LA Creative Technologies Is Pleased to Start Offering vCIO Services

{company} has been providing our clients with the comprehensive technology solutions that enhance operations, allowing clients to experience what it really means to have limitless success. We are constantly striving to find new and innovative ways to better serve our clients, and help them to reach and surpass their goals and objectives. This is why we are thrilled to be able to offer vCIO to our clients to allow them to better utilize their technology in ways that they never thought possible.

Our vCIO processes start with our IT as an opportunity workshop, where we use our IT Competitiveness Canvas. This is where we will show you how to best identify opportunities to leverage your technology and improve various areas such as:

  • Productivity
  • Security
  • Business Continuity
  • Competitiveness

In addition to our IT Competitive Canvas, you’ll receive a comprehensive report that shows you how your business ranks in the 7 Key Areas of IT Competitiveness. This will provide you with an in depth look at what areas need improvement, allowing you to keep a clear and organized focus on how to best make your technology work for you. Here are our 7 keys areas of competitiveness:

  • Continuous – What is the level of IT security
  • Competent – How efficient and professional is the IT ecosystem
  • Cost-Effective – How cost-effective is the IT ecosystem
  • Charge – How proactive and is the It ecosystem
  • Conscious – How strategy and business focused is the IT ecosystem
  • Controlled – How measureable and governable is the IT ecosystem
  • Clear – How transparent is the IT ecosystem

We have designed these effective and proven key areas of IT competitiveness by using our in-depth and experienced understanding of business strategy and technology to deliver organizations the success that they are striving for, by streamlining organizations IT infrastructure and strategically guiding them to tremendously high levels of achievement, to help increase productivity, patrons, and profit, and ensure the success and longevity of their business.

Contact {company} at {phone} or send us an email at {email} today to take advantage of our fully personalized and effective vCIO and IT solutions services, to start enhancing your operations, empowering your workforce, and positively impacting your bottom line.

Flimsy Bank Policies Put Your Financial Info at Risk

Many Americans put their money in the bank as a method of keeping it safe and secure. Most do not realize, though, that one policy employed by financial institutions which is meant to protect them could actually be putting their sensitive financial information at risk. In fact, according to the Cyber Forensic Research and Education Group at the University of New Haven, most financial institutions have less stringent password requirements than other types of businesses including social media sites.

BANKING

Research Group Surprised by Results

The research group looked at the password policies of 17 banks. Of those, the group raised concerns about the password policies of six. It found that the password requirements of some of the country’s largest banks — including Wells Fargo, BB&T Corp., Citibank, Chase, Capital One and Webster First Federal Credit Union — had flimsy policies that did not require industry standards. These six financial institutions represent about 350 million accounts — a staggering number considering the vulnerability of the information.

What Makes These Policies Weak?

What the research group — which was made up of five undergraduates — discovered is that the above-mentioned banks did not differentiate between upper and lower case letters when it comes to their account holders’ passwords. That is, they did not require that the passwords be case sensitive. A cyber security expert and assistant professor at the University of New Haven, Frank Breitlinger, noted that the failure of banks to support case sensitive passwords is both surprising and troubling. He pointed out that many people naturally use both types of letters when they are formulating their passwords. Because banks do not take the simple step of supporting these efforts within their passwords, the security of their account holders’ financial information is significantly reduced.

Another Troubling Discovery

Not only did the research group discover that these financial institutions do not support using case-sensitive passwords, they did not make the experience of reporting security issues user-friendly. Many of them had no listed phone numbers or email addresses to report a troubling security problem. Instead, researchers notified these banks by using their phone hotlines. Representatives for the banks that were reached on these hotlines didn’t seem to understand how to handle the researchers’ concerns or the potential for severe security issues. In addition, they did not notify their in-house IT or security department or seem to understand the need to do so.

If you are looking for a reliable IT support partner in {city}, we can help! As experienced IT professionals {company} offers secure solutions that are designed to protect your sensitive financial information. Give us a call today at {phone} or send us an email at {email}.

Do You Have the Right IT Service Company in Your Corner?

If your business has reached the point where you know you need outside IT support, whether due to growth, the loss of a key IT employee or concerns about vulnerability in your network, you have an important decision to make. Choosing the right IT service company for your business is an important step on the path of your company’s continued success; choosing the wrong company, however, could create additional headaches and ultimately be more of a hindrance than a help.

IT Services Company

So, how do you know you’re picking the right company to partner with for your company’s IT support? Focus on the provider’s expertise, service and support. Let’s look into each of those a little bit more:

Expertise

What are the service provider’s specialties and certifications? Do they have experience in your industry, and with similarly-sized organizations? Finding an organization that is experienced in your industry is especially important if your industry has its own rules and regulations for IT security.

Does the company have experience working with the type of hardware, software and peripherals you use? If not, they may not be the best fit to help your company proactively address its IT needs.

Service

What kind of response time can you expect from the IT service company? Look for a company that offers a guaranteed or promised response time when issues arise.

A speedy response time is not the only thing you should look at, however; you need to make sure the company you partner with offers quality support. A speedy response is great, but only if it serves to address the original problem without worsening or creating new problems. Look for a company with a track record of happy customers.

Finally, what kind of support do they offer? Look for a company that offers support in a way that will be helpful for you and your employees, whether that is phone support or email responses.

Support

What kinds of services will be covered under your support contract with the company? Some service companies offer very limited support while others offer support for just about any type of IT service need you can think of.

Do you need help with network design, network security, ongoing monitoring, data backup and recovery, web hosting, server storage, or something else? The best support for your company will fit your business and your anticipated needs.

If your business has reached a point where you need to partner with an IT service company, congratulations! Having a dedicated IT service company in your corner will help position your organization for continued growth. Any reputable IT service provider should willingly provide answers regarding how their firm’s expertise and experience align with your company, what type of service they can offer you and your employees, and how they will meet your needs on an ongoing basis.

Apple or PC for Law Offices?

Windows long dominated as a popular operating system for law firms. Yet, as Mac gained in market share over the decades, an increasing number of law firms have switched from a PC to a Mac for their practices.

Computer Law Firms

For much of the time, the assumption was that Windows was superior for a business environment for several reasons:

  • The necessary software running on the company computers would work only for PCs
  • PCs were much more cost-effective
  • Computers running Windows couldn’t “communicate” with Macs on the same network
  • Parts for PCs were more readily available for repairs and upgrades

Currently, Mac has gained on the PC advantages, and law firms are reconsidering. Here are some reasons I think that the advantages are now about even.

Software

Attorneys today typically utilize the following software programs:

  • Practice management software such as MyCase or Clio
  • Microsoft Word and Excel
  • Dropbox or Google Drive
  • Google Apps
  • Adobe Acrobat or other related PDF software programs

Each of these programs or apps is available across both platforms.

PCs and Macs can both run Adobe Acrobat and Microsoft Office, and cross-compatibility issues have been eliminated between the operating systems, although older versions may continue to be incompatible.

In addition, practice management software was usually supported on Windows servers with onsite hosting. This remains a common practice for large law firms; however, cloud-based software has become a valuable resource for solo and small law practices due to its ease of maintenance and cost-efficiency.

The remaining programs are cloud-based, which means that any type of device or computer can access and use it. The computational processing provided by cloud-based software is not accomplished by your device, PC or Mac. It is processed by servers elsewhere programmed to recognize and respond to different operating systems.

IT for Both

Although it may be enticing to reduce costs by eliminating the IT support service you have once you move to the cloud or switch from PC to Mac or vice versa, it remains a solid idea to keep an IT service provider on call. Today, your staff has a multitude of devices and operating systems, and you need a provider proficient in all of them.

Network Communications

Designing, building and maintaining an in-house server can be far too difficult for solo and small law practices. The cost of overhead is high especially in relation to the available alternatives.

In addition, having an in-house server to manage emails and documents requires using a sole operating system, which the cloud eliminates. For solo and small practices, sharing documents over a network is facilitated easily via the cloud using Box, Dropbox, or Google Drive. Generally, the hassles are fewer, and you have no equipment to repair or maintain. You can access your files from any type of device, mobile device, smartphone, tablet, PC, or Mac.

Cost and Parts

PCs do have one advantage still over Macs in the cost area. Many computer manufacturers make devices that use the Windows operating system while Apple still makes devices that use only the Apple proprietary operating system. Plus, Apple computers come at a premium price, and some experts might argue that some of the cost is due to cache.

Does it Matter Anymore?

Pertaining to functionality, it probably does not matter today whether your law firm uses a PC or Mac. Sharing documents and contest over differing operating systems is seamless today. You can create professional declarations and other pleadings for court just as easily on a Mac as a PC, and you can share those documents online with colleagues or clients without worrying about cross-compatibility. Most software is currently available for both platforms.

The best answer may be to simply choose which works best for your law firm and staff.

Tricks to Use to Protect Your Computer From Vulnerabilities in QuickTime

There are at least two known vulnerabilities in QuickTime for Windows. While this is not the first time vulnerabilities have been found in this video playing program, it is the first time that Apple will not be patching them. Apple’s support for QuickTime for Windows ended in January of this year, though they did not inform any consumers of it. Instead, those who are using QuickTime on Windows PCs were left to find out about it through other sources online, or in tech magazines. Some people may not have heard about the issue with QuickTime yet at all.

Quicktime

Apple will continue patching security vulnerabilities in QuickTime on Mac computers, as well as updating the software. Windows users will need to find new software programs to play their videos. In the meantime, here are some things you can do to protect your computer from the vulnerabilities in QuickTime for Windows while you look for a new video player.

1. Do Not Open Any Unknown Videos in QuickTime

The main way hackers can gain access to your computer through the vulnerabilities in QuickTime for Windows is by getting you to play one of their videos on it. If you are emailed a strange video from someone you do not know, or if you come across a video on a website you don’t trust or that is new to you, do not open it in QuickTime. With videos sent to you by strangers, it is probably better to not play the video at all. If you must play it, use a different video player that you know is secure, and make sure your computer’s anti-virus and anti-malware software is turned on when you do it. There are still a good number of well known video players that are supported by Windows computers, so you shouldn’t have any difficulty finding an alternative video player to QuickTime.

2. Go Back to an Earlier Version of Windows

Apple stopped supporting QuickTime on Windows 8 and 10 a while ago. In fact, they never supported it on these versions of Windows, but no one knew it, as QuickTime kept being offered with those computers. If you are able to reinstall an earlier version of Windows on your computer until you get a new video player, you may be able to use QuickTime more safely. This will only work if you had an earlier version of Windows on the same computer you’re currently using and upgraded with QuickTime on it. QuickTime was being supported until January on earlier versions of Windows, so if you previously had an earlier version, going back to it may mean being able to use QuickTime more securely. As you want to be using the most recent version of Windows, this should only be a temporary solution until you can get a new video player.

3. Uninstall QuickTime From Your Computer

The best way to protect your computer is to avoid the possibility of accidentally using QuickTime at all. This means uninstalling it from your computer. This is what all the tech magazines and websites are recommending anyone with a Windows PC do. Whether your Windows PC is used at work or for personal use at home, it needs to go. You can easily uninstall QuickTime from your computer by going into your control panel and selecting the software icon. From there, locate QuickTime in your list of software programs, select it, then click the install/uninstall link at the top of the page. Once the uninstall feature completes its work, you will no longer have QuickTime on your computer, and your computer will be protected from its vulnerabilities.

How to Uninstall Quicktime, and Why You Should Do it Now

Word is going out among the business community that Windows users should uninstall QuickTime for Windows as soon as possible. Why is this important? After all, QuickTime is an old and trusted program.

Uninstall Quicktime

The two important reasons to uninstall QuickTime from Windows computers are:

  1. Apple is no longer going to issue security updates for QuickTime on Windows computers. Security updates will still be issued for QuickTime on Mac computers, so you don’t need to uninstall it from these devices. Apple wants to focus its efforts on Apple-based computers only, which is why it’s no longer updating security features on Windows computers.
  2. Two important vulnerabilities relative to QuickTime for Windows have recently been discovered. Because Apple is no longer issuing security fixes on QuickTime for Windows, these vulnerabilities will not be addressed or fixed. While no security violations have been reported because of the vulnerabilities as yet, they could happen at some point. The potential vulnerabilities mean that you undergo considerable risk if you continue to use QuickTime on your Windows computer. The only solution is to uninstall it and not use it.

QuickTime is neither the first Apple-based software nor even a Microsoft-based software that the respective parent companies have stopped supporting in a Windows environment. Apple also stopped supporting Microsoft Windows XP and Oracle Java 6, so if you’re still running those programs on your Windows device, you also need to uninstall them to protect your security.

Some third-party companies have been able to patch the vulnerabilities in QuickTime; however, these patches are not foolproof, and potential hackers can conceivably find a way around them. The only sure method of protection is to use the Apple-based security updates, which will no longer be available. That’s why the only way to ensure the safety of your system is to run a complete, thorough uninstall of QuickTime. Fortunately, you can still play videos on a number of other programs that are probably already installed on your computer, and these programs are still supported with security updates by their parent companies.

How to Uninstall QuickTime

If you’re using Windows, uninstalling QuickTime is a simple matter. Just follow the following instructions:

  • Go to Control Panel.
  • Find the icon for the uninstallation of software; click it.
  • Scroll through the list of installed software, which is in alphabetical order. Scroll until you find QuickTime.
  • At the top of the menu, you will see links for various functions. Look for the “uninstall” link. First select “QuickTime; then click “uninstall.”
  • You’ll see a pop-up window asking if you really want to uninstall it. Click “yes.”
  • Your computer will begin to uninstall QuickTime. This may occur instantly, or it may take a few minutes, depending on your computer’s age, speed and memory capacity.
  • You will receive a pop-up notice letting you know the program has been uninstalled. Check the list of software in Control Panel to make sure QuickTime is no longer there.
  • Close Control Panel and go to the Recycle Bin on your desktop. Check it to ensure QuickTime wasn’t sent there. If you see it, delete it from the Recycle Bin, or use this opportunity to empty the Recycle Bin if you choose.
  • QuickTime is now uninstalled, and your computer is safe.

Security and the Future of Professional Collaboration

Software for collaborative work known as “groupware” has existed in some form since the first computer networks connected American researchers on opposite coasts in the 1970s. Security wasn’t an issue in those days but it certainly has become one today. Security is the largest obstacle to adoption of groupware technologies in professional fields with sensitive or regulated data like medicine, law and finance.

Lawyer Computer

Computer software has always had to walk a tightrope balancing security and functionality. This is particularly true with groupware platforms which must be easily accessible by their very design. Recently, it appears it feels like the field has now reached maturity. I recently tested Citrix’s forthcoming ShareFile Legal platform and it seems to point towards a future filled with specialized, deeply-networked applications for professionals. And of course, the key component is security.

Robust Professional Collaboration

This spring Citrix rolls out the specialized version of their groupware service ShareFile customized for the workflows of the legal profession. It handles team-based task and contact management as well as project and legal matter management. A document management system (DMS) underlies the whole structure with tools such as document tracking, digital signatures integrated into Outlook and integration with third-party document management systems.

At its core ShareFile is a more business-friendly competitor to the mass market DropBox and Google Drive file sharing services. The key difference lies in enhanced security and functionality. Google Drive and DropBox are successful due to their ease of use and free options. They’re easy to use and free because those companies can play fast and loose with their infrastructure. Your data hosted by those companies could be in any data center around the world or split among any number of data centers. The hardware is often off-the-shelf. The encryption is the minimum necessary.

Knowing this reveals something about ShareFiles. While their custom applications certainly add a lot of value, the actual ‘services’ Citrix charges premium rates for are security and accountability. Citrix secures client data with high-grade encryption both in transit over the Internet and at rest on their storage. It hosts multiple disaster recovery backup sites both in the US and Europe. Most importantly, Citrix’s data centers are compliant with the SSAE 16 auditing standard. This is the fiscal reporting standard of the financial and legal professions of the United States and through those professions is necessary in many industries. It’s not that collaborative software is only useful in these professions and connected industries once security standards became cost effective, they simply couldn’t exist without them.

Where We Go From Here

Encryption, security and especially regulatory compliance are key. Now that providers like Citrix have figured out how to cost-effectively institute them we’ll start seeing the next wave of these features hit the groupware market. The next one we’re likely to see is increased analytics and automation. Amazon is already a pioneer of this tactic ‘renting’ computing power through theirElastic Cloud Compute service. Similar to Citrix’s efforts in building collaboration suites customized for specific professions like ShareFile Legal, I would expect to see vendors build customized analytics and automation features in these computing environments.

Collaboration Technologies for Your Profession

Do you want to find out what IT services are around the corner for your profession? Do you want to find out how your business can better use technology and become a leader in your industry? Our team has years of experience to offer you. Give {company} in {city} a call at {phone}, or send an email to {email} today.

Do you know the true power of LinkedIn?

Everyone in the business world knows that LinkedIn is a powerful tool. However, many businesses have neglected to maximize its potential for marketing success. There is far more to LinkedIn than just connecting with some users and joining a few conversations. As LinkedIn continues to evolve, an increasing number of valuable features are being made available to users to help them reach new clients and valuable business contacts.

LINKEDIN

Unfortunately, many of the people that could be benefitting from LinkedIn’s many features have written it off. While it may not be as new and exciting as other social media platforms, LinkedIn provides a key advantage: Users are defined by their role in the business world, which makes networking with others a simple matter. 

LinkedIn is a simple and free way to grow your business through networking initiatives. By expanding your business circles online, your business is promoted through demographics and communities you’d likely never reach otherwise.

The key is in how you use LinkedIn. Remember: It’s not Facebook or Twitter, so you can’t always post the same type of content, or in the same way. Similarly, LinkedIn isn’t your business’ website, so you can’t expect it to directly generate revenues. It’s a lot to keep in mind, so consider these keys to success when developing your business’ LinkedIn presence:

  • Remember your audience. This is LinkedIn; not Facebook. As such, it’s best to keep your posts professional. The people you have connected with are far more interested in your opinions on the latest business news than they are in seeing a photo of your daughter eating her first plate of spaghetti.
  • Don’t hesitate to reshare the good stuff: A good article is a good article, simple as that. Even if you shared it on a different social media platform that may have an overlapping audience, don’t be afraid to update it for your LinkedIn network. Most of your LinkedIn connections will not have seen the article before, so sharing it again will, at worst, only serve to refresh the idea.
  • Let go of the hard sell: One way to diminish your audience is to post articles that scream “buy my product or service!”. In the “in your face” world of online marketing, subtle is always better. You can casually mention what you do, but remain focused on providing valuable information to your audience.
  • Stagger your posts: It’s always great when you have a lot of things to say; what isn’t so great is saying them all at once. Do not inundate your audience with a barrage of posts. Set up a posting calendar or, at least, try to limit your posting to a set number per day or per week. Not only do you want to get your message across, but you also want to give them time to think about it before you present your next idea. This will give them time to understand what you’re saying and respond if they so choose.

Above all else, just keep at it. You may not see a return right away, but keep in mind that as a free service, LinkedIn will always be cost-effective, so don’t get discouraged.

{company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Improving Community Relations with IT  

IT Services Jewish SchoolsIn this case study, I will demonstrate how LA Creative Technologies helped a local non-profit streamline & upgrade its campus-wide systems while adhering to the organization’s budgetary requirements.

The Silverlake Independent Jewish Community Center (SIJCC) in Los Angeles is a thriving campus of over 17,000 square feet. It provides cultural events and diverse programming for adults, children and families in addition to operating a successful preschool.

In the last few years, the SIJCC has expanded its staff to more than 80 employees, and in the process, has faced mounting pressures to meet its changing technology needs. Initially, they engaged a different IT company, and that experience resulted in a less-than-stellar outcome. The other company had them using sub-par equipment and poorly chosen cloud services. During this time, the SIJCC felt their needs were not being met: the IT company was unresponsive, and they felt that their internal staff could produce the same results without paying for outside expertise.

After hearing about LA Creative Technologies through Josh Weiss’ work with the Progressive Jewish Alliance, Executive Director Ayana Morse contacted Josh for a consultation. The organization engaged LACT to provide both a short- and long-term plan to upgrading their IT systems.

The plan implemented not only day-to-day maintenance, but also provided the SIJCC with a cost-effective strategy for networking the entire campus, adding in Wi-Fi and Virtual Networks (VLANs) to help alleviate their technology challenges.

This vision, created by LA Creative Technologies, provided for near-term solutions and future improvements with more efficient, productive technologies than the changes the previous IT company had implemented.

As Ms. Morse pointed out early in her discussions with LA Creative, as a non-profit organization, the SIJCC must make decisions based on a tight budget with little wiggle room remaining to correct errors. She has repeatedly complimented LA Creative on its initiatives that prioritize future installations to ensure the best solutions occur without creating unnecessary expenditures. Their experience with the last IT company resulted in acquisitions of computers and other equipment that fell short in meeting the organization’s needs, thereby resulting in the necessity for additional equipment replacement within a year. As a non-profit that is expanding to meet the community’s needs, the SIJCC has no room for error in its expenditures.

Unfortunately, the SLJCC has had to absorb some of the costs of correcting the errors of the previous IT company. However, Ms. Morse was highly complimentary in expressing praise at the manner in which LA Creative assisted with those challenges by focusing on the most critical elements of the new strategy and making the necessary improvements, well within budget.

Now the SLJCC is continuing to expand. Currently, they are rehabbing a large building, and LA Creative Technologies is working with them to make that space ready for community and event programming. They are implementing VLANs and backend security with an eye toward even more growth over the next few years.

At LA Creative Technologies, we collaborate with our clients to ensure their unique IT needs are met efficiently and quickly. We strategize on plans for growth, and we fulfill your needs for a virtual CIO or vCIO. When you hire us as your vCIO, you add a technology expert to your team who can help you grow and gain an edge against the competition. We do this by collaborating with you on an IT strategy and budget in line with your objectives and managing the implementation of the technology solutions. In addition, we help you manage your customer relations, or, as in the case of the SLJCC, community outreach and event production requirements. We design integrated systems to cost effectively manage data and your digital communications for marketing and sales.

No matter what type of organization you have, LA Creative Technologies can help you with your IT needs.

IT Career Opportunity In Southern California

Greetings Venerated Citizen of Your Neighborhood,

Do your current circumstances match the scope and quality of your geeky aspirations? Do you create entirely groovy things and proffer them to your friends and social media acquaintances completely free of charge? Is your bedroom littered with dead computers that you’ve kept because they might still have a nice strong magnet inside for your next experiment? Do you frequently get volunteered to debug and secure your aunt’s, uncles, and grand-folk’s computers against your will? Are you the most tech-savvy person in most situations, but haven’t gotten the tech respect you deserve because you aren’t making any money at it yet?

You just might be the nerd we’re looking for.

ABOUT THE JOB

This is an entry level IT support gig for someone talented and passionate, like you, who is eager to learn everything from scratch. No work experience is required. All that is required is that you have an unholy passion for information technology.

You’ll be working either from home, at our office in Echo Park, or at our clients’ offices located in:

  • Downtown Los Angeles
  • Atwater Village
  • Beverly Hills
  • Hollywood
  • Brentwood
  • Marina Del Rey
  • And other fine locations around our city!

Your mission, should you choose to accept it, will be to check if clients have turned their problematic machines on and off again. If they have, you’ll need to try to figure out what kind of rookie mistake they have made to get into the mess they’re in.

This a one-of-a-kind opportunity for rough and ready computer nerds who know how to diagnose a problem using a combination of Google searches and sheer talent. This is going to be a trial by fire type of situation. We absolutely will throw you to the wolves, expect you to sink or swim, as well as a number of other mixed metaphors.

Sometimes, there won’t be much for you to do. During such times you might be working from home **HINT that would be a good time to do some independent study. You’ll also be tasked with helping our remote clients during these times. Please be ready to look and act professionally should a client want to have a video conference with you.

You’ll be answering calls, (within two rings, por favor), responding to emails, and just basically doing everything in your nerdy power to ensure that clients DO NOT accuse us of being slackers.

This job will be fun. You will be given the opportunity to live by your wits and given the time you need to solve problems- a privilege that few working people have. We know that genius has got to be given room to breathe in order to function- and that’s what we are offering, to the right kind of geek.

ABOUT US

LA Creative is not your father’s IT company. We provide active, personal support for our clients. We provide cloud computing services unlike any other firm by making it feel like an actual cloud. Information technology is the air that our client’s businesses breathe- whether they know it or not- and we make it our mission to ensure that they experience zero to dang-near-zero interruptions in service. We promise our clients direct transport to the cloud in a non-stop expressway to digital affluence and information blasting power…and we’re asking you to drive this train into cyberspace.

WHAT WE WANT FROM YOU

  • Care about people. Seriously
  • Love to learn, a lot
  • Spell check for Pete’s sake (Pete’s begging you)
  • Be an optimist
  • An obsession with customer satisfaction, (how else can you prove that you’re so brilliant?)
  • Get stuff done, lots of stuff
  • If you see a problem, fix a problem
  • Be a grammar expert
  • Laugh a lot, seriously- we have trap door installed for sour grapes- so don’t be one
  • Wear your big person pants

ALSO

  • Be able to work nine hour shifts
  • Have a home office
  • Have transportation (what, were you expecting to carry open-housing hard drives on the city bus?)
  • Have current U.S. work authorization