July 30, 2011  6:01 AM

Frankensteins, Pt. I – Expensive to Maintain, Hard to Dismantle



Posted by: David Scott
business management, business stakeholder, IT jobs, IT positions, IT stakeholder, job description

 


February 27, 2011  12:38 PM

SSA Revisited (see prior post) – and – Content Management



Posted by: David Scott
assets management, business management, cable management, CMS, content management system, project management, resource allocation, resource management, social security administration, SSA, wire management

 

If you’ll bear with me, I may have a rather novel use for a Content...


January 16, 2011  11:45 AM

Government Project Passes Huge Milestone – and provides lessons to us all



Posted by: David Scott
boeing, border enforcement, border security, business management, department of homeland security, DHS, go-live, government initiatives, government project, government security, illegal immigration, immigration, janet napolitano, project management, project manager, project milestones, SBI, SBINet, secure border initiative, U.S. border, virtual border fence, virtual fence

 

In the wake of my two-part article earlier this month,


January 6, 2011  12:46 PM

The human element



Posted by: David Scott
breach, business breach, business management, business progression, business security, data breach, human resources, IT security, systems security

 

What is the most critical element, or factor, in any...


October 31, 2010  12:31 PM

Plans: Planning and Managing Change, Pt. II – Three plan types



Posted by: David Scott
business management, business planning, business projects, change management, five year plan, individual action plan, IT planning, IT plans, IT projects, one year plan

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 29, 2010  12:16 PM

Velocity of Risk



Posted by: David Scott
2010 Global SMB Information Protection Survey, AITP, Association of Information Technology Professionals, business management, business policy, business risk, business security, business security plan, information securrtiy, IT risk, IT security, risk management, Security Plan, securtiy policy, velocity of risk

 

Wow.  I was reading an article in InformationWeek...


May 28, 2010  1:27 PM

WorkFors: Those to Whom you Report



Posted by: David Scott
business management, HR, human resources, IT Wars, personnel management, the business-technology weave

  

We’ve discussed WorkOns and WorkWiths – let’s wrap this series up with...


May 27, 2010  8:02 AM

TechnoShines, TechnoFinds and TechnoBinds



Posted by: David Scott
business management, eCulture, HR, IT Wars, the business-technology weave

   

You will find three kinds of people in the WorkWith group. ...


May 22, 2010  1:01 PM

The WorkWith: Squeezed in the Middle



Posted by: David Scott
business management, human resources, IT Wars, people management, workons, workwiths and workfors

As planned, let’s return to our discussion as originally begun on May 7th, Managing People in the Weave.  As necessary, review that post and its follow-ons...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: