The Business-Technology Weave:

1 year plan


October 8, 2012  1:34 PM

Applications and Inefficiency: Smash ambiguity!



Posted by: David Scott
1 year plan

Image of ambiguous menu A...

September 30, 2012  4:21 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
1 year plan

The Washington Post recently reported that foreign hackers disabled a pump at an Illinois water plant last week, according to the preliminary state report. If the source of the attack is confirmed as foreign, it will be the first known attack on a critical public (that is, societal) support:...


September 24, 2012  10:56 AM

Part II: When IT and Business Collaborate, Selling (and buying) is Key



Posted by: David Scott
1 year plan

[If you haven't read Part I, please see that post...


September 20, 2012  10:57 AM

When IT and Business Collaborate, Selling (and buying) is Key



Posted by: David Scott
1 year plan

I often hear complaints from various business teams, IT...


August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


August 31, 2012  2:31 PM

Crucial Considerations when Going Mobile, Pt. III – Tech Support



Posted by: David Scott
1 year plan

In continuing our series, as companies consider mobile enablements, or an increase to a measure of already existing mobile dependency, there are a wide range of issues that must be addressed. Recognize that a measure of user-initiated troubleshooting is imperative.  Certainly as concerns formal...


August 31, 2012  2:29 PM

Crucial Considerations when Going Mobile, Pt. II – Training



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training

Most organizations already have a schedule of regularized training – both for core, mission-critial, applications as they undergo revision and update - and in accommodating new apps and business methods. Whether incorporating mobile as a formal addition to your business enablements, or in...


August 31, 2012  2:27 PM

Today’s Business: Crucial Considerations when Going Mobile, Pt. I



Posted by: David Scott
1 year plan

Business is on the move today:  Users are long past the days when accessing the enterprise – that is, information resources such as apps, processing, and content – entailed sitting at a desk, inside the four walls of a business entity, with a desktop computer.  (As a matter of fact, the...


August 29, 2012  3:37 PM

Shooting for a Better IT-Business Relationship? Don’t miss the target…



Posted by: David Scott
1 year plan

A recent article I was reading stated that “the...


August 26, 2012  11:13 AM

BYOD is Yielding to CoIT: The Consumerization of IT, Part II



Posted by: David Scott
1 year plan

[If you haven’t seen the first part of this article, please click here for Part I.]


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: