June 30, 2013  10:22 AM

Thoughts on the Human “Machine,” Multi-tasking, and Resources



Posted by: David Scott
HR, human error, human resources, human-technology weave, redundant systems, resource allocation, resource management, responsibilities

In the discussion of multi-tasking, there was a natural discussion of resources:  Time being a very important resource; People being another.

However, someone made some potent observations, essentially saying that there is no such thing as ‘multi-tasking,’ being that people are at...


June 29, 2013  6:29 PM

Multi-Tasking: Possible? Part II



Posted by: David Scott
1 year plan

When 'multi-tasking,' we’re essentially giving the appearance of handling several things in any given allotment of time.  You can only really do this three ways: - Do things sequentially (say, in the course of the hour, day, week, project, etc.) - Do things by jumping back-and-forth (often...


June 29, 2013  10:04 AM

Multi-Tasking: Possible? Part I



Posted by: David Scott
project control, project management, project manager

A conversation recently had people asking: -  Is it really possible to 'multi-task'?  (Is there truly such a thing?) -  If possible, what does one do to most effectively ‘multi-task’? If one is to be technically correct here, there is no such thing as multi-tasking. ...


June 27, 2013  9:08 AM

SMB: Going Mobile?



Posted by: David Scott
mobile apps, mobile challenge, mobile development, mobile policy, mobile readiness, mobile risk, mobile security, mobile technology, mobile workforce

More and more workplace environments are either “going mobile” (planning, developing, implementing, and making effective use of mobile apps and associated devices), or contemplating such a move. It’s certainly becoming necessary, given the competitive nature of business, and the explosion...


June 26, 2013  11:57 AM

NSA, Surrveillance, and New Parameters for Business Liability Coverage



Posted by: David Scott
acceptable use policy, acceptable use training, securing data, security plans, security policies and plans

docThe National Security...


June 17, 2013  1:20 PM

Concerned About Gov’t. Snooping? There’s an app for that



Posted by: David Scott
cyber awareness, cyber security, cyber security and government, cyber training, data accessibility, data encryption, data legislation, data privacy, data protection, data security, decryption, e-mail breach, e-mail security

PadlockRegardless of the...


June 16, 2013  3:22 PM

An Aggravate of Agencies Advises: Banks, spec up your security NOW



Posted by: David Scott
bank breach, bank PIN numbers, bank security

CyberBanks are being warned with...


June 9, 2013  12:09 PM

Can You Hear Me Now? Gov’t. Surveillance and ‘Metadata’



Posted by: David Scott
securing data, security officer, security policies, security practices, security prism, securtiy policy, sensitive information

The NSA Campus at Ft. Meade MD_credit

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 6, 2013  1:52 PM

Secret E-mail Accounts: How many does your organization have?



Posted by: David Scott
acceptable use policy, acceptable use training, content liability, content management policy, content security, e-mail, e-mail administration, e-mail breach, e-mail management, e-mail policy, e-mail security

EnvelopeRecent high-profile...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: