Blog 5

The Consequences of Cybersecurity Complacency

To download a copy of the Consequences of Cybersecurity Complacency, please click on the image below.

Time to Celebrate the Year of the Unexpected Experience

For Kinney Group, 2015 was the year of executing and delivering the Unexpected Experience to our customers, partners, and colleagues. We could not have done so without being grounded in our…

Featured Category

Cybersecurity

Cyber attacks damage reputations, destroy customer trust, and affect revenues. Read to learn cybersecurity best practices to keep your data, and reputation, secure.

Secure Private Cloud Capability Launch: 2015 AFCEA TechNet

Our wise robot, Techie, is here to alert you to valuable information: a secure private cloud solution accredited for operation on Army networks is available today from Kinney Group, Inc. Kinney Group, Inc.…

Disk is Dead: Forward Thinking Themes for Building Next Generation Federal Data Centers

“As I grew up working in the restaurant business, I learned at an early age that if you delight the customer with an unexpected experience, great things can happen,” opines…

Splunk License Estimations

Over the years I have searched for a tool that will allow me to size a customer’s Splunk license quickly and accurately. I have even attempted to manually and accurately…

IOPS and Splunk Enterprise Success

What is more important for a successful Splunk Enterprise implementation: IOPS, number of CPU cores, or the amount of memory (RAM)? The answer is IOPS is the most important requirement. While both CPU and memory are important factors, they are both building blocks on the core requirement of Splunk Enterprise,…

What is a HUBZone Certified Small Business?

What is HUBZone? According to the U.S. Small Business Association: “The Historically Underutilized Business Zones (HUBZone) program helps small businesses in urban and rural communities gain preferential access to federal…