KTL Blog
Insights and News from KTL Solutions.
Featured
Recent
Don’t Forget Database Documentation: Part 2
In Part 1, I wrote about the importance of database documentation and how it often gets overlooked or done at the last minute. One of
Don’t Forget Database Documentation: Part 1
When it comes to software developers performing sufficient documentation of custom software development projects, much of the discussion usually centers around the pre-development design, code
A Guide to Using Dynamics GP Purchase Order Generator
We know how difficult it can be to accurately track and maintain your inventory and their reorder levels. With Microsoft Dynamics GP, the process becomes
New SQL Server 2016 Features for Business Data Protection – Part 3: Row Level Security
In part one, we covered one of three important new security features in SQL 2016, Dynamic Data Masking. In part two, we covered Always Encrypted.
The Importance of Communications (Logs)
It happens all the time. You know you made that phone call, or sent that email, but you have no backup, no proof, nothing to
Simple, Yet Effective .NET Password Hashing
Your company’s data is the most valuable asset you own. From personnel files to proprietary information, if the files your business keeps wind up in
Top Ten Terms Project Managers Use Part I
We’ve got another top ten list for you – this time, in two parts. I wanted to bring you the top ten terms Project Managers
Top Ten Terms Project Managers Use: Part II
This is part II of my list. Don’t forget to check back at Part I. Again, I am grouping these into topical areas, and adding
Thing 1 & Thing 2 of Computing: Part II
In Part I, I talked about how actions and commands are translated to Binary. In this article, I am going to discuss how commands and
Recent Posts
- Boost Your Startup with Microsoft’s ECIF
- Why Do Computers Get Infected and How to Protect Yours
- KTL Solutions Assists in Successful Completion of C3PAO DIBCAC Assessment, Empowering Cybersecurity Excellence
- NIST SP 800-171 Policies, Procedures, and Documentation Oh My. Where do I start?
- A Smooth Ride to Cybersecurity, Just Like Cool Runnings: Navigating the Microsoft Defender Stack