John Hickey is the cofounder of Tech 2 Success, an IT and Operations consulting firm that specializes in operations improvement using technology. John provides enterprise level leadership experience to companies of all sizes considering cloud hosting, systems implementations, lean process improvement, sales coaching, web development, system integrations and e-mail and Internet marketing. To contact John to help with your project or opportunity, visit Tech2Success.com.
John discusses how an attempt to take a day with an empty calendar backfired. He applies some of the teachings from The 7 Habits of Highly Effective People course by Stephen Covey and the book Getting Things Done by David Allen to create a plan for a productive work week. These concepts, adjusted for our…
This episode is a discussion on some of the very cool innovations from the 2019 NRF (National Retail Federation) Show. John discusses how Alibaba stole the show from the big brands on the main floor, how generic versions of AmazonGo stores will have a hard time deploying, due to operations, not technology and how some…
This episode is an introduction to the podcast and the host, John Hickey. After a brief background, John introduces listeners to his business and personal history and reviews the goals of the podcast. For anyone who is a manager, business owner, self employed, coaching youth sports, struggling with work life balance. This is for you.
Queens, NY- September 19, 2018 – Tech 2 Success, LLC, announced today that it executed a merger agreement to acquire NY Web Consulting LLC, a provider of Internet Marketing services, web site design, S.E.O. and social media marketing services, also based in Queens, NY. The addition of the business, serving customers in varying industries, is…
As a business owner and salesman, I am less guarded than many others may be when letting my cell phone number be published to the public. This makes me very accessible for my clients and prospects however it also gets my number added to many lists for spam calls. Multiple times per day I receive…
Most of us are very aware of certain challenges in our business. We just can’t seem to overcome them because we have a business to run all day. Who has enough time to focus on fixing a problem that has been part of the business for years and we’ve learned to deal with it? I…
PhishMe Research claims that 91% of cyber attacks begin with a phishing e-mail! Cyber criminals use social engineering to manipulate users to release either sensitive information or provide access to company systems. The key here is that it take our own interaction to allow hackers to access our data. WE LET THEM IN! Hackers use…
No matter how secure you think your server in your office is, there is no chance that it is as secure as a server in the cloud. Small business IT teams generally do not have the exposure to enterprise level security required to combat cyber-threats and proactively prevent them. For this reason alone, it makes…
The subject of cyber security has recently been on the front of everyone’s mind. When discussing cyber security, a broad range of topics need to be considered. We’ve done so much over the last 5 years to transform from soda salesmen who only take cash to value added service providers who take whichever form of…
Often, employers know that an employee is not a good fit in the organization. Reasons for this can range from performance, cultural fit, misplaced in a role, and so on. If you are a good manager, you’ve exercised candor with this employee and they know that they are not a right fit for the job…