Profile cover photo
Profile photo
Tom Connell
55 followers -
Father, veteran, christian, and lifelong scouter; entrepreneurial leader, manager, team builder, domestic preparedness and emergency response services expert turned technology evangelist
Father, veteran, christian, and lifelong scouter; entrepreneurial leader, manager, team builder, domestic preparedness and emergency response services expert turned technology evangelist

55 followers
About
Tom's posts

Post has attachment
Hi Circle.  My daughter Beth started a DIY YouTube channel that focuses on herbs and infusions and other earthy crunchy topics :)  Beth Graduated last year as a culinary student from Monty Tech and is currently working on a Business Management Degree.  She is using the You Tube Project and some contract baking to keep her hand in the trade while she studies the business end.   I may be biased but I think these 5-9 minute vignettes are pretty good and getting better with each installment.  If you have a few minutes please check them out.  "Likes" and comments are very welcome.  Thanks for your support.  http://youtu.be/HIri3flJzR0

Post has attachment
It's been a while since I posted to "The digital you".  Thank you to all the people who have frequented the blog.  As always, comments, re-posts, and social networking "likes: are welcome and appreciated.  If you re-post please link back to the blog site

Post has attachment
Thanks for following the blog!  I know this latest entry has been along time coming.  I will try to pick the pace back up.  As always comments are welcome as are your "likes" "+1s" and re-posts.

Post has attachment

Post has attachment
After some delays due to vacation I have posted part one of my two part essay on the use of mobile computing devices at crime scenes.  At first glance it may seem that I am drifting from my Identity Management core but this is not the case.  In order for this technology to be effectively employed a strong, digitally protected identity must be utilized.  This is yet another example of practical use of strong managed identities in the main stream emergency services and law enforcement communities.  I will publish part two in a few days.  As always your comments are appreciated.  Please be sure to "like, endorse, and circulate"  this essay using your favorite social networking tool if you find it to be interesting and informative.  

Post has attachment
Sorry for the delay in getting out the second half of this essay.  Please feel free to comment in the blog site.  As always I really appreciate the "likes" "+1" and other feedback tools.

Post has attachment
Sorry for the delay in getting out this latest installment in the "Twelve Points" series.  I have figured out why bloggers tend to write short little posts.  I am sure some of you are saying I am as long winded in my posts as I am in person!  I want to thank all of you who are following the "Middle Age Eagle Scout" blog.  Take a look at the bottom of the posts you can "follow" "like" "+1" etc as well as comment.  It is a real motivator to see names and numbers and comments also!  If you have a few minutes please let me know what you think.

Post has attachment
I would like to thank everyone who has been following "The Digital You" blog.  Please feel free to comment within the blog.  I have received several emails but your comments are worth sharing and may spark some meaningful discussion.  I appreciate the  Google +1's, "likes" and re-posts.  Keep them coming

Post has attachment
I meant to post this last night so I apologize to those of you I told to check at that time.  This is the third installment of the twelve part  "Scout Law" series where I take a look at what it means to be Trustworthy, Loyal, Helpful, Friendly, Courteous, Kind, Obedient, Cheerful, Thrifty, Brave, Clean, and Reverent, in America today. 

Post has attachment
This is the concluding post for this topic.  The complete paper is also available for download from this and any of the previous posts.  I do not expect to start anything new during the 4th of July week.  Next week starts a series titled "Possession is nine tenths of the law - Why PKI should be used to address the digital rights management question"  If you buy music, books, or any other media online I think you will find this paper interesting.  Happy 4th of July!
Wait while more posts are being loaded