Taste of IT Conference

Mark your Calendars NOW for the 2020 Digital Mixer 200+ Students from 10+ Universities February 12, 2020 | 4-6pm | Wright State University

Over 30 Educational Presentations! Wednesday, November 13 | 8:00am-5:00pm Sinclair College - Ponitz Center, Building 12 444 E. Third Street Dayton, OH 45402


Data Analytics SIG


Sports Analytics Friday, January 10 | 8:30-10:00am Business Solutions Center

CIO/CEO Council (IT Leaders)

Thursday, December 5 | 11:30am-1:00pm Business Solutions Center

1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

Infrastructure/Cloud SIG

Data Analytics SIG

Friday, January 10 | 11:30am-1:00pm Business Solutions Center

Video Analytics Friday, December 6 | 8:30-10:00am Business Solutions Center

1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

Tech Forum (CIO/CEO Council OPEN to all)

1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

Municipality IT

Annual CIO Forecast Panel 2019 Panelists: Dr. Tonjia Coverdale, Central State University Colonel Kevin "Hobo" Johnson, WPAFB Christopher Roe, Speedway J.D. Whitlock, Dayton Children's Thursday, January 16 | 11:30am-1:00pm

Business Solutions Center 1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

Women 4 Technology - DAYTON

Infrastructure/Cloud SIG

Friday, December 6 | 11:30am-1:00pm Business Solutions Center 1435 Cincinnati Street, Suite 300 Dayton, Ohio 45417

Tuesday, December 10 | 11:30am-1:30pm

Presidential Banquet Center 4548 Presidential Way Dayton, Ohio 45429

Women 4 Technology - CINCY

Wednesday, January 22 | 8:00-10:00am Business Solutions Center

Wednesday, December 11 | 8:00-10:00am Great American Insurance Group Dixie Terminal North, 49 E. Fourth Street Cincinnati, Ohio 45202

Tonjia Coverdale, PhD VP, IT & CIO Central State University

1435 Cincinnati Street, Suite 300


Col. Kevin "Hobo" Johnson Deputy Director of Air, Space, & Cyberspace Operations & CIO, WPAFB

Christopher Roe VP, IT Speedway

J.D. Whitlock CIO Dayton Children's


Technology First | NOV-DEC 2019


UPS Batteries: To restore, to refresh, or to replace? While not quite as serious as Hamlet’s “to be or not to be” soliloquy reflecting on mortality, the death of your UPS battery is no small matter. Disruptive unplanned downtime caused by an aged UPS battery is not an option for many of today’s always-on businesses. With an uninterruptible power supply (UPS), you have made a significant investment in power protection for your operations, so it doesn’t make sense to risk that investment on batteries that may not work when needed most. Your system availability depends on a working battery. UPS batteries are built to provide several years of service, operating reliably even through repeated charging and occasional use while supporting critical loads. But like any battery, they have a defined lifecycle. The key challenge is to know when your batteries are nearing the end of their life expectancy and to be able to replace them before you get into a situation — such as a complete power outage — where they fail to protect the load.

Contributed By: Doug Davidson Uptime Solutions replacement battery kit and install it in the UPS, making sure your system is ready to deliver uninterrupted backup power. 2. Do I have an established process for getting rid of spent batteries? With the DIY restore option above in which you receive a battery kit, you are responsible for the installation and restart of your UPS system. You will also need to have a plan for the removal and safe disposal of old batteries. If you don’t already have a plan in place for this activity, it may be worth getting the additional support that comes with a UPS refresh. At this level, not only do the Vertiv factory-authorized technicians handle all the installation and system checkup work for you, but they will also remove spent batteries. The technicians ensure disposal and recycling that is per government and industry regulations. 3. Do I prefer more long-term support for hassle-free management of my older UPS units?

During a recent Vertiv survey, more than half of participants who have edge sites today or expect to have them in 2025 expect the number of edge sites they support to grow by at least 100%, with 20% expecting a 400% or more increase. Yet most already time-strapped IT teams are not growing or lack the expertise needed to manage both new and existing infrastructure, therefore ensuring costly downtime never happens is becoming more of a challenge

To truly put your mind at ease, you may want to consider on-site service in which you would receive around-the-clock emergency response and full UPS coverage including travel, parts, and labor, as well as a monitoring solution. Vertiv’s monitoring solution ensures that the oversight of your UPS and battery health is continuous and performed by experienced technicians.

Single-phase UPS units are used by many mission-critical applications, including servers, critical nodes, network workstations, large network peripherals, network routers, bridges, and hubs, as well as Voice over Internet Protocol (VoIP), safety/security, and point-of-sale (POS) systems. These smaller UPS systems, ranging in capacity from 500 VA up to 20,000 VA, are usually overseen by IT/network managers and administrators within organizations having edge or remote computing locations.

In addition to keeping an eye on battery health, a management program should enable oversight of the UPS itself. As a small UPS gets older, usually after being in service for more than five years, it may be more cost-efficient to consider a total replacement of the unit as opposed to just making another battery replacement. If you are operating with a Vertiv Liebert GXT 3, 4 or PSI unit that is more than six years old, then it is probably nearing time to consider full UPS replacement along with a protection plan.

Just because these UPS systems are out of sight doesn’t mean they are out of mind, especially with their vital role in meeting business and customer demands. Therefore, a dedicated battery lifecycle management program is so important. When faced with UPS management challenges, you should consider getting help to restore, refresh, or replace your systems. And asking yourself the following questions will help determine which option is right for you. 1. Do I have adequate resources for maintaining power in my small or remote IT sites? If the answer is yes, and you can dedicate man-hours to work on or even travel to your various business-critical facilities for battery replacements, then you may simply want to restore the UPS yourself. In this case, Vertiv would provide the appropriate internal battery kit for your UPS, ensuring proper protection is available for critical IT loads. On the other hand, if you lack resources to restore your UPS, you should consider a refresh where Vertiv handles the battery upgrade for you, along with performing a wellness checkup. Vertiv will deliver the 4

Technology First | NOV-DEC 2019

4. Is it really time for a new UPS system?

Much like an aging PC or server, the older a UPS system, the greater the risk of unanticipated failure due to problems with internal system components and the more the UPS will lack in terms of technological innovations and performance enhancements. You may also want to seriously consider a replacement if the operating conditions for your older UPS units involve harsher conditions like higher temperatures or exposure to other environmental factors that can negatively impact the service life of your system. When these conditions apply and you would like to augment your IT staff with trusted infrastructure and industry experts, full UPS replacement as part of Vertiv’s Power Continuity Services allows you to completely offload the burdens of installation, maintenance, and ongoing management of these assets that support the critical applications of your business. To learn more about Vertiv’s restore, refresh or replacement options, download Vertiv’s white paper entitled “Single-Phase UPS Lifecycle Management: Protecting IT Availability” and/or Vertiv’s Power Continuity Services data sheet at vertiv.com.


3 Key Considerations to UCaaS Success

David Goodwin, Co-Founder & Managing Partner Advanced Technology Consulting Today’s mobile workforce expects easy access from varied devices for communication, collaboration and productivity tools. Fortunately, today’s Unified Communications as a Service (UCaaS) providers offer up an integrated solution for this on one telephony platform. Voice, video and Web conferencing, presence, instant messaging, CRM integration, desktop sharing, one-to-one video from handset to handset, email integration, emergency response notifications, text, fax and sometimes more… all bundled into one service and hosted in the cloud.

improve the way you collaborate, simplify workflow and increase productivity. There are many steps that lead to successful deployment. And, by deployment, I don’t simply mean, “it works.” I mean it works as the business-enabling tool it was intended to be, and it is fully utilized by your workforce. Here are 3 key considerations to make that happen:

1. Assessment – Understand your core needs. Learn about the technology possibilities that exist with UCaaS and cloud communications. Talk to each Can you believe that what was once viewed as a necessary evil and an department within the organization and challenge them to break the mold overhead expense—the business phone system—has now evolved into an and think about what could be, not the way it’s always been. irreplaceable productivity and collaboration tool? This ain't your daddy's old business phone system. With the advent of VoIP, and now UCaaS, your 2. Network, Network, Network – Understand your network. Inventory phone system can integrate way more, but may not even include any new your systems and their inherent demands on the network. Plan for plenty of capacity. Data consumption is exploding and will only continue to rise on-premise equipment, including handsets. for the foreseeable future. Understand your perimeter and the new access Often, I see business leaders and IT executives enter the buyer journey for points created. Build in network security and redundancy. a new phone system with little-to-no interest in how it might help their business. Remember… necessary evil. Then, to top it all off, they want to go 3. Train – Plain and simple… make training on your new system mandatory. lean on their bandwidth too. Why any business leader would go skimpy on No excuses. Too often, I see “skipped” training sessions and a lack of communications and Internet in today’s connectivity and cloud-dependent engagement. This “mandatory” must come from the top down to promote business environment is beyond me. But I digress… haha. Back to UCaaS. widespread buy-in and engagement in the process. The “skippers” (not defined as the leaders in this case) invariably contend the new system When we initiate a conversation with a client about a new VoIP phone doesn’t work. Oh, it works (provided it was implemented correctly) … they system, we begin by talking about UCaaS, and how the right solution can just don’t know how to use it.

Architects of Continuity™ Vertiv solves the most important challenges facing today’s data centers, communication networks and commercial and industrial facilities with a portfolio of power, cooling and IT infrastructure solutions and services that extends from the cloud to the edge of the network. Vertiv.com

If you have a younger workforce, consider this. You want to make a millennial a happy employee? Make them mobile. Make it easy. Make it collaborative. And, of course, for your protection, make it secure. Regardless of your workforces’ demographic makeup, they will all be happy when they are enabled, collaborative and productive. What about CCaaS? Cloud telephony is inherently more flexible and collaborative than traditional, on-premise solutions. As a result, the Contact Center as a Service (CCaaS) model allows inbound and outbound call centers to be much more agile, while also providing agents with “omni-channel” communication abilities. Today’s hyper-connected world requires a single platform that includes voice, chat, SMS, video, email, etc. It also requires integration with business-critical applications such as a CRM or ERP. CCaaS can be a game changer for service-oriented organizations. Imagine communications with customers via their preferred platform, where online chatbots can funnel inquiries to the proper agent, or a life-like interactive voice response IVR system can communicate with customers and solve their problems. Artificial Intelligence (AI) and Sentiment Analysis (SA) are already entering the CCaaS foray. SA utilizes AI to detect emotions in speech and texts. At the end of the day, CCaaS is a customer-experience solution that is essential for high-velocity, inbound and outbound call centers. 5

Technology First | NOV-DEC 2019

TECH FIRST UPDATE Brandie Brainerd

Director of Member Services Brandie joined the Tech First Team in September! Brandie is Tech First’s new Director of Member Services! She has an array of interests, goals and passions, but nothing excites her more than the opportunity to help people... in this case helping the IT community in Dayton, Cincinnati and Columbus with networking, growing their businesses and building a better future. Brandie is involved in a band, currently completing her graduate studies in Global Conservation Biology, is happiest doing anything outdoors and all around loves living life to its fullest.

What excites Brandie most about Technology First? “Technology First gives me the opportunity to connect with visionaries, entrepreneurs and people I aspire to be like. They are the real MVP’s, so waking up every day knowing I get a chance to make our community even better with them is a surreal, but awesome feeling!"

Sharon Walsh

Marketing & Events Coordinator Sharon joined the Tech First Team in August! Sharon is Tech First's new Marketing & Events Coordinator. She comes from 16 years of experience in the electronics industry before taking 9 years off to be a stay-at-home mom with her youngest daughter. Sharon re-enters the workforce with excitement to meet new people and add value and support to the Technology First community.

What excites Sharon most about Technology First? "I am excited to be a part of the Technology First team and learn from industry leading professionals. I look forward to seeing how the future of technology is evolving."

Kaitlin Regan

Director of Marketing & Events Kaitlin hit 2.5 years with Tech First in October! With Brandie taking over Member Services, Kaitlin is looking forward to growing Technology First by enhancing Marketing and leveraging the tech community to build Events better than ever!

What excites Kaitlin most about the growing Technology First team? "By adding to our team we are adding to the value we can bring to the IT community in southwest Ohio. With this I am eager to apply what I have learned in my time at Technology First to further elevate our members and organization. My title may have changed a little but I will still always be the Director of Hype."

Congratulations to Board Member, Monique McGlinch Monique McGlinch named vice president, customer engagement and corporate Agile center of excellence Midmark Corp., a leading provider of medical, dental and veterinary equipment, technology and services, today announced that Monique McGlinch was promoted to vice president, customer engagement and corporate Agile center of excellence. In this new key role, McGlinch will oversee project management which will be centered on the Agile framework, customer experience, guest services and facilities. John Baumann, Midmark president and CEO stated, “Monique brings extensive business and technology experience that spans a full range of operational functions at Midmark. Through her strategic direction, she will leverage experience in technology and project management to focus on creating an end-to-end Midmark experience for our customers’ buying journey, fulfilling our role as a design company.” McGlinch most recently held the position of vice president, information technology and project management office. Throughout her 14 years with Midmark, she has also led the project management office (PMO), customer service, technical service, sales operations, digital marketing, supply chain and logistics across the following three industries: healthcare, building products and transportation. McGlinch is a current board member of Technology First, a member of Professional Women in Healthcare, the National Association of Professional Women, the Dayton CIO Council and other organizations within her community. She holds a Bachelor of Science degree with a concentration in management information systems and operations management from Wright State University, as well as an MBA with a finance focus. 6

Technology First | NOV-DEC 2019

Open House for Information Systems and Supply Chain Management Graduate Degrees January 11, 2020 Rike Hall Wright State University •

Earn your degree in just one year.

Flexible scheduling with online courses and in-person residencies.

Advance your career or find another career opportunity.

Don’t have a business degree? Our degrees can benefit graduates in careers as varied as health care, education, nonprofits, communications, and more.

Visit wright.edu/isscmopenhouse for more information.

Healthcare ________ business, You’re in the ___ not the IT business. Focus on what you do best.

Thank You Academic Partner!!

You do you. Let us manage the IT. For over a decade, RoundTower has been changing how technology delivers value and service by helping businesses focus on efficiency and digital transformation. Redefine your IT strategy with our crossfunctional, tailored approach that will leave you with more time to focus on your main objectives. www.roundtower.com Copyright © 2019 All Rights Reserved by RoundTower Technologies, LLC


Technology First | NOV-DEC 2019

YOU’LL NEVER HAVE TO PAY THE RANSOM Recover your data with OneXafe Continuous Immutable Snapshots

An immutable snapshot is a copy of your data that cannot be overwritten or deleted by ransomware or users. OneXafe storage by StorageCraft protects your data with continuous immutable snapshots every 90 seconds so you’ll never have to worry again. • • • •

Expand storage seamlessly Add one drive at a time or multiple nodes without configuration changes Minimize storage reduction with inline deduplication and compression Reduce storage and operational costs

Contact Chi Corporation, your local StorageCraft partner, for more information and a 30-minute demo. Jeff Turner






Sinclair’s new Centerville campus offers many degree and certificate programs including: • Cyber Investigation • Secure System Administration • Information Systems Security • Network Engineering Security


Technology First | NOV-DEC 2019

• Linux Security and Networking Essentials • IT Fundamentals • Network Engineering • User Support


Surviving Ransomware

Strategies for Prevention, Backup and Recovery

Anyone who pays attention to the news is aware that ransomware attacks can wreak havoc on organizations. Ransomware attacks on businesses grew by 365% between Q2 2018 and Q2 2019, according to Tech Republic. Even more frightening, a Sophos study showed that 77% of those organizations were infected with ransomware even while they were running up-to-date endpoint protection. If these attacks can succeed when adequate security measures are in place, it’s likely a matter of when, and not if, an organization will face the consequences of a ransomware attack. Survival means every organization must both proactively protect its data and ensure that it can be recovered if an attack is successful. Security experts say that preventing ransomware attacks requires organizations to, among other things, monitor vulnerable time periods closely, teach employees to be suspicious regarding phishing emails, and to understand that malicious software looks legitimate. It’s a given that every organization also needs strong data security measures in place to protect their data today. It’s also important to take a holistic approach to preventing ransomware attacks. That includes updating all software in a timely manner and retiring outdated hardware. On the human side of the equation, restrict administrator accounts to as few individuals as possible. The most destructive ransomware is designed to gain access to areas of a network only accessible to administrator accounts. While all these efforts may be effective, what happens if an attack still succeeds? That’s when it’s essential to have an effective backup and recovery plan in place for minimizing downtime and data losses. And that requires understanding your core business processes – the systems and applications that run the organization – and identifying which require critical protection, and which should be prioritized for recovery. Recovery planning must address two key metrics: Recovery Point Objective (RPO) and Recovery Time Objective (RTO). RPO describes the amount of time that may pass during a disruption before the amount of data lost during that period exceeds the organization’s set maximum allowable threshold. Put simply, the question is how much data can the organization tolerate losing in an attack? RTO is the length of time and service level within which an organization’s processes must be restored after a disaster to avoid unacceptable consequences from a break in operational continuity. Essentially, RTO answers the question “How much time will it take to recover after notification of a business process disruption?” Organizations also need to consider ease of storage scalability to meet the massive and growing amounts of data they deal with today, because once a legacy storage solution reaches its architecture limits, it is both costly and disruptive to migrate to a new solution.

John Thome, President Chi Corporation There are a lot of storage choices out there but only a few that have a consolidated data storage platform that addresses this need for scalable capacity for primary and secondary workloads with a scale-out architecture that expands storage seamlessly, one drive at a time or multiple nodes within a cluster – on-prem, off-prem or in the cloud. At the same time, you’ll want to be sure you’re minimizing your storage requirements with data reduction technologies such as inline deduplication and compression. These will reduce your storage costs and associated operational expenses. There are no guarantees that a breach can be prevented, so the first and most critical step in mitigating the devastating results of an attack is to perform regular backups of critical data by creating a continuous, immutable snapshot – a copy of your data that can’t be overwritten or deleted by ransomware attackers or users – every 90 seconds. Even if a ransomware attack succeeds, encrypting your data and corrupting the primary file system, these snapshots are completely immune to any modification or deletion. While some storage vendors claim their snapshots are immutable simply because they are read-only and can’t be changed, that approach doesn’t protect the snapshot itself from being deleted. That’s why implementing off-site or cloud replication of backed up data is also critical, providing an additional layer of security. Data snapshots are the key element in achieving RTO and RPO objectives following a ransomware disruption because they enable all data to be restored in minutes - not hours, days or weeks - with little muss or fuss. Another option to consider for ransomware recovery is Disaster Recovery as a Service (DRaaS). With this approach organizations don’t need to build out their own data center, instead utilizing cloud services to create a customized disaster recovery plan that fits their needs and budget. DRaaS ensures that data is safe and always available inside the company’s distributed, scalable, fault-tolerant cloud, which is purpose-built for recovering everything from files and folders and machine virtualizations to providing instant failover of an entire site and network. In our fast-paced world, every minute counts. And every minute an organization is offline can translate to huge losses in both dollars and productivity. The best defense is preparation and planning. So, if you don’t already have an effective backup and recovery plan in place, there’s no time to lose. Your organization could be the target of the next ransomware attack. John Thome is president of Chi Corporation, a leading storage and networking solutions provider that specializes in data storage, backup, disaster recovery, networking, security and virtualization. Chi has offices in Columbus and Cleveland. For more information visit ChiCorporation.com or contact John at 440-498-2310.


Technology First | NOV-DEC 2019


13th Annual Taste of IT Conference Wednesday, November 13, 2019 Sinclair Community College Sinclair Conference Center (Building 12) 444 W. Third Street, Dayton, OH 45402







Technology First | NOV-DEC 2019


Building an Organization People Want to Belong To Małgorzata Gryz, Chief Operating Officer Lingaro

Małgorzata brings more than 25 years of experience in the IT and education sectors to her role at Lingaro. In addition to leading its marketing, sales, and delivery functions, Małgorzata has played a key role in aligning the company around its core values of Technology Excellence, Customer Focus, Collaboration, Autonomy, and No Barriers. Previously at Microsoft Poland, she led Enterprise Services Delivery Management, Partner Strategy and Programs, as well as Customer and Partner Experience for which she received the organization’s top global award for outstanding results. She started her Microsoft career focusing on leadership and organizational development in the CEE. She has also led CEE & MEA Learning and Development at HP and supported Talent Acquisition and Marketing at Unilever. A certified Meyers-Briggs Type Indicator coach, she conducts regular internal workshops on performance psychology and has made leadership development a strategic priority at Lingaro. She holds a Certificate in Business Strategy and Financial Acumen from INSEAD, a MA in Journalism from the Warsaw University of Humanities, and a BA in English and Foreign Trade from the Warsaw College of Foreign Languages. Since 2012 Małgorzata has been actively mentoring women business leaders within the Vital Voices Partnership.

LUNCH KEYNOTE - 12:30-1:30pm:

Multi-Domain Superiority Through Strategic Experimentation

Christopher Ristich, Senior Executive Service, Strategic Planning Development & Experimentation (SDPE) AFRL Christopher J. Ristich, a member of the Senior Executive Service, is Director, Air Force Strategic Development Planning and Experimentation (SDPE) office, Air Force Research Laboratory, Wright-Patterson AFB, Ohio. The office is responsible for facilitating Air Staff sponsored development planning activities, experimentation campaigns, and multi-domain modeling, simulation and analysis. Prior to his assignments in the SDPE office, Mr. Ristich served as Technical Director of the Air Force Research Laboratory (AFRL) Plans and Programs Directorate. He was responsible for establishing and shaping new engagements with the Secretary of the Air Force, Chief of Staff of the Air Force, and Commanders of the Air Force Major Commands to integrate S&T into Air Force corporate processes. Mr. Ristich has held numerous technical and leadership positions. As a subject matter expert in directed energy (DE) effects, he led counter-precision guided munitions red team efforts that provided critical vulnerability insights for Air Force senior leadership. Through a series of management and technical leadership positions in AFRL, Mr. Ristich supported projects and special initiatives including Space Capabilities Protection, Directed Energy Task Force, and the OSD Software Protection Initiative. His multi-domain experience led to his selection as Chief of the Layered Sensing Exploitation Division. Mr Ristich’s career includes more than 30 years of experience in research, development, and test and evaluation of Air Force, Army, Navy and joint programs. He has provided leadership and technical expertise in programs that span air, space, and cyber domains.

WRAP-UP KEYNOTE - 4:10-5:00pm:

Time Study: Four Weeks That Will Change Your Life Jacques Lirette, Senior Director, Executive Services Info-Tech Research Group

Jacques is responsible for delivering Information Technology Research and Data-Driven programs that unlock client potential. Jacques provides Information Technology Leaders with insight and guidance on using Info-Tech Research tools and services for improved IT performance and business relevance. Jacques has been on both sides of the CIO desk, first as a CIO responsible for a large healthcare organization and on the commercial side working for IT firms offering enterprise solutions and infrastructure as a service. This unique experience enables Jacques to better understand the pressures of IT leadership and the needs of the vendor community.   Jacques comes to ITRG with real-world IT Executive leadership experience that is 30 years in the making with a variety of IT leadership roles. Jacques has been an IT Consultant, Chief Information Officer, Enterprise Software Sales Director and Vice President of Product Strategy for an Internet of Things start-up. 11

Technology First | NOV-DEC 2019




Machine Learning: From Science Fiction to Reality Austin Gresham RoundTower


Business Continuity: Today, Tomorrow, & Beyond Kyle Hamilton & Eric Torres Opti-Vise IT


AI: Hope vs Hype J.D. Whitlock Dayton Children’s Hospital


Shift Happens

Janna Fichera & Sarah Wiggerhaus Vana Solutions & Aileron


Using Public Wi-Fi and Visitor Analytics to Support Economic Development in your City

What's next? Technology Trends & Hiring-Own Change

Katie Meyer Cincinnati Bell

Greg Riddle & Sarah Downs TEKsystems



Text Messaging Communication Platform Supported by AI John Putnam Cincinnati Bell 1:45-2:30pm

Disrupting Innovation in Recruiting using AI & ML Vishal Verma Talent Now


Innovative Partnerships – Sustaining Talent Pipeline

Dr. Tonjia Coverdale Central State University 1:45-2:30pm

Hired for Strategy but Never Getting Out of the Weeds Scott Dennull AtriCure 3:15-4:00pm


Problem Solving using Data Science Karl Konsdorf Sinclair College

How to get your users to love your IT department Tim Irey American Trim

SECURITY 9:00-9:45am

Defend Forward: Persistent Engagement Cyber Strategy’s Operational Concept

Dr. Richard Harknett University of Cincinnati 10:25-11:10am

Analytics & Good Cyber Hygiene on Print David Rose & Leah Seymour HP & Modern Office Methods


A Hackers Playground: Five Common Attack Vectors Used By Attackers

Brandyn Fisher & Dylan Foos The Mako Group 11:15-12:00pm

Cloud Security: Fundamentally Incompatible? Jorn Lutters SOPHOS


Leveraging Social Science Theories to Thwart Cyber Attacks!

Dr. Thomas Skill & Dr. James Robinson University of Dayton Center for Cybersecurity and Data Intelligence 3:15-4:00pm

Augment Your Ransomware Defenses with Scale-Out Storage


Intelligent Hyperconverged Storage for Backup

Your Complete On-Ramp Guide to Becoming a Machine Learning Practioner

Dan Zuccarelli ExaGrid

Fola Soboyajo Kroger


You Can Affordably Own the Software that Runs Your Business with a Custom, Open Source Solution Andy Hickey & Bryan Hogan Afidence 11:15-12:00pm



Log Aggregation and the Beginning of a SIEM Adam Magato & Anthony Gerdes Sinclair College 1:45-2:30pm


Introduction to Azure Streaming Analytics

Warren Site Moser Consulting, Inc 11:15-12:00pm

Hit Your Project’s Bullseye with Tech Anthropology Mary Schock Smart Data

The New Governance: Staying on Top of O365 Stacy Deere-Strole Focal Point Solutions 1:45-2:30pm

The Onion Defense: Security for Amazon Web Services Jake Hewitt Tenet3


Integrating IoT Devices to Azure IoT Central Justin Ballen Expedient Technology Solutions

Matt Kern & David Byrd StorageCraft

For Breakout Session Descriptions, Speaker Bios and more visit



Technology First | NOV-DEC 2019


An Introduction to WebAssembly Guy Royse ScriptDrop


Enterprise IoT systems that scale to the cloud Johan Botha Digital2DNA

(continued from page 10)

Need to find the one you want here. FYI.





ABOUT US For 20 years, Beavercreek and Dayton area residents have trusted World Digital Imaging to be their digital printer! WDI offers a wide range of coil binding, large format, invitations, postcards, newsletters, brochures,

Our customer service is beyond compare DESIGN: Bring your vision to life with a customized approach. . PRINT: Turn times as quick as 24 hours for most jobs! PREPARE: Our capabilities include laminating, folding, coil binding, boxing, and more.

MAIL: We handle your mailing job from concept to delivery. Give us a call today at (937) 431-1982 or call to schedule an appointment for a free tour of our facilities.

Creativity starts here.



(937) 431-1982



Technology First | NOV-DEC 2019

CLOUD The Future of the DataCenter is Multicloud John Williamson Nutanix

For too long IT organizations and the datacenters they run have been cost centers bogged down with elaborate processes that stymie innovation. The advent of cloud computing has transformed IT service delivery, providing unprecedented levels of flexibility and agility. Companies such as Amazon, Microsoft, and Google offer an array of IaaS and PaaS options for public cloud, though users pay a premium for the convenience. For on-premises datacenters, the emergence of hyperconverged infrastructure meant that enterprises got fast and simple operations while keeping the technology in-house to satisfy requirements around privacy, data sovereignty, and the like. As both public and private cloud continue to mature, many companies opt for both, leveraging multiple clouds to satisfy their diverse enterprise computing needs. Multicloud allows companies to choose the right cloud for each workload, be it a mission-critical core application such as enterprise resource planning, or cutting-edge cloud-native analytics apps. With multicloud, IT gets to focus on the key drivers of enterprise innovation and differentiation–applications and data. In this blog, we’ll give you a quick overview of the advantages and challenges associated with setting up multicloud and provide a checklist to help guide you in your selection process. The Benefits of Multicloud Multicloud combines on-premise operations with services and applications running on multiple cloud providers, which enables organizations to capture the benefits of each platform while mitigating their downsides. For example, an IT organization might use one public cloud service with inexpensive storage, a different public cloud with unique native applications, a private cloud for sensitive customer data, and on-premise infrastructure for handling AI/ML workloads. Early multicloud adoption was driven by a basic distrust of cloud services. No one wanted to put all their eggs in one basket in case of a critical failure. While this fear has diminished over time, there are other key benefits of multicloud for enterprises: Optimized Performance for Each Application Each public and private cloud has its own advantages and drawbacks. With multicloud, companies can assemble the infrastructure that best suits their various needs, providing optimal flexibility and scalability for some applications, and optimal control and security for others. The result is the right performance, cost, and control for each application and use case across the organization. Data protection and disaster recovery are a perfect use case for multicloud. Traditional DR services are expensive and offer less-thanoptimal recovery point objective and recovery time objective. With multicloud, companies can use cheap, scalable public-cloud storage to keep unlimited snapshots of VMs and local disks. Sensitive data like customer financial history can be backed-up securely using private cloud storage. Improved Data Governance Data privacy regulations like GDPR (a now all-too-familiar acronym) and the Consumer Privacy Act in California are forcing enterprises to rethink how they manage user data. Striking a balance between costeffectiveness, performance, and compliance is nearly impossible without the use of multiple infrastructure platforms. 14

Technology First | NOV-DEC 2019

The multicloud model allows organizations to run workloads on different platforms to maximize each of these factors. They can store massive amounts of non-sensitive data on public clouds while keeping private user data safe and secure on private clouds or on-premise infrastructure. Lower Total Cost of Ownership

Some organizations are deterred by the initial price of a multicloud platform. In fact, the total cost of ownership (TCO) is often significantly lower than traditional infrastructure. According to IDC research, multicloud platforms can save companies 40-60 percent on IT expenses over time. Here’s why: • Flexible Cost Management. Multicloud offers flexible cost options. Depending on the application, companies can choose the CapEx model– where storage is set with a predefined limit to cap expenses– or OpEx, when scaling is a priority and storage levels are limitless. Moreover, new cloud cost optimization tools provide visibility into cloud consumption patterns and recommend the right cloud based on your requirements. • No Vendor Lock-In. Because multicloud solutions are 100 percent software-based, IT organizations can use the hardware, hypervisor, and cloud services of their choice. This gives companies total control over the cost and performance of their IT infrastructure. • Lower Operational Costs. Using public and private clouds reduces the management burden on IT. However, as we’ll see in the next section, operational costs can remain stubbornly high without the right multicloud solution. As you can see, each of these issues determine TCO, which is why it is crucial to have a clear understanding of all of these variables when comparing the financial impact of different IT models. The Challenges of Multicloud Despite the obvious benefits, there are still a number of challenges that IT organizations must overcome to get the most out of a multicloud datacenter: • Complex infrastructure. Traditional infrastructure with separatelysourced servers, storage, and networking is costly and time-consuming. IT spends far too much time installing and configuring new equipment while making sure it integrates with the existing environment. No fastmoving business (and aren’t they all, nowadays?) can afford to linger in this maintenance purgatory. • Manual operational tasks. IT organizations struggle to balance day-to-day operational tasks with their new mandate of driving innovation and revenue. • Lack of integration. On top of maintaining the core infrastructure, IT teams must ensure the various cloud and on-premise platforms integrate with one another. Even with their best effort, the result is usually a convoluted platform that is hard to use and maintain. Checklist: Capabilities of a Multicloud Datacenter Meeting the challenges described above is no easy task. Because of that, it’s important to evaluate the following components of a high-functioning multicloud datacenter as you solidify your multicloud strategy. IT organizations are being asked to do more than ever before. The datacenter is now a source of innovation, revenue, and true business value. Simply maintaining infrastructure isn’t enough; its transformation needs to be a catalyst for embarking on new, business-building initiatives.

APPLICATIONS Microsoft OneNote Lessons Learned

I’m not really sure how long I have had OneNote at my disposal, but I know it’s been a while. I use a lot of the O365 apps, but never gave this one a thought. A good friend, Janet Jackson from Organizational Solutions LLC, was providing OneNote training and I attended with one of our customers. It seemed like a fun tool and after leaving the class I thought to myself “well, maybe I can use this on my home machine for stuff there.” Shortly thereafter, I started two new projects at work and found myself doing the same old things – emails saved into files, documents saved to our shared drive, paper folder with handwritten notes and printed copies of stuff. And then I had an ah-ha moment (thank you Janet). After all, this is exactly what OneNote was built for. • Multi-tasking made easy • Collaboration • Recording audio and video notes • Saving notes on the fly It’s really very powerful stuff! For those of you already using OneNote, I am now a believer. Here’s a visual image of my project for our new website

Everything is easy to see, easy to access from multiple devices, easy to share (internally and externally) and easy to manage. If you’re concerned about a learning curve with OneNote, don’t be. It’s intuitive, easy to use and if you have an Office 365 subscription, it’s likely that you already have access to this powerful collaboration tool. Microsoft OneNote is part of most Office 365 plans, so getting started is as simple as opening the program and familiarizing yourself with the userfriendly interface. Or going to training that’s offered locally like I did. To use OneNote, first locate it on your desktop or download on your Android or iOS device. Once the program is open, you can use it as a digital notebook. Like a traditional notebook, you can even take handwritten notes (using a touchscreen device), or you can type directly into the program. And unlike a traditional notebook, you can share audio files. You can choose where to save your Notebook. If you have OneDrive (for personal use), OneDrive for Business or SharePoint Team Site for business use, you can save your work there. When you save it there, you are in the cloud and can access from any device. If you are at a conference and want to save a screenshot, simply click the camera icon on any page and insert the photo from your gallery or straight from your camera. You can choose to invite other people to your notebook at any time with a simple share. Security is covered too. OneNote is a powerful tool for project management and general business use, but security is always a

Kathy Vogler, Communications Manager Expedient Technology Solutions

concern when data is flowing back and forth online. Microsoft built this from the ground up with security top of mind. You can set passwords when using the program and inside of each specific section. Once a section is password protected, every page in that section is locked and no one can see or make collaborative changes without first entering the proper credentials. I hear it’s available to Mac users too. What Most People Don’t Know About OneNote If you use OneNote, you already understand the power of the platform, but even experienced users may not realize its full potential. For example, did you know… • Only a single OneDrive account can be associated with OneNote. While users can sign up for multiple OneDrive accounts, only one of them can be associated with the OneNote platform. • You can give OneNote access to your camera. If you want to share photos with your fellow collaborators, you can allow access to the camera on your phone or other device. OneNote will ask for permission the first time you try to insert a picture, and once granted, you can use the platform to share your favorite images. • Right click on Calendar Appointments to take notes into the appropriate notebook. • If you find yourself repeating patterns of notes, create Page Templates. • The Notebooks you create are private. OneNote Notebooks may be stored online, but they are private unless otherwise specified. This security feature is an integral part of the OneNote collaboration process. My favorite feature is the direct pipe from Outlook, simply by clicking “Send to OneNote”. Just one click and it’s saved. Awesome!!

OneNote for Windows 10 was designed to feel natural with any input method, from mouse and keyboard to pen and touch. According to Microsoft, it contains numerous “under the hood” improvements for better performance, reliability and battery life. Features that are new to OneNote for Windows 10 include a new sync engine, “ink effects” that dramatically improve ink-to-text and preserve color, size and highlights, and a deep integration with Windows 10. www.Efficiency365.com suggests that you teach OneNote to your boss, team, subordinates and your loved ones. I found a Microsoft technical deployment guide from this summer that address the changes to OneNote and best practice for deployment by versions at this link, https://docs. microsoft.com/en-us/deployoffice/deployment-guide-onenote. It’s a short read and gives a lot of options. I’m sure after many projects and time spent using this tool, I will be more proficient and learn some shortcuts. As with all Microsoft programs, there are a ton of features that I don’t know about. I haven’t ditched my physical notebook of my day-to-day activities and logs yet, but I am sure many things previously recorded by hand on paper will be moved to digital files using OneNote. If you have never used OneNote, give it a try … you’ll be glad you did! 15

Technology First | NOV-DEC 2019

Will Your Current Backup Plan Leave You Hanging? Can You Afford The Risk? People are at the heart of every successful business initiative. At TEKsystems, a leading provider of IT staffing and IT services, we understand people. Every year we deploy over 80,000 IT professionals at 6,000 client sites across North America, Europe and Asia. Our deep insights into the IT labor market enable us to help clients achieve their business goals-while optimizing their IT workforce strategies.


Schedule Your FREE DATTO DEMO Today! Call 800-834-7479 or Email sales@opti-vise.com. 127 W. MAIN ST. | EATON, OH 45320 | WWW.OPTI-VISE.COM

We’re proud to support

Technology First

Building partnerships to advance Research and practice Hands-on education Workforce development go.udayton.edu/cybersecurity @udaytoncyber Cyber for the Common Good 16

Technology First | NOV-DEC 2019

17TH ANNUAL OISC 17th Annual Ohio Information Security Conference Wednesday, March 11, 2020 Sinclair Community College

Sinclair Conference Center (Building 12) 444 W. Third Street, Dayton, OH 45402

Professional Attendees: Technology First has over 350 Security professionals attend and most of the

audience being Leadership and their direct reports with some attendees at the technical level. We also have a cross-representation of all industries including manufacturing, healthcare, and logistics/distribution, government sector and many more.

Sponsorship & Exhibitor Opportunities GOLD = $3,500 member, $4,000 nonmember

Includes: • Logo recognition on web registration page, marketing emails and throughout event • Company representative at registration desk to welcome attendees • ½-page ad in the Technology First Magazine Conference Edition (submit by February 1st) • 2 full conference passes (includes buffet meals, breakout sessions, and parking passes) • Exhibit booth with preferential placement in the Great Hall • Logo on Great Hall monitors • Company recognition before keynote speakers • Social Media recognition prior to event • 3-minute company overview to attendees prior to designated keynote presentation • NEW THIS YEAR: Emails for attendees will be included on Attendee List for conference follow up!

SILVER = $2,500 member, $3,000 nonmember

Includes: • Logo recognition on web registration page, marketing emails and throughout event • ¼-page ad in the Technology First Magazine Conference Edition (submit by February 1st) • 1 full conference pass (includes buffet meals, breakout sessions, and parking passes) • Exhibit booth • Logo on Great Hall monitors • Company recognition before keynote speakers • Social Media recognition prior to event

BRONZE = $1,000 member, $1,500 nonmember

Includes: • Logo recognition on web registration page, marketing emails and throughout event • Exhibit booth

EXHIBITOR ONLY = $750 member, $1,250 nonmember Includes:

• Exhibit booth

PACKAGE ADD-ONS: (can only be added to Bronze, Silver, and Gold sponsorships)

Tote Sponsor = $1,000 – Logo on totes provided at conference to all attendees Lanyard Sponsor = $1,000 – Logo on lanyards provided at conference to all attendees Early Bird Sponsor = $500 – Logo on all marketing emails for the Early Bird Prize and recognition at conference

Exhibit Booth Details: (applies to payments received by February 1st, 2020) • Exhibitor status in the OISC March-April Tech First Magazine

• 6-foot draped table, electrical connection and wireless internet connection, 2 chairs • White tablecloth available upon request • 2 exhibitor passes with 2 box lunches and 2 parking passes • Additional booth workers will be $30 each; includes badge, box lunch and parking pass (to register additional booth workers ahead of time and guarantee a pre-printed badge and lunch, please call our office at 937-229-0054 or contact membership@technologyfirst.org) 17

Technology First | NOV-DEC 2019

TECHNOLOGY FIRST BOARD OF DIRECTORS Marcia Albers Executive Director Technology First

Treg Gilstorf Chief Information Officer Yaskawa Motoman Robotics

Diana Bolden Former CIO Teradata

Gary Ginter System Vice President, CIO Premier Health

Jim Bradley - CHAIR Vice President, IT Tecomet

Lisa Heckler VP, Information Security & Privacy CareSource

Matt Coatney CTO, Managed Services HBR Consulting

Bryan J. Hogan President / CEO Afidence

Gary Codeluppi VP, Business Development Vana Solutions

John Huelsman Director of Business Support Solutions Hobart Service

Tonjia Coverdale, PhD Vice President for Information Technology and Chief Information Officer Central State University

Don Hopkins Interim Director, Adjunct Assistant Professor Wright State University

Timothy Ewart Former Cyberspace Operations Technical Director HQ Air Force Materiel Command WPAFB

Andy Lehman CIO & Senior VP Kettering Health Network Scott McCollum Chief Information Officer Sinclair Community College

Monique McGlinch VP, Customer Engagement and Corporate Agile Center of Excellence Midmark Corporation Dave Mezera President DataYard Paul Moorman Former IT Strategist ND Paper Robin Poffenberger Systems Manager Washington-Centerville Public Library Christopher Roe Vice President, Information Technology Services Speedway LLC Thomas Skill, PhD Associate Provost & CIO University of Dayton Jeff Van Fleet President Lighthouse Technologies

Technology First would like to thank and recognize its Board of Directors. They provide input into the strategic direction of the organization and actively lead working committees that drive our programs and services. Publisher: Technology First Executive Director: Marcia Albers Director, Marketing & Events: Kaitlin Regan

Design & Production: Technology First

Writers: Our mission is to support the growth of Greater Dayton’s information technology industry. Technology First provides a forum for educators, business, and technical professionals to communicate their expertise and lessons learned while working in the field. Please submit the article in Word, preferably with 500 to 700 words, with any graphics in pdf to malbers@technologyfirst.org. Please include your name, business organization, business address, phone number, fax number, e-mail address, and a brief description of any professional accomplishments. Please also include a digital photograph if available. Subscriptions: Non-member business/home delivery of this publication is available at $25/year (6 issues). Mail name, address and check made payable to Technology First.

2019 Technology First; All rights reserved


Technology First | NOV-DEC 2019


714 E. Monument Avenue; Suite 106 Dayton, OH 45402 p: 937.229.0054


Established in 1997





Recognizes contributions of Technology professionals (each May) Outstanding Technology Team Best IT Services Company IT Executive of the Year Emerging Tech Leader Most Promising Startup Award of Excellence - Student Project

4 Quarterly Meetings






TECH THURSDAYS Casual After Hours Networking 5x / year



CIO/CEO COUNCIL (IT LEADERS) Company's Highest Level IT Executive or Business Leader Monthly Meetings 25-40 Attendees Each Session Strategic Planning and Leading Edge Topics Peer-led sessions and networking


20+ Attendees Each Session 7x/year Artificial Intelligence / Machine Learning Analytical Algorithms Data Strategy & Analysis Tools IoT Applications

15+ Attendees Each Session 7x/year Trending Infrastructure and Cloud Topics Maintenance & Security


Helps IT Buyers find Suppliers Locate Resources in our Region RFP & Referral Requests

TECHNOLOGY FIRST MAGAZINE Expert Articles contributed by Members 1,000+ Mailed to IT Professionals 70,000+ readers

E-NEWSLETTER 4,000+ Subscribers Event News Job Opportunities Member Highlights Annual Partner Recognition SCAN TO SIGN-UP FOR EMAILS


Both in Dayton and Cincinnati (7x/yr) Four Areas of Focus Leadership Networking Professional Development Mentoring



26,000+ Unique Annual Visitors


50+ Attendees Each Session CIO Council open to all of membership 3x/year (January, April, October) Recognized Thought Leaders


MUNICIPALITY IT IT Leaders, City Managers, and MSP's of Municipalities Smart Cities and Leading Edge Topics



TASTE OF IT 13th Annual 11/13/19 Tracks: Strategy, Security, Analytics, Infrastructure/Cloud, Dev/Programmers 300+ Participants 30+ Speakers 40+ Exhibitors


17th Annual 3/11/20 Focus on Management, Technical and Implementation 300+ Participants 23+ Speakers including Expert Panels 30+ Exhibitors



Annual Casual Career and Networking Night (February) 35+ Employers 200+ Students Local Colleges and Universities




SCHOLARSHIPS $5,000 in Scholarship Money to 5 students 2019 Winners from Sinclair College, Wright State University, and Cedarville University




Unlimited Position Postings for Members Full-time, Part-time, and Internship Opportunities


Technology First | NOV-DEC 2019

714 E. Monument Ave., Suite 106 Dayton, OH 45402 937.229.0054 • TechnologyFirst.org





December 5, 2019 January 16, 2020 - Tech Forum (Open Event) February 20, 2020 March 27, 2020 April 16, 2020 - Tech Forum (Open Event) May 21, 2020 June 12, 2020 July 9, 2020 August 14, 2020 September 10, 2020 October 8, 2020 - Tech Forum (Open Event) December 3, 2020

December 6, 2019 January 10, 2020 February 28, 2020 April 3, 2020 May 15, 2020 August 21, 2020 October 2, 2020 December 4, 2020

(Executive Leadership Only - 11:30-1pm)

(Open to ALL - 8:30-10am)

INFRASTRUCTURE/CLOUD (Open to ALL - 11:30-1pm) December 6, 2019 January 10, 2020 February 28, 2020 April 3, 2020 May 15, 2020 August 21, 2020 October 2, 2020 December 4, 2020


Taste of IT - November 13, 2019 OISC - March 11, 2020 Taste of IT - November 18, 2020


Digital Mixer - February 12, 2020 Leadership Awards - May 7, 2020


WOMEN 4 TECHNOLOGY (Open to ALL - 8-10am)

DAYTON: January 22, 2020 June 3, 2020 September 16, 2020

(Open to ALL - 5-7pm) September 12, 2019 October 24, 2019 February 13, 2020 April 9, 2020 June 11, 2020 August 27, 2020 November 5, 2020


(for City Managers and Muni IT Leaders) December 12, 2019 June 4, 2020 September 24, 2020 December 10, 2020

Register at www.technologyfirst.org @technologyfirst.org


Technology First | NOV-DEC 2019


CINCY: December 2019 TBA February 5, 2020 May 13, 2020 August 12, 2020 December 9, 2020

Technology First

Read our Tech First Magazine at issuu.com/technologyfirstdayton

Profile for Technology First

Technology First 2019 November/December  

Technology First 2019 November/December