Wednesday, April 30, 2014

Thoroughbred aftercare - Thanks to the New York New York Thoroughbred Horsemen's Association for support

Many members of the racing and breeding industries have stepped forward to provide a long-term plan for Thoroughbred aftercare - Thanks to the New York New York Thoroughbred Horsemen's Association for adding their support to this important initiative. ‪#‎horseracing‬
http://bit.ly/1mcg0Zb

Top Industry Sectors Experiencing Multi-Breaches #mobliesec

Operate under the assumption that your network(s) will be compromised – develop policies to minimize the damage.
http://bit.ly/1k4Gyvf

China will become the world's largest economy by the end of the year

China, which had been forecast to overtake America in 2019 by the IMF, will be crowned the world's pre-eminent country by the end of this year according to The Economist’s calculations. The American Century ends, and the Pacific Century begins.
http://econ.st/1jh3xEs

Cyber Attacks Against Small Businesses Nearly Doubled #cybersecurity

Targeted attacks against small businesses almost doubled last year – it was up 91%. And it lasted three times longer than what we saw in 2012.
http://bit.ly/R59Ocb

You Can’t Hide on Facebookj #law #careertips

Before posting an update or photo, ask yourself whether the information should be shared on Facebook. As we’ve been reminded by the recent Randi Zuckerberg photo privacy breach, your information can still be shared by your friends who have access to the information—no matter how private you try to make the information by applying the most stringent privacy settings. So, before posting anything, ask yourself, “Would I mind if the entire world saw this information?”
http://bit.ly/1dnfUi4

Tuesday, April 29, 2014

RT @SarahSkerik: The survival rate of new magazines launched in 2012 was 85% - the highest in 30 years #media #journalism #sxsw #print

Smart ways to optimize your content #SEO

Great content is good only if it is read. Optimize. Share the love.
http://bit.ly/1ilHQnJ

FTC, Justice Dept. say antitrust laws shouldn't block cyber threat disclosure #cybersecurity

The joint-agency “Antitrust Guidelines for Collaborations Among Competitors” details the FTC and Justice Department's analytical framework for sharing information and underscores that “antitrust laws do not stand in the way of legitimate sharing of cyber security threat information,” in a comment attributed to FTC Chairwoman TK Ramirez.
http://bit.ly/1sTySBg

Beware of Business Associate Agreements #HIPAA

U.S. Department of Health and Human Services (HHS) released the omnibus regulations under the Health Insurance Portability and Accountability Act (HIPAA), including implementing changes made by the Health Information Technology for Economic and Clinical Health Act (HITECH) (the final rule). Some of the sweeping changes directly affect business associates.
http://bit.ly/Mt20y4

Windows XP: Old Platforms Die Hard, Security Risks Live On

The success of XP and negativity surrounding Vista meant that many individuals and organizations never upgraded. With approximately 70% of computing devices sold today being smart devices (smartphones and tablets), the likelihood of finding a computer running an older Windows operating system is much greater today than ever before.
http://bit.ly/1sxToqL

Even Government Offices Can Be Breached #cybersecurity

Most of the data breach scenarios I’ve seen are linked to smaller companies or smaller branches of companies that do not necessarily have the most recent technology protecting their data. As such, the breach mentioned herein could lead to potential lawsuits if the data is used for fraudulent transactions.
http://smlrgroup.com/government-offices-cybersecurity-breached/

Monday, April 28, 2014

Fiddlers Tango 3rd at Gulfstream Park trained by Jena Antonucci #horseracing

April 27th, 2014 Fiddlers Tango 3rd at Gulfstream Park trained by Jena Antonucci
http://bit.ly/1kcYqTL

Cybersecurity Today - From Breach to Defensible Response

A data breach can have a direct and catastrophic impact on not just your organization, but everyone associated with it. Your data can be used by intruders for identity theft, credit card and wire fraud, IP theft, etc. In short, a data breach can mean the difference between prosperity and bankruptcy.
http://bit.ly/19OoDRF

Increased Use of Medical Devices by Healthcare Results in More Cyberattacks #cybersecurity

Raising significant HIPAA and data privacy and security exposures, the study finds that healthcare providers have been attacked.
http://bit.ly/1cC3cJv

Card Security: Banks, Retailers Collaborate to Prevent Breaches #cybersecurity

Financial Services Roundtable and the Retail Industry Leaders Association have partnered to address card fraud and emerging cybersecurity risks. They’re also working to build support for a national breach notification law.
http://bit.ly/1f39s9G

Developing Leaders Is HR’s Most Important Function #careertips

Leadership development is a $25 billion industry, according to Deloitte, including everything from basic books on how to be a good supervisor to $25,000-a-week classes for top executives at leading business schools. Still, many companies under-spend in this area.
http://bit.ly/1fOPPCX

Using Big Data To Drive Customer Loyalty #analytic

What really is "Big Data" and how does this affect my organization's customer experience management efforts? - See more at: http://loyalty360.org/resources/contribution/transforming-marketing-into-a-center-of-customer-experience-excellence#sthash.OIBH0VCv.dpuf
http://bit.ly/1szqTsR

Sunday, April 27, 2014

New York Racing Association donates trees for Anna House ‪#‎NYRA

New York Racing Association donates trees for Anna House ‪#‎NYRA‬ ‪#‎horseracing‬ Belmont Child Care Association Belmont Park’s on-track early education center for the children of backstretch workers.
http://bit.ly/RXQa2j

Saturday, April 26, 2014

Yahoo! Sports Radio will broadcast HRRN's Triple Crown program across the country #horseracing

The addition of the Yahoo! Sports Radio affiliates will significantly enhance our distribution of the broadcasts and allow us to expose these premier events to an even greater audience across the country.
http://bit.ly/1h0kCOJ

http://smlrgroup.com/cybersecurity-framework-whats-next/

The framework, which the National Institute of Standards and Technology released Feb. 12, provides best practices for use in all critical infrastructure sectors, including, for example, government, healthcare, financial services and transportation. The catalog of tools is designed to help organizations develop information security protection programs
http://bit.ly/1lp2rZ7

Friday, April 25, 2014

Olympic Skaters Weir and Lipinski will report on fashin at this years Kentucky Derby

Weir and Lipinski will work as fashion experts for the Derby and the Longines Kentucky Oaks.
http://bit.ly/1rrBHWL

Failure to Protect Your Client Accounts Can Lead to Bankruptcy #cybersecurity

Impairment was a national medical records firm that kept medical information of thousands of patients in its database. However, a burglary on New Year’s Eve led to the theft of approximately 14,000 patient files that included addresses, social security numbers, and medical diagnoses.
http://smlrgroup.com/data-breach-can-lead-bankruptcy/

Find More Job Leads By Networking On LinkedIn With Alumni #careertips

The Alumni Networking Solution is a 5-step networking tool designed to introduce yourself to college alumni and develop relationships that lead to referrals.
http://bit.ly/1fOPxf8

Sample Personalized LinkedIn Invitations #law #careertips

Templates that lawyers and law students can use to personalize LinkedIn invitations. Try one of the following templates the next time you connect with someone on LinkedIn.
http://bit.ly/1dng9JV

Thursday, April 24, 2014

Brand Loyalty Can be Fun. . . And It Should Be! #branding

Smartphones are so pervasive these days that it’s nearly impossible to be anywhere without observing people interacting with their phones. Mobile technologies open up a tremendous…
http://bit.ly/QjHOAw

New Ideas for Mitigating Insider Threat

The panel says continuous security clearance vetting of individuals should employ a risk management approach and be based on the sensitivity and quantity of the programs and information to which individuals are given access.
http://bit.ly/19JjsUe

Cybersecurity Today - From Breach to Defensible Response

A data breach can have a direct and catastrophic impact on not just your organization, but everyone associated with it. Your data can be used by intruders for identity theft, credit card and wire fraud, IP theft, etc. In short, a data breach can mean the difference between prosperity and bankruptcy.
http://bit.ly/19OoDRF

Insurer Sued Over Data Breach #cybersecurity

A class action lawsuit has been filed against insurer Horizon Blue Cross Blue Shield of New Jersey in the wake of data breach late last year involving the theft of two unencrypted laptop computers that affected nearly 840,000 of its members
http://bit.ly/1cOxR6w

Wednesday, April 23, 2014

Kentucky Oak Day is all about the Ladies - Lilies for Fillies #horseracing

Although the Kentucky Oaks blanket of lilies hasn’t been around for as long as the Kentucky Derby garland of roses, it still is a great tradition of Churchill Downs’ signature race for fillies.
http://bit.ly/RLFwf1

Are Smart Devices in a Plant Your Most Valuable Assets? #cybersecurity

The key point is that these intelligent devices can provide the hidden asset in the form of a “Check Engine” light displaying the condition of your critical devices − the ones that can shut your plant down.
http://bit.ly/1oZTxUO

Tech Start-Ups Are Targets of Ransom Cyberattacks #cybersecurity

Small tech start-ups have become a particular target of these attacks because they “have things of value that a DDoS attack can hurt,” said Andy Ellis, chief security officer at Akamai. “It’s the modern equivalent of someone walking into a shop and saying ‘That’s a nice business you’ve got here — shame if anything happened to it.’”
http://nyti.ms/1hn9iek

Mad Men Quotes That Perfectly Apply to Social Media Today #engagement

Forget the slew of articles that analyze Millennials’ terrible behavior. Trash them. Every generation struggles to understand the next. Instead, track what your audience responds to and analyze that data to help improve your content. You’re wasting time generalizing a diverse group of 80 million people.
http://bit.ly/1iFRcFO

NIST Releases Cybersecurity Framework #cybersecurity

The National Institute of Standards and Technology has unveiled its long-awaited cybersecurity framework, which provides best practices for voluntary use in all critical infrastructure sectors, including, for example, government, healthcare, financial services and transportation.
http://bit.ly/1lp1Ma9

Hot Practice Area: Healthcare Fraud & Compliance #cybersecurity

Compliance is huge!! With the focus on containing healthcare costs, there’s an increased focus on fraud and abuse. There are increased obligations on providers such as reporting/returning overpayments, reduced false claims act standards and mandatory compliance.
http://bit.ly/1dngpZB

Tuesday, April 22, 2014

The secret to a successful interview #career

Interviewers often begin by asking you about the things you do outside of work, such as your time spent living abroad, your collection of petrified wood, or your black belt in karate. More often then not, they will find a common interest, a shared experience, or something they want to learn. Don’t miss this opportunity to connect with your interviewer.
http://bit.ly/1p3poyo

3 Steps to Build Your Legal Brand Online #careertips

To own a niche online, you have to produce rich content and share it constantly. And it is much easier to build your brand in a select niche than it is to stand out in a huge market like “attorneys”. Like Stephen always says, “it’s the niches that lead to riches.” Even online, it’s important for you to focus on your geographic region so you are able to niche your practice in an area that can provide living, breathing clients for your practice.
http://bit.ly/OO2T5y

The Dos & Don’ts of LinkedIn’s Mention Feature #career

Acknowledge your LinkedIn connections who are speaking at an upcoming event.
http://bit.ly/1ed8lZf

Card Security: Banks, Retailers Collaborate to Prevent Breaches #cybersecurity

Financial Services Roundtable and the Retail Industry Leaders Association have partnered to address card fraud and emerging cybersecurity risks.
http://bit.ly/1f39s9G

Mandatory Social Media Training in Law Schools? #careertips

Many law schools hold mandatory training on how to use LexisNexis and Westlaw career resources. Shouldn’t law schools require the same mandatory training on how to use social networking sites?
http://bit.ly/OO3kMY

Banking Cyber-Attack Trends to Watch

For banking institutions in 2014 will be to focus on detecting and mitigating multiple risks across multiple channels. "We will see more blended attacks that combine DDoS with some form of attempted data compromise."
http://bit.ly/1fhsF8a

Thursday, April 17, 2014

How to keep your brand relevant #career

When you really understand why your brand is important to consumers, you can build marketing programs that give them a reason to care and take notice. Most importantly, by changing with the times, a brand can maintain relevancy and grow along with its consumers--which is the best possible outcome for any relationship.
http://www.inc.com/michael-olguin/5-tips-to-keep-your-brand-relavent.html

Inspirational Writing Tips From History's Greatest Authors [SlideShare] #career

Nothing is perfect, and with writing it’s no different. Things rarely work out the way you want on the first go, whether it’s writing, art, music -- anything. It takes practice, and constant checks and balances to produce a well-rounded piece, as first drafts are meant to be experimented with.
http://blog.hubspot.com/marketing/inspirational-writing-tips-greatest-authors-slideshare

Getting Referrals & Repeats: How to Stay Connected to Your Network #careertips

Running through a networking event and talking at everyone for a moment is not sufficient. You need to make a lasting positive impression at least 12 times to remain relevant in the eyes of your prospective client or prospective referral source.
http://www.therainmakerblog.com/2014/03/articles/law-firm-marketing-1/getting-referrals-repeats-how-to-stay-connected-to-your-network/

Wednesday, April 16, 2014

Weekend Getaway - Hudson Valley Bed and Breakfast

Private getaway at the base of Mt. Beacon. Easy access to hiking trails and walking distance to downtown Beacon. Views of the Hudson Valley from the front exposure, and mountains to the rear. Large airy bedroom with a beautiful tiled bath.The SpaceThe maid's wing of our brick Dutch colonial home is situated on a ten acre estate. There is a secluded.and private apartment entrance off a mountain road. The private Base Camp of Dry Kill Estate is your escape from the routine for a pleasant getaway.There are magnificent views atop Mount Beacon, (which is part of this estate), of our Hudson Valley and the Schwangunk Ridge.
http://onlywire.me/hudsonvalleypr/531b8ce7c5a2d

Tuesday, April 15, 2014

Attorney Professionalism Forum: Must (should) attorneys engage local counsel in out-of-state matters #careertips

Attorney Professionalism Forum: Must (should) attorneys engage local counsel when they represent clients in out-of-state matters and venture outside their home waters?
http://www.thsh.com/Publications/Publication.aspx?PDF=544#.UzwJK_ldW09

America's Happiest and Most Miserable Lawyers #careertips

Lawyers in “prestige” jobs, who had the highest grades and incomes, aren’t as happy as lawyers working in public-service jobs for substantially lower pay. Judges, however, were happiest of all.
http://americanlawyer.com/id=1202647610210/America's-Happiest-and-Most-Miserable-Lawyers?slreturn=20140222101321

Hackers Using Mobile Devices To Expose Sensitive Information In Cyber Attacks #mobilesec

Cyber attacks pose a threat to consumers, businesses and governments. It’s a problem that’s growing at a rapid pace.
http://baltimore.cbslocal.com/2014/02/21/hackers-using-mobile-devices-to-expose-sensitive-information-in-cyber-attacks/

Global Economic Crime Survey, 2014: Key Highlights from the U.S.

Economic crime continues to remain in the forefront of corporate concern, posing a threat to fundamental business processes.
http://www.pwc.com/us/crimesurvey

Blackphone Could Create a Black Hole for Compliance #privacy

The Blackphone by SGP Technologies is being marketed as a way for business executives to communicate safely when in foreign countries, and for individuals to keep the National Security Agency and other agencies from spying on them. But it can also be used by cybercriminals, terrorists and drug dealers to do their business in secret.
http://smlrgroup.com/privacy-vs-security-compliance-conundrum/

HHS Wall of Shame: Health Data Breach Tally Tops 800

The largest of the 2013 incidents recently added to the tally was a breach reported by Horizon Blue Cross Blue Shield of New Jersey. That November breach, which involved the theft of two unencrypted desktop computers from the company’s headquarters, affected nearly 840,000 individuals.
http://smlrgroup.com/hhs-wall-shame-health-data-breach-tally-tops-800/

Monday, April 14, 2014

Feds unveil new road map for critical cybersecurity

The U.S. Department of Homeland Security has identified 16 critical infrastructure sectors: chemical, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, health care and public health, information technology, nuclear reactors, materials and waste, transportation systems and water and wastewater systems.
http://smlrgroup.com/cybersecurity-road-map-unveiled/

Saturday, April 12, 2014

New Paltz Regional Chamber of Commerce to Hold 2nd Annual Business Showcase

(New Paltz, NY) Thursday, April 17 from 1:00-6:00 pm, the New Paltz Regional 
Chamber of Commerce presents their 2nd Annual Business Showcase at Novella’s, New Paltz. The expo will celebrate the Hudson Valley’s diverse businesses providing professionals with new networking opportunities. The Showcase will foster community pride while giving participants a fun, high profile way to converse with both current and potential customers. 

Over 50 local businesses and community organizations will be represented in the exhibitors’ hall 
and six presenters will be featured on topics ranging from digital marketing basics to how to 
create financial projections for your business. The Showcase includes free business workshops from 1:00-6:00 pm open to the public. Topics range from digital marketing basics to how to 
create financial projections for your business. The Showcase, including the workshops and an after-hours networking mixer from 6:00-8:00 pm, is free to the public. 

Join the conversation on Twitter #newpaltzchamber and @newpaltzchamber. 

The 2nd Annual Business Showcase is proudly sponsored by: 

• The Nevele Resort, Casino & Spa 
• Wallkill Valley Federal Savings & Loan 

Contact the New Paltz Regional Chamber of Commerce for details about the 2nd Annual Business Showcase visit www.newpaltzchamber.org or e-mail info@newpaltzchamber.org. 



About the New Paltz Regional Chamber of Commerce 
The New Paltz Regional Chamber of Commerce, with nearly 600 members, is an active and 
trusted voice in the regional business and residential community, advancing the business, 
industrial, agricultural and civic interests of the Mid-Hudson Valley Region. Programs and 
services of the Chamber are made possible, in part, by the support of its Corporate Partners for 
2014: Health Quest (Principal Partner), COBESO, Inc. (Leading Partner); Central Hudson Gas 
& Electric Corp. and Ulster Savings (Associate Partners); HealthAlliance of the Hudson 
Valley, Empire State Bank, Hudson Valley Federal Credit Union, The Law Offices of James 
Yastion, PLLC, Luminary Publishing, and Vanacore, DeBenedictus, DiGovanni and Weddell 
LLP, CPAs (Supporting Partners). 

Members and visitors are welcome at the Chamber's Visitor Center, located at 257 Main Street in 
New Paltz. For more information about Chamber programs and Visitor’s Center hours of 
operation, visit www.newpaltzchamber.org or call the Chamber at (845) 255-0243. 

# # # 

Friday, April 11, 2014

7 Ways To Fail A Job Interview #career

Your resume that states you’re still working for a company (six months after I know you’ve quit), I’m not going to think you have a typo and forgot to mention it. I’m going to think you’re lying.
http://www.forbes.com/sites/glassheel/2013/07/18/7-ways-to-fail-a-job-interview/

Insurer Sued Over Data Breach

Privacy and security attorney David Navetta of the Information Law Group, who is not involved in the case, says the Horizon lawsuit is likely the first of many breach-related suits in healthcare and other industries that will be filed this year.
http://smlrgroup.com/insurer-sued-data-breach/

Thursday, April 10, 2014

Yes! It’s important for law firm attorneys to also “show up” online. #careertips

The good news is that marketing and public reputation professionals are increasingly taking over and shaping the voice of law firms and attorneys on social media
http://www.jaffepr.com/blog/jaffe/2014/01/22/outsourcing-social-media-right-you

Six tips: Protecting your firm from cyber attack

Supply chain 
professionals must consider how to tackle the increasingly common and costly cyber attacks on organisations, including stealing intellectual property and making confidential business information public.
http://www.supplymanagement.com/analysis/law/2014/six-tips-protecting-your-firm-from-cyber-attack

Court Denies Access To Employee Social Media Accounts

Pecile v. Titan Capital Group, LLC out of New York, where the court refused to grant the defendants’ request for access to the plaintiffs’ social network accounts. The court held that the fact that information contained in the plaintiffs’ social network accounts could contradict the plaintiffs’ claims of emotional distress was not a sufficient reason to compel production of that information.
http://www.workplaceprivacyreport.com/2014/02/articles/uncategorized/court-denies-access-to-employee-social-media-accounts/?utm_source=Jackson+Lewis%2C+P.C.+-+Workplace+Privacy+Report&utm_campaign=1d13dde06d-RSS_EMAIL_CAMPAIGN&utm_medium=email&utm_term=0_4a1c27c942-1d13dde06d-70242157

Top tech GC warns in-house lawyers to tackle cyber security dangers

In-house corporate and financial sector legal departments should place themselves at the centre of their businesses’ cyber security strategies, a leading global technology general counsel has said this week.
http://www.thelawyer.com/in-house/top-tech-gc-warns-in-house-lawyers-to-tackle-cyber-security-dangers/3015271.article

Forming the Industrial Internet Consortium to Coordinate the Internet of Things (IoT)

A number of Very Serious Companies, including General Electric Co., International Business Machines Corp., AT&T Inc. and Intel Corp. officially announced Thursday that they had formed the Industrial Internet Consortium. Their goal is to establish common technology standards and architectures, and hasten the day when sensors will be embedded in all sorts of objects and machines, collecting data and communicating across what is known, aspirationally, as the Internet of Things.
http://smlrgroup.com/internet-things/

Google+ Best Practices for Business #careertips

LawMarketing.com put on a really interesting seminar last week on how lawyers can use Google+ to market their firms and gave away a book written by two attorneys that has gotten rave reviews on Amazon: Google+ for Lawyers. You can download it to your Kindle or other reader for only 3 bucks.
http://www.therainmakerblog.com/2014/03/articles/law-firm-marketing-1/google-best-practices-for-business/

Wednesday, April 9, 2014

Six tips for avoiding mobile security problems with mobile apps #cybersecurity

Avoid open-ended options where customers enter whatever they want. Determine what information your business really needs while protecting customers or prospects. Developers and marketers are often quick to throw in questions and features, not thinking about how bad it would be if such collected data gets out.
http://searchcio.techtarget.com/tip/Six-tips-for-avoiding-mobile-security-problems-with-mobile-apps

Tuesday, April 8, 2014

Intermediate Search Engine Optimization Tactics #SEO

Clean metadata is more pleasing to the eye and improves the likelihood that a user will click on a link to your website’s page. WordPress offers plugins like All In One SEO or Yoast’s WordPress SEO that simplify the process of adding metadata.
http://hudsonvalleypublicrelations.com/intermediate-search-engine-optimization-tactics/

Monday, April 7, 2014

Leon Panetta warns of cyber attacks at police convention in Monterey #cybersecurity

"If men and women are willing to put their lives on the line, surely people elected to office should find a little of that same courage to govern,"
http://www.montereyherald.com/news/ci_25237014/panetta-warns-cyber-attacks

Thursday, April 3, 2014

Recruiting in the Digital Age #career

Learn how to reach the best and brightest candidates for your company through digital recruiting.
https://conversations.wfmagazines.com/create_wealth/business_assets/article/digital_recruiting/

Are You Overlooking a Great Social Media Marketing Tool? #careertips

Create quality profiles. Hopefully your employees are proud of where they work, so letting them know how they can help the firm by maintaining a high quality profile on LinkedIn, Facebook, Twitter and other social networks makes sense. Offer them consistent language to use in their profiles that reflect your firm’s branding strategy, and ask them to include links to your firm website and blog. Have them post professional photos, especially on LinkedIn.
http://www.therainmakerblog.com/2014/03/articles/law-firm-marketing-1/are-you-overlooking-a-great-social-media-marketing-tool/

Getting Desperate In Your Job Search? - DON'T! #careertips

Take a day off and give yourself a good talking to. What do you want and are you being realistic? Break the cycle. Freshen your mind. Don't chase everything. You'll just get knackered and disillusioned.
http://www.social-hire.com/career--interview-advice/4290/getting-desperate-in-your-job-seach---dont?utm_content=bufferc2e7c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Wednesday, April 2, 2014

Personal Branding, Resume or Job Search Targeting: Which Comes First? #career

Drive home your promise of value with tangible evidence of how you turned things around for past companies and solved their problems.
http://executivecareerbrand.com/personal-branding-resume-or-job-search-targeting-which-comes-first/

Third-Party Breach: Disagreement on Target Breach Cause #cybersecurity

If the [Target] cardholder data environment wasn’t sufficiently segmented from the contractor environment, the criminals could have found their way over to the POS systems just by getting into the contractor account,
http://smlrgroup.com/third-party-breach-disagreement-target-breach-cause/

Guess Whos Going to Quit Sunday Afternoon #jobs #law

Quitting a job, on the other hand, isn’t often done in public, though lately, more and more of the disgruntled have taken to You Tube to announce their resignation.
http://www.ere.net/2014/01/31/guess-whos-going-to-quit-sunday-afternoon/

Tuesday, April 1, 2014

SMLR Group announces new strategic partnership with Network Operations Expert Rahul Kakar

Kakar brings a rich understanding of industry specific issues and opportunities lending his considerable technical expertise in providing leading edge, cost effective technologies.
http://smlrgroup.com/press-release-smlr-announces-new-strategic-partner/

Media Strategist

Blog Archive