The Business-Technology Weave:

May, 2010


May 28, 2010  1:27 PM

WorkFors: Those to Whom you Report



Posted by: David Scott
business management, HR, human resources, IT Wars, personnel management, the business-technology weave

  

We’ve discussed WorkOns and WorkWiths – let’s wrap this series up with...

May 27, 2010  8:02 AM

TechnoShines, TechnoFinds and TechnoBinds



Posted by: David Scott
business management, eCulture, HR, IT Wars, the business-technology weave

   

You will find three kinds of people in the WorkWith group. ...


May 22, 2010  1:01 PM

The WorkWith: Squeezed in the Middle



Posted by: David Scott
business management, human resources, IT Wars, people management, workons, workwiths and workfors

As planned, let’s return to our discussion as originally begun on May 7th, Managing People in the Weave.  As necessary, review that post and its follow-ons...


May 20, 2010  1:55 PM

Insecurity, Part III: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business policy, business risk, business security, data breach, data exposure, data security, data theft, IT policy, IT security, IT Wars, malware, the business-technology weave

[As necessary, please see the first article...


May 16, 2010  10:07 AM

Insecurity, Part II: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, ID theft, IT security, IT Wars, security policy, the business-technology weave

 

Continuing with our exposure of services and associated liabilities from the other day: 


May 15, 2010  9:20 AM

Insecurity: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, IT security, IT Wars, security policy, the business-technology weave

 

I’ve been doing a little work for a big State agency.  By “big,” I mean big budget, large number of...


May 13, 2010  6:13 AM

You Say “Business Security,” I Say “IT Security”…



Posted by: David Scott
business management, business security, data breach, data privacy, identity breach, identity theft, IT security, IT Wars, organizational security, the business-technology weave

 

You say To-MAY-to, I say To-MAH-to…  one thing’s for certain:  When it comes to organizational security we...


May 13, 2010  5:53 AM

WorkOns; WorkWiths and WorkFors: Shifting of Class and the Power Prism



Posted by: David Scott
business management, IT Wars, organizational heirarchy, the business-technology weave

  

As we consider our WorkOns, WorkWiths, and WorkFors, there will be situations...


May 9, 2010  10:15 AM

WorkOns; WorkWiths and WorkFors: A Quick Consideration of Class



Posted by: David Scott
business challenge, business management, business solutions, IT challenge, IT solutions, the business-technology weave

 


May 7, 2010  9:20 AM

Managing People in the Weave, Part II: WorkOns; WorkWiths and WorkFors…



Posted by: David Scott
business challenge, business management, IT challenge, the business-technology weave

 

Let’s provide the definitions for the classes of folks we talked about in the prior post...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: