The Business-Technology Weave:

January, 2011

January 29, 2011  1:20 PM

Diminishing Return

Posted by: David Scott
30-day support, backup agent, backup and recovery, backup drive, backup software, comprehensive backup, computer, computer registration, computer security, disaster plan, disaster planning, disaster recovery, external drive, external hard drive, font, limited support, online support, product registration, Seagate, Seagate external drive, software registration, synchronize backup


Not too long ago I purchased a Seagate 320 Gb drive.  I...

January 25, 2011  11:53 AM

Detroit is Desperate for Money – yet delays tax revenue with incorrect bills

Posted by: David Scott
city tax, city taxes, content management, data merge, detroit tax bill, financial system, IT system, property tax


The Ombudsman for the city of Detroit reports that a mistake in the finance...

January 21, 2011  12:43 PM

107 Trillion E-mails Sent Last Year

Posted by: David Scott
acceptable use, Add new tag, blog, blog policy, blogging, blogging at work, blogs, business breach, content management, data breach, data security, e-mail policy, e-mail security, human error, pingdom, security policy, social network policy, social networking, social networking and business


Don’t Miss the Obvious: ...

January 16, 2011  11:45 AM

Government Project Passes Huge Milestone – and provides lessons to us all

Posted by: David Scott
boeing, border enforcement, border security, business management, department of homeland security, DHS, go-live, government initiatives, government project, government security, illegal immigration, immigration, janet napolitano, project management, project manager, project milestones, SBI, SBINet, secure border initiative, U.S. border, virtual border fence, virtual fence


In the wake of my two-part article earlier this month,

January 13, 2011  10:07 AM

Face Time in the Weave

Posted by: David Scott
eCulture, meetings, online meetings, the business-technology weave, virtual meetings


Increasingly, business is conducted online.  This is generally...

January 10, 2011  2:16 PM

Wikileaks Redux: Gov’t. strategy doc on preventing leaks… is leaked

Posted by: David Scott
acceptable use, business security, content management, data breach, data security, IT security, Security Plan, security policy, WikiLeaks


I can’t ignore this story. ...

January 9, 2011  3:22 PM

Systems Security, Part II: Social Security Administration meets the real world

Posted by: David Scott
IT planning, IT policy, IT ROI, IT TCO, IT TtV, social security, social security administration, systems longevity, systems security


In my last article, I spoke of systems security from a...

January 8, 2011  11:15 AM

Systems Security – Service, Success, Longevity

Posted by: David Scott
business progression, cost vs. performance, ROI, system maximization, system scalability, system security, systems longevity, systems management, systems security, TCO


In discussing security of systems, the emphasis is usually on...

January 6, 2011  12:46 PM

The human element

Posted by: David Scott
breach, business breach, business management, business progression, business security, data breach, human resources, IT security, systems security


What is the most critical element, or factor, in any...

January 5, 2011  1:36 PM

Investing in IT and business during difficult economic times

Posted by: David Scott
asset inventory, asset inventory program, asset inventory software, asset management, business investment, content management, inventory management, investing in difficult economic times, IT investment, redundancies, redundant systems, ROI, software licensing, StA, sweating the assets, TCO


Budgets are tight, routinely cut… definitely not being raised except where...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: