Author Archives: admin

Utilities

Listen to the January 2017 General Meeting presentation

Posted in 2017 Podcasts | Tagged | Comments Off on Utilities

Nov 2016 Program

Cyber Threatscape Michael Sohn Supervisory Special Agent, FBI.  The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. Our nation’s critical infrastructure, … Continue reading

Posted in 2016 Programs | Tagged | Comments Off on Nov 2016 Program

Dec 2016 User Friendly

View the Dec 2016 User Friendly

Posted in 2016 User Friendly | Tagged | Comments Off on Dec 2016 User Friendly

Nov 2016 User Friendly

View the Nov 2016 User Friendly

Posted in 2016 User Friendly | Tagged | Comments Off on Nov 2016 User Friendly

Oct 2016 User Friendly

View the Oct 2016 User Friendly

Posted in 2016 User Friendly | Tagged | Comments Off on Oct 2016 User Friendly

Oct 2016 Program

21st Century Business & IT Consulting Roger CurtisRoger Curtis, President and CEO of Sitcur, an e-business consulting firm, will discuss the impact of Electronic Data Interchange (EDI) on business in the 21st century. This technology, now referred to as B2B … Continue reading

Posted in 2016 Programs | Tagged | Comments Off on Oct 2016 Program

Business to Business

Listen to the October 2016 General Meeting presentation

Posted in 2016 Podcasts | Tagged | Comments Off on Business to Business

Sep 2016 User Friendly

View the Sep 2016 User Friendly

Posted in 2016 User Friendly | Tagged | Comments Off on Sep 2016 User Friendly

Sept 2016 Program

Smart Phones – Swiss Army Knives for Keeping Your Data Handy Speaker: Bill James Computer Club of Oklahoma City Bill James will describe, via Skype, how to make use of all of the features of your smartphone. The smartphone is … Continue reading

Posted in 2016 Programs | Tagged | Comments Off on Sept 2016 Program

Aug 2016 Program

Overview of the Cyber Threat Landscape Akilah Kamaria, Data Security Consultant at Blue Fields Digital, will share insights on fighting cybercrime with strategic planning. She will give a broad overview of phishing scams, malicious software, identity theft risks, social engineering, … Continue reading

Posted in 2016 Programs | Tagged | Comments Off on Aug 2016 Program