• Skip to main content

Macktez

  • Welcome
  • Get Support
  • Services
    • Macktez Management
    • Technology Consulting
    • Installation & Construction
  • About
    • Leadership
    • Case Studies
    • Blog
    • Events
    • Careers
  • Contact
    • Become a Client

Sara Kelly

Welcome AI into your workplace with creativity and caution

Generative AI tools are now more and more integrated into the applications and services your organization already uses on a daily basis. What guidelines can you follow to make sure you use these generative AI features without compromising business information?

Posted: 2025-08-20 Filed Under: Tech Notes

Dark Underbelly of FinTech

Underneath the shiny Stripe, Apple Pay, Square and well-heeled Visa, MasterCard, and Amex, lies a sprawling world of companies and services that connect the world’s financial institutions to each other and you. 

Posted: 2025-08-18 Filed Under: Events

Free WiFi & charging stations can cost you more than you think

Public Wi-Fi networks are everywhere, offering a convenient lifeline — but it’s worth understanding the potential security risks before you connect.

Posted: 2025-08-7 Filed Under: Tech Notes

Re-train your Spidey sense for the age of AI

You’ve trained your Spidey sense before and you can do it again! But it does take practice and positive reinforcement.

Posted: 2025-07-22 Filed Under: Tech Notes

AI shouldn’t be left unattended

Regardless of how tempting it might be to offload tasks to AI, ongoing human oversight is essential to confirm everything is running as expected.

Posted: 2025-06-20 Filed Under: Tech Notes

Anatomy and Physiology of Pre-War Aikido

Rodrigo Kong (emergency room physician and martial artist) joins Noah Landow (Founder and CEO at Macktez) for a conversation about the interplay of anatomy, physiology, and the ancient Japanese art of Daito-Ryu Aikijujutsu.

Posted: 2025-06-16 Filed Under: Events

The danger of insider threats

While some insider threats do originate from malicious or disgruntled employees, the vast majority of insider threats are likely the result of mistakes, inadequate training, or inadequate security practices.

Posted: 2025-05-13 Filed Under: Tech Notes

Outlook.com enforces email security protocols

When enforcement of Microsoft’s new policies begins in May, non-compliant messages will be routed to users’ Junk folders, but will eventually be rejected.

Posted: 2025-04-22 Filed Under: Tech Notes

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 6
  • Go to Next Page »

Macktez | 436 E 11th Street | New York, NY 10009 | 646.274.0933 | Privacy policy