The Business-Technology Weave:

business and IT change

1

March 30, 2013  3:37 PM

Unburdening Security



Posted by: David Scott
business adaptability, business agility, business and IT change, business effectiveness, business success, IT adaptability, IT agility, IT and business change, IT burden, IT effectiveness, IT responsibility, IT security, IT services, IT success, IT's role, IT-business alignment

As a follow-on to...

March 30, 2013  3:27 PM

Swapping Burdens



Posted by: David Scott
1 year plan, business adaptability, business agility, business alignment, business and IT change, business and IT planning, business effectiveness, business excellence, business success, IT agility, IT alignment, IT and business change, IT effectiveness, IT readiness

Keeping with the...


March 18, 2013  2:48 PM

Zeroing Burdens – Ensuring Survival



Posted by: David Scott
business adaptability, business agility, business and IT change, business and IT planning, business and IT solutions, business effectiveness, business evaluation, business excellence, business imagination, business liabilities, business practices, business progression, business strategy, business success, business surety, business vulnerabilities

We’ve talked about...


February 21, 2013  9:10 AM

Author Karen Spencer – “A to XP: The Agile ABC Book”



Posted by: David Scott
business adaptability, business agility, business and IT change, business and IT planning, business continuity

  Bookmark and Share     1 Comment     RSS Feed     Email a friend


August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


July 31, 2011  9:45 AM

Frankensteins, Pt. III – A Simple Assessment to Setting Structure



Posted by: David Scott
best business practice, best IT practice, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business practice, IT department, IT positions

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 29, 2010  10:13 AM

Content: Getting it; Using it; Re-using it; and Getting Rid of It (Protection, too!)



Posted by: David Scott
business agility, business and IT policy, business and IT change, business and IT planning, business practice, business systems, content, content management, content management system, data management, data protection, leveraging data, WikiLeaks

 

I’ve struck a nerve in...


October 31, 2010  12:03 PM

Plans: Planning and Managing Change – Pt. I



Posted by: David Scott
1 year plan, 5 year plan, business and IT change, business change, change management, five year plan, individual action plan, IT and business change, IT change, one year plan

 

I was speaking about plans and projects with someone the other day.  As far as challenges go -...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: