Brands I've worked with
Current
- Splunk, Head of SEO & Web Growth Marketing
Past
- BMC Software Director of Web Strategy, Website Product Owner, Content/Editorial, SEO, A/B Testing, UX/UI
- Redmont Distilling Founder, head of marketing, head distiller, web dev for Birmingham's 1st Distillery since Prohibition - now owned by Charles Barkley
- Dr. Louis Ignarro marketing, SEO, social media, website management & consulting for 1998 Nobel Laureate in Medicine for more than a decade
- Sam's Club developed mobile QR-based in-store website for Sam's Club's private label nutrition brand
- LakeHomes.com SEO for the #1 lake homes website in the US
- House Plant Collective Web design, SEO, business strategy consulting
- Beltone Audiology web marketing, web dev, SEO
- Beltone Dallas Fort-Worth web marketing, web dev, SEO
- Univision SEO strategy
- National, Alamo, & Enterprise Rental Car SEO strategy
- Extreme How-To SEO, UX, Web Dev for a leading how-to construction website
- Anderson Canyon, Big Sur marketing, web dev, management of property, construction, rentals, weddings, events, photoshoots
- Gratsi Wine SEO, digital & business strategy consulting
- Healthy Living Made Simple helped launch the most widely distributed health & wellness magazine in the US
- Glen Oaks Big Sur email, website, & social media work for a Big Sur motel & glamping hotspot
- Frank Lloyd Wright House in Alabama volunteer website work for Alabama's only Frank Lloyd Wright house
- Health is Wealth developed and managed multilingual ecommerce website to support a health and wellness book from Dr. Ignarro
- Pittman, Dutton, & Hellums Attorneys At Law paid search, SEO, web marketing
- About Face Skincare SEO consulting
- Hilton Labs ecommerce & SEO
- Earth Medicine Hemp SEO & web marketing consulting
- Drink Ten Plus SEO & web marketing consulting
- Operation USA web marketing consulting
Topics I Write About
- Using Query Strings to Enable Redirect Analytics
- Optimizing On-Site Search for B2B Websites
- Product Support Pages for SEO, UX, and beyond
- Using 404s for an Awesome Brand Experience
- The Strategic Value of Reverse Proxies for Enterprise Websites
- Why To Release Your "Annual Report" in Nov/Dec (short)
- Using Customer Complaints as Prompts for Webpage Content
- Your Marketing is Showing
- Why to Embed PDFs (short)
- Twyman's Law & The Sagan Standard for Web Analysts & A/B Testers (short)
- The Joy of Internal Stakeholder Surveys
- Solving the Reproducibility Crisis in A/B Testing
- Redirect Management: An SEO Beginner’s Guide
- Project Prioritization Frameworks for Web Teams
- How to Use SEO Traffic to Make the World a Better Place
- How to Use Regex for SEO
- Durable URLs for SEO: How, When & Why to Use Them
- How to Address Security Risks with Robots.txt Files
- B2B Content Ideas to Generate Links & Industry Influence
- SEO Strategies for Knowledge Base Self-Serve Customer Success
- When (& When Not) to Write Meta Descriptions
- How to Find Subject Matter Experts Using Slack & Other Web Communities
- Using The Jobs To Be Done (JTBD) Framework For SEO Content
-
IT, Software Engineering, DevOps, Security
CIO.com
- How application-specific integrated circuits are powering the future of IT today
- Big Iron: How IBM Z mainframes fit in the digital age
- Reverse hybrid cloud: how the cloud is moving on-premises
- Why hybrid integration platforms are key to multi-cloud management
- Linux vs. z/OS for Mainframe: What’s The Difference?
- What is Database Functional Dependency?
- What is Application Performance Management? APM Explained
- ITIL Service Portfolio Management and Its Benefits Explained
- Using “Code Smell” for Better Software Development
- 5 Steps for Better IT Stakeholder Management and Communications
- RED Monitoring: Rate, Errors, and Duration
- Machine Customers: A Brief Introduction
- DevOps Conferences & Events 2024: Complete Guide
- Metrics to Monitor for AWS (ELB) Elastic Load Balancing
- What is Cardinality? Cardinality Metrics for Monitoring and Observability
- Splunk Cheat Sheet: Query, SPL, RegEx, & Commands
- The Best Security Conferences & Events 2024
- Dogfooding: AKA drinking your own champagne, or eating your own ice cream
- AWS re:Invent 2023: Your Complete Guide [Updated]
- IT Spending & Budgets: Trends & Forecasts 2024
- Democratized Generative AI: Revolutionizing Knowledge Work
- The Industrial Internet of Things: A Primer
- An Intro to Natural Language Processing (NLP)
- The Internet of Medical Things (IoMT): A Brief Introduction
- Google Dorking: An Introduction for Cybersecurity Professionals
- What is Multicloud? An Introduction
- The Importance of Microservices
- What is GitOps: The Beginner's Guide
- CI/CD & DevOps Pipelines: An Introduction
- AR vs VR: What's The Difference?
- The Digital Transformation Beginner's Guide
- Value Stream Management: A Brief Explainer
- Customer Data Analytics: An Introduction
- What Is OpenTelemetry? A Complete Introduction
- What is AIOps? AIOps Explained
- Customer Data Management (CDM): An Introduction
- Cyber Hygiene: Introduction and Best Practices
- What is Predictive Modeling? An Introduction
- IT Operations Management (ITOM): The Basics
- Microservices Load Balancing: Navigating the Waves of Modern Architecture
- What Is ITSM? IT Service Management Explained
- Process Mining: A Brief Introduction
- Server-Side Rendering: Benefiting UX and SEO
- What is Observability? An Introduction
- OKRs, KPIs, and Metrics: Understanding the Differences
- RSA Conference 2024: The Complete Guide
- Availability: A Beginner’s Guide
- API Monitoring: A Complete Introduction
- What is Infrastructure as Code? An Introduction to IaC
- Blockchain & Crypto Conferences 2024: The Complete Guide
- Website Performance Monitoring: An Introduction
- Virtualization: A Beginner's Guide
- Software Testing: A Beginner's Guide
- Incident Response: A Brief Introduction
- Software Development Lifecycle (SDLC): An Introduction
- Predictive Maintenance: A Brief Introduction
- Cybersecurity: An Introduction & Beginner's Guide
- Container Orchestration: A Beginner's Guide
- CapEx vs OpEx for Cloud, IT Spending, & More
- 2023 State of DevOps
- Black Hat & Def Con: 2023 Review & 2024 Preview
- Google Cloud Next: 2023 Review & 2024 Preview
- Splunk Use Cases
- Database Monitoring: Basics & Introduction
- What is Server Monitoring? A Beginner's Guide
- Storage Monitoring: A Brief Introduction
- Root Cause Analysis: A Beginner's Guide
- Cloud Migration Basics: A Beginner’s Guide
- Network Configuration Today: The Ultimate Guide
- What Is Adaptive Thresholding?
- Source Code Management: An Introduction
- Service Performance Monitoring Explained
- What is Security Automation?
- Real-Time Data: An Overview and Introduction
- KPI Management: A Complete Introduction
- The Serverless Functions Beginner's Guide
- Service Delivery for IT and Business
- Service Assurance for IT, Telecom, & Cloud
- IT Operations Analytics: An Introduction
- Change Management in IT, ITIL, and ITSM
- Infrastructure Security 101: An Introduction
- Infrastructure Analytics: A Beginner's Guide
- IT Event Analytics: The Complete Introduction
- CloudOps: An Introduction to Cloud Operations
- Distributed Tracing Best Practices for Microservices
- Kotter’s 8 Steps for Leading Change in Organizations
- DevOps Release Management Concepts & Best Practices
- IT Salaries in 2023: Trends, Roles & Locations
- Common Event Format (CEF): An Introduction
- What’s An SRE? Site Reliability Engineer Roles & Responsibilities
- Top 5 Incident Response Metrics with Real-World Examples & Impact
- Using Splunk for SEO Log File Analysis
- Machine Data: An Introduction
- Splunk MINT: A Complete Introduction
- Splunk Light: An Introduction and Beginner's Guide
- Is Blockchain Dead? No. Is Web3 Dead? Maybe.
- The CISO Role: What Does a Chief Information Security Officer Do?
- Network Security 101: A Brief Intro to Securing Networks
- Data Management Explained: Concepts & Approaches for Managing Data
- What’s Cloud SIEM? Security Incident & Event Monitoring in the Cloud
- Continuous Monitoring: How It Works & How To Get Started
- Vulnerability Management: The Beginner's Guide
- Cloud Network Monitoring: An Introduction
- Using Threat Intelligence To Advance Your Security Posture
- Network as Code Explained: How Ansible & Automation Support Agile Infrastructure
- Trunk-Based Development vs. GitFlow: Which Source Code Control is Right for You?
- Incident Review & Postmortem Reports: 8 Best Practices
- What Is TBD? Trunk-Based Development & Its Role in CI/CD
- Status Pages: The Ultimate Guide
- The Very Best Blockchain & Web3 Podcasts
- Production Environment Review: The Ultimate Checklist
- When and Why To Adopt Feature Flags
- Best DevOps Books: The Definitive List
- Content Delivery Networks (CDNs) vs. Load Balancers: What’s The Difference?
- The Bulkhead and Sidecar Design Patterns for Microservices & Incident Resolution
- CVE Severity & How To Respond To CVEs in Builds
- Kubernetes 101: How To Set Up “Vanilla” Kubernetes
- What Is eBPF? A Guide To Improved Observability & Telemetry
- Network Performance Monitoring vs. Application Performance Monitoring: What’s The Difference?
- Common Anomaly Detection Challenges & How To Solve Them
- Application Performance Monitoring (APM) Metrics for Modern Apps
- State of Kubernetes 2023: Report Roundup
- Monitoring Windows Infrastructure: Tools, Apps, Metrics & Best Practices
- Data Center Security Explained: Concepts & Standards
- Threat Modeling: The Ultimate Guide
- NoOps Explained: How Does NoOps Compare with DevOps?
- Splunk Tutorial: Getting Started Using Splunk
- Common DevOps Roles and Responsibilities
- How To Prepare for a Site Reliability Engineer (SRE) Interview
- IT Event Correlation Best Practices
- Using the Density Function to Create Adaptive Thresholding with Splunk
- Time Series Forecasting Use Cases and Anomaly Detection
- Kubernetes Incident Response Best Practices
- CI/CD & DevOps Pipeline Analytics: A Primer
- Continuous Performance Management Basics
- Cloud Log Management Strategy & Best Practices
- Using AI & ML for Application Performance (APM)
- On-Premises Application Monitoring: An Introduction
- Kubernetes Monitoring: An Introduction
- Synthetic Monitoring for CI/CD Pipelines
- CI/CD Pipeline Monitoring: An Introduction
- How to Build a Culture of Observability
- VM Monitoring: A Beginner's Guide
- AWS Monitoring: A Brief Introduction
- SRE vs DevOps: What’s The Difference?
- API Testing vs Monitoring: What's The Difference?
- API Testing: An Introduction
- Kubernetes Logging: Introduction & Challenges
- API & HTTP Headers: How to Use Request Headers in API Checks
- SRE Metrics: Four Golden Signals of Monitoring
- How Data Center Colocation Works
- Cloud Governance vs Cloud Management: What’s the Difference?
- What Is TOGAF®? A Complete Introduction
- Application and Software Modernization: Concepts, Pros/Cons & Best Practices
- Data Quality Explained: Measuring, Enforcing & Improving Data Quality
- How & Why To Become a Software Factory
- The 6 Best Mainframe Podcasts for Mainframe Pros
- Wardley Value Chain Mapping: What Is It & How To Create Yours
- What Is XaaS? Everything as a Service Explained
- Introduction To Web Scale IT
- Industry 4.0 & The Fourth Industrial Revolution
- Error Budgets Explained: Risk & Reliability in One Metric
- Get Started with ITAM: IT Asset Management Explained
- The Scaled Agile Framework (SAFe): What To Know and How To Start
- What Is Enterprise Service Management? (ITSM for the Rest of Us)
- IT Automation vs Orchestration: What’s The Difference?
- Azure Certifications: An Introduction
- GCP Cloud Architect Certification: An Introduction
- IT Security Certifications: An Introduction
- Data Science Certifications: An Introduction
- Top Docker Certifications To Earn Today
- Entry-Level IT Certifications: A Primer
- Cloud Certifications: A Beginner’s Guide
- Certified Information Systems Security Professional (CISSP): An Introduction
- MongoDB Certifications: An Introduction
- Certified Information Systems Auditor (CISA): An Introduction
- Top Agile Certifications
- State of SecOps in 2021: A Report Roundup
- State of IT Monitoring: A Report Roundup
- State of the Mainframe in 2021
- State of Kubernetes: A Report Roundup
- State of Java in Programming Today
- The State of Incident Management
- The State of Containers Today: A Report Summary
- The State of SRE
- State of the CIO
- State of Serverless Today
- State of Cloud Security Today
- The Ultimate RFP Guide: Steps, Guidelines & Template for Requests for Proposals
- Technical Debt: The Ultimate Guide
- Building an Innovation Culture
- Succeeding with an Innovation Stack
- What it means to be Keeping The Lights On (KTLO)
- An Introduction to Micro Frontends
- Why We Need Objectives and Key Results (OKRs)
- What is the Platform Economy?
- An Introduction to Scalability
- What Is MLOps? Machine Learning Operations Explained
- The Basics of the Innovation Spin-in
- What is an Innovation Outpost?
- Continuous Operations Explained
- Digital Platforms: A Brief Introduction
- The Importance of Digital Process Automation (DPA)
- What is a Digital Transformation Framework?
- Digital Twins and the Digital Twin of an Organization (DTO)
- The Empowered Edge: An Introduction
- Continuous Innovation: A Brief Introduction
- An Introduction To Distributed Clouds
- What is the Intelligent Digital Mesh?
- Intelligent Business Process Management Suites (iBPMS): The Basics
- Virtual Desktop Infrastructure (VDI): A Brief Intro
- What is Spaghetti Code (And Why You Should Avoid It)
- What is Security Threat Modeling?
- The VSEM (Vision, Strategy, Execution, and Metrics) Framework Explained
- An Introduction to Vulnerability Reports
- What is a Virtual Network?
- An Introduction to Self-Driving Networks
- Defining Project Scope and Scope Creep
- The Importance of SOLID Design Principles
- What Is Shadow AI?
- What is Behavior-Driven Development (BDD)?
- Blue-Green Deployment: An Introduction
- What is the Canary Deployment & Release Process?
- Why Bring Your Own Enhancement (BYOE) Is Trending
- The Basics of Business Continuity Management (BCM)
- What are Cascading Failures?
- What is Workload Automation? WLA Explained
- What is Server Automation? Server Automation Explained
- Conway’s Law: A Primer
- Enabling the Citizen Data Scientists
- Collective Intelligence Benchmarking (CIB): An Introduction
- What Is a Citizen Developer?
- Cassandra Introduction: What is Apache Cassandra?
- What is CVE? Common Vulnerabilities and Exposures Explained
- What is Employee Experience Management?
- An Introduction to Operations Runbooks
- What Is Hyper Automation?
- Understanding OpenTracing, OpenCensus, and OpenMetrics
- Patch Management: A Brief Introduction
- IT Automation: How It Works & Why You Need it
- Hybrid Digital Infrastructure Management (HDIM): An Introduction
- A Primer on Endpoint Detection & Response (EDR)
- What Is Security Orchestration, Automation, and Response (SOAR)?
- What is Sprint Zero? Sprint Zero Explained
- Java Developer Roles & Responsibilities
- DevOps Engineer Roles & Responsibilities
- IT Security Vulnerability vs Threat vs Risk: What are the Differences?
- An Introduction to Security Debt
- What is Security Information and Event Management (SIEM)?
- Security Automation: A Beginner’s Guide
- Runbook Automation (RBA): An Introduction
- Workload Automation (WLA) vs Robotic Process Automation (RPA): What’s The Difference?
- What is Security As Code?
- A Primer on Service Level Indicator (SLI) Metrics
- How to Write an SOP (Standard Operating Procedure)
- Introduction to Service Request Catalogs
- AWS Sagemaker vs Amazon Machine Learning
- ACID Explained: Atomic, Consistent, Isolated & Durable
- What is Not Invented Here Syndrome?
- What is Systems Programming?
- CIO Leadership Styles
- An Introduction to Database Reliability
- How Complex Systems Fail: A Synopsis
- What Is Data Normalization?
- DevOps Feedback Loops: An Introduction
- What is the Open Compute Project (OCP)?
- AWS Cloud Design Patterns
- Software Quality Metrics Explained
- The Keys to IT Cost Management
- DevOps for Enterprises
- What is a Database Reliability Engineer (DBRE)?
- AWS Snowball Edge: An Introduction
- What Is Data Governance? Why Do I Need It?
- ITSM Assessments: An Introduction and How To Get Started
- ISO/IEC 20000-1 vs 20000-2 vs 20000-3: What’s The Difference?
- Creating a Strong Service Desk Culture
- I&O Organizations Defined: Roles, Structures, and Trends
- Service Desk and Support Manager: Role Description and Responsibilities
- Using Customer Satisfaction (CSAT) as a Service Desk Metric
- Using Percent Resolved Level 1 Capable as a Service Desk Metric
- Using an Agent Satisfaction Survey for a Service Desk Metric
- How and Why to Run Incident Drills
- IT Project Prioritization: How to Decide What to Work on and in What Order
- CMMI: An Introduction to Capability Maturity Model Integration
- 18 Must-Read Digital Transformation Books
- What Is TQM? Total Quality Management Explained
- What is Integrated Service Management?
- What is Business Service Management?
- IT Chargeback vs Showback: What’s The Difference?
- Digital Forensics and Incident Response (DFIR): An Introduction
- Introduction to Digital Outcome Management
- SPOC: Why a Single Point of Contact is Critical for IT Support
- Leading vs Lagging Indicators: What’s The Difference?
- Introduction to the Enterprise Service Desk
- Changes Types: Standard vs Normal vs Emergency Change
- The Project Management Office (PMO) & Its Role in IT Organizations
- Introduction to ECAB: Emergency Change Advisory Board
- What is YASM? Yet Another Service Model Explained
- Introduction to Business Process Management (BPM)
- What is Technology Business Management? TBM Explained
- What is MTTA? Mean Time to Acknowledge Explained
- Introduction to Cynefin for ITSM
- What is Business-Capability Mapping?
- Introduction to EACOE Framework
- Introduction to BIZBOK
- Introduction to Federal Enterprise Architecture (FEA)
- Introduction to ISO/IEC 20000
- Introduction to Intelligent Swarming
- Introduction to Zachman Framework
- Introduction to Knowledge Management
- Introduction to Identity and Access Management
- Introduction to IT Event Management
- IT Capacity Management & Planning
- The IT Skill Gap Explained
- Container Management Platforms: Which Are Most Popular?
- Whatever happened to SMAC: Social, Mobile, Analytics, and Cloud?
- Is Continuous Integration to Continuous Deployment a Progression – or Not?
- Db2 12 for z/OS: An Introduction
- SaaS vs PaaS vs IaaS: What’s The Difference & How To Choose
- Introduction to IT Self-Service and Self-Service Portals
- IT Service Catalogs: An Introduction
- DevOps Metrics and KPIs
- DevOps Interview Questions
- The Role of Virtualization in DevOps
- The Role of Cloud in DevOps
- The Role of Agile in DevOps
- What is a DevOps Toolchain?
- Scalar Functions in Db2 12
- SQL Error Return Codes in Db2 12
- SQL Positive Return Codes in Db2 12
- IBM Utilities in Db2 12
- Aggregate Functions in Db2 12
- Updatable Catalog Statistics in Db2 12
- XML Schema Repository Tables in Db2 12
- Catalog Tables in Db2 12
- Exceptions in Db2 12
- IFCIDS in Db2 12
- Predicates in Db2 12
- Get Diagnostics in Db2 12
- REXX SQLCA in Db2 12
- SQL Communication Area (SQLCA) in Db2 12
- Db2 Limits in Db2 12
- Bind Parameters in Db2 12
- DSNZPARMs in Db2 12
- Db2 Input Tables in Db2 12
- Explain Tables in Db2 12
- SQL Control Statements in Db2 12
- Commands in Db2 12
- Language Elements in Db2 12
- How to Read IBM® Syntax Diagrams for Db2 12
- Queries in Db2 12
- Table & Row Functions in Db2 12
- A Brief History of DevOps
- DevOps Job Titles, Roles, & Responsibilities
- What is Continuous Testing?
- Managing Containers and Code for DevOps
- Source and Version Control in DevOps
- Orchestration in SDLC for DevOps
- Configuration Management in DevOps
- Introduction to DevOps Architecture
- Application Performance Management in DevOps
- Tips for DevOps Organization Structure
- 5 Great IT Governance Books
- What are Accidental Software Pirates and What Does It Mean to “True-Up”?
- A Regression Testing Beginner’s Guide
- Java on the Mainframe: z/OS vs Linux
- Application Developer Roles and Responsibilities
- Rise of Data Centers and Private Clouds in Response to Amazon’s Hegemony
- Why Business Value is Key to IT Success
- How Customer Experience Strategy is driven by IT
- What is Ransomware as a Service? RaaS Explained
- Vulnerability Assessments vs Penetration Testing: What’s The Difference?
- 3 Critical End User Experience Metrics for Application Performance
- BMC’s TrueSight Capacity Optimization Reviews & Ratings: The Ultimate Roundup
- Data Lifecycle Management (DLM) Explained
- Azure Compliance: 3 Keys for Getting Started
- REST vs CRUD: Explaining REST & CRUD Operations
- What is Code Refactoring? How Refactoring Resolves Technical Debt
- Enterprise Architecture Frameworks (EAF): The Basics
- Software License Management (SLM) Explained
- IT Operating Models: 4 Examples for Digital Enterprises
- How to Write Test Cases for Software
- Getting Started with Governance and Compliance for AWS
- SIEM vs Log Management: What’s the difference?
- What Are OLAs? Operational Level Agreements Explained
- What is Enterprise Output Management? EOM Explained
- What is Parallel Testing? Parallel Testing Explained
- What is an IT Steering Committee?
- HIPAA’s Security Rule: The Beginner’s Guide
- HIPAA Introduction and Compliance Checklist
- Network Engineer vs Network Administrator: Roles, Responsibilities, and Job Descriptions
- SRS: Software Requirement Specifications Basics
- Using a Known Error Database (KEDB)
- Cloud Service Brokerages: How CSB’s Fit in a Multi-Cloud World
- Real User Monitoring vs Synthetic Monitoring: What’s The Difference?
- N-Tier Architecture: Tier 2, Tier 3, and Multi-Tier Explained
- What Is “Jobs-as-Code”?
- What’s Docker Monitoring? How to Monitor Containers & Microservices
- Continuous Delivery vs Deployment vs Integration: What’s the Difference?
- Mainframe MIPS: An Introduction
- Is ITIL Dead? No. A Persistent Myth Explained and Busted
- IT Spending: 3 Trends to Watch in 2018
- DevOps Metrics & KPIs That Enterprises Should Be Tracking