Link to Medium.com Article: https://highervista.medium.com/sqlite-training-presentations-4746b3d98d56
Link to Medium.com Article: https://highervista.medium.com/ai-blockchain-in-the-manufacturing-supply-chain-77cc4897e20
Link to Medium.com Article: https://highervista.medium.com/trends-in-database-technology-and-database-security-part-1-b1600b1d491e
Link to Medium.com Article: https://highervista.medium.com/protection-from-open-source-code-and-cots-the-nist-8183-e17c27aade7e
Link to Medium.com Article: https://highervista.medium.com/data-leakage-application-programming-risk-mitigation-14de9f44f738
Link to Medium.com Article: https://highervista.medium.com/overcoming-certification-rejection-a-recovering-ccfp-computer-forensics-certification-survivor-2d11eb60295e
Link to Medium.com Article: https://highervista.medium.com/a-primer-to-function-point-analysis-for-the-software-project-manager-8436e3fd6b59
Link to Medium.com Article: https://highervista.medium.com/network-security-as-a-profession-a-firewall-primer-87719079319c
Link to Medium.com Article: https://highervista.medium.com/mitigating-the-hackers-use-of-dos-ddos-79575565347c
Link to Medium.com Article: https://highervista.medium.com/standards-help-to-limit-hackers-in-gaining-access-to-critical-infrastructure-61ed91ba69ed