August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security

Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...

October 24, 2010  12:04 PM

A Model for Tearing the Weave: Starbucks, Safety and Security – Pt. II

Posted by: David Scott
accounting, best business practice, customer courtesy, customer service, money, Starbucks

Here is my letter to Starbucks Corporate Headquarters.  In a day or so I'll post Part III - what follows the letter below was a bit surprising to me.  Customer service, and general...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: