The Business-Technology Weave:

February, 2011

February 28, 2011  2:09 PM

Want a Promotion?

Posted by: David Scott
business burnout, corporate ladder, employee challenge, employee promotion, how do I get promoted?, how to get a promotion, increased responsibility, IT burnout, IT promotion, should I change jobs?, when should you change jobs


You’ve been at your position for three years or more. ...

February 28, 2011  12:36 PM

Content Awareness

Posted by: David Scott
and recovery, backup and recovery, CMS, content awareness, content context, content management, content management system, data breach, data loss prevention, data management, disaster awareness, IT security, metadata, mobile workforce, preparedness


Any organization’s leaders (senior governance, management, board[s])...

February 27, 2011  12:38 PM

SSA Revisited (see prior post) – and – Content Management

Posted by: David Scott
assets management, business management, cable management, CMS, content management system, project management, resource allocation, resource management, social security administration, SSA, wire management


If you’ll bear with me, I may have a rather novel use for a Content...

February 27, 2011  9:34 AM

Lessons: Social Security Administration Facing Data Center Failure

Posted by: David Scott
best practices, business governance, Data Center, IT budget, IT governance, IT plans, IT projects, National Computer Center, NCC, NCS, PMP, project management, project management framework, project planning, project plans, project resources, social security administration, SSA


As my father said:  From some, you...

February 25, 2011  9:49 AM

The Association of Information Technology Professionals (AITP)

Posted by: David Scott
AITP, AITP Columbus, Association of Information Technology Professionals, DR, five year plan, individual action plan, IT planning, IT policy and plans, IT securty, Ohio, one year plan, ten year plan


I was introduced to a great bunch of people a few months ago,...

February 22, 2011  9:02 AM

Time to Grow Up

Posted by: David Scott
business and social networking, Facebook Post Costs Waitress Her Job, how 480 characters unraveled my career, How to Lose a Job via Facebook in 140 Characters or Less, IT and social networking, IT security, kids and social networking, Nir Rosen, social media, social media peril, social media security, social networking 101, social networking for business, waitress loses job via facebook


We’ve discussed the online perils of social networking on this blog...

February 20, 2011  4:12 PM

Security and Mounting Threats – Redux

Posted by: David Scott
acceptable use, business continuity, business planning, business plans, business policies, business policy, CMS, content management, content policy, disaster planning, IT security, Security Plan, security policies and plans, security policy, user training


I discovered an interesting article online: ...

February 16, 2011  12:55 PM

Security in a Quickening World

Posted by: David Scott
business challenge, business continuity, disaster recovery, IT challenge, IT security, mini-security officer, security officer


I don’t do this too often, but I’d like to recommend a specific whitepaper...

February 15, 2011  12:54 PM

The Next Pearl Harbor?

Posted by: David Scott
business policy, business security, cloud security, cyber attack, cyber threat, cyber training, cyber war, DAPR, disaster awareness, disaster recovery, DR, electro-magnetic pulse, electromagnetic pulse, emp, IT plans, IT policy, Pearl Harbor, preparedness and recovery, security awareness, Security Plan, security training, World War II, WWII


A   Bookmark and Share     0 Comments     RSS Feed     Email a friend

February 13, 2011  2:16 PM

The Human-Technology Weave

Posted by: David Scott
business, business-technology weave, computer support to business, dropbox, IT and business, technology, technology and health


Here on this blog we regularly consider a...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: