The Business-Technology Weave:

January, 2013


January 31, 2013  1:40 PM

Managing Multiple Projects, Part II – Traps



Posted by: David Scott
project control, project management, project management framework, project manager, project milestones, project overruns, project resources

Earlier we spoke of the effective...

January 31, 2013  12:40 PM

Managing Multiple Projects, Part I – Juggling Effectively



Posted by: David Scott
project control, project management, project management framework, project manager, project milestones, project overruns, project resources

I frequently hear from people who manage...


January 30, 2013  12:47 PM

The Multiplicity of “End Points” for Sensitive Information



Posted by: David Scott
secure transmission of data, securing data, security plans, security policies, security practices, securtiy policy

Symantec is aggressively...


January 30, 2013  12:35 PM

M2M: Machine-to-Machine, Mobile, and Your Organization



Posted by: David Scott
business projects, business protections, business safety, business security plan, business services, business strategy, business success, business support

Word comes from ABI Research that...


January 29, 2013  12:28 PM

A Transformative View to Financial Markets and Investing



Posted by: David Scott
1 year plan

It’s not just social interaction, à la...


January 28, 2013  12:21 PM

Malware Signs and Symptoms



Posted by: David Scott
1 year plan

Malware spreads through...


January 21, 2013  1:51 PM

Controlling-Malware



Posted by: David Scott
Mac malware, malicious code, malware

Beyond mere malware as a...


January 17, 2013  8:19 PM

Malware Types: Nuisance malware



Posted by: David Scott
1 year plan

Not all malware produces...


January 15, 2013  3:25 PM

Malware: Insertion and Types



Posted by: David Scott
cyber attack, cyber awareness, cyber crime, cyber security, cybercrime, cybersecurity, cyberspying, malicious code, malware

In continuing our awareness for...


January 8, 2013  12:34 PM

Cyber-crime Continued: Attacks’ methodology



Posted by: David Scott
cyber attack, cyber awareness, cyber crime, cyber security, cyber-spying, cybercrime, cybersecurity, cyberspying, cyberwar

No matter the...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: