Kim Jenkins
Throughout Kim’s tenure at WVNET, she has witnessed numerous transformations in the computing environment and was promoted to NOC Supervisor, a position she continues to hold.
Throughout Kim’s tenure at WVNET, she has witnessed numerous transformations in the computing environment and was promoted to NOC Supervisor, a position she continues to hold.
If you’ve searched “WordPress ADA compliance plugin,” you’re likely looking for a fast, affordable way to make your website accessible. And we get it—WordPress users love plugins because they’re convenient, usually low-cost, and easy to install. But here’s the hard truth: There is no plugin that can make your WordPress website ADA compliant.
The KnowBe4 Threat Research team has observed a sustained increase in the use of Scalable Vector Graphics (SVG) files to obfuscate malicious payloads.
Ready to unlock the future? Dive into the electrifying work of cybersecurity at Marshall University’s exclusive Cyber Experience.
To celebrate the 5th anniversary of my super-popular UI & UX Micro-Tips, I’ve brought together some of the most timeless tips, and bundled them in an 8-Bit format. Why? Just because 🙂
We invite you to view our Winter newsletter
Executive Director’s Note
Department Updates:
WVSTC Update, Human Resources,
Business and Finance, Client Services,
Distance Learning, Banner & DegreeWorks,
Development Team, Telecom, Systems,
WVNET Staff Reads
You’re Invited to Present at the WVSTC 2025!
A quarterly journal of science and research, Neuron, highlights ongoing scientific work happening at higher education institutions throughout the Mountain State. The magazine is funded through the National Science Foundation’s (NSF) Established Program to Stimulate Competitive Research (EPSCoR).
AI is advancing at lightning speed, but it’s also raising some big questions, especially when it comes to security. The latest AI making headlines is DeepSeek, a Chinese startup that’s shaking up the game with its distilled cost-efficient, high-performing models. But it’s also raising red flags for cybersecurity pros.
Your Android device has a range of accessibility features. Read the entire article on the androidpolice.com blog.