July 30, 2011  6:01 AM

Frankensteins, Pt. I – Expensive to Maintain, Hard to Dismantle

Posted by: David Scott
business management, business stakeholder, IT jobs, IT positions, IT stakeholder, job description


February 27, 2011  12:38 PM

SSA Revisited (see prior post) – and – Content Management

Posted by: David Scott
assets management, business management, cable management, CMS, content management system, project management, resource allocation, resource management, social security administration, SSA, wire management


If you’ll bear with me, I may have a rather novel use for a Content...

January 16, 2011  11:45 AM

Government Project Passes Huge Milestone – and provides lessons to us all

Posted by: David Scott
boeing, border enforcement, border security, business management, department of homeland security, DHS, go-live, government initiatives, government project, government security, illegal immigration, immigration, janet napolitano, project management, project manager, project milestones, SBI, SBINet, secure border initiative, U.S. border, virtual border fence, virtual fence


In the wake of my two-part article earlier this month,

January 6, 2011  12:46 PM

The human element

Posted by: David Scott
breach, business breach, business management, business progression, business security, data breach, human resources, IT security, systems security


What is the most critical element, or factor, in any...

October 31, 2010  12:31 PM

Plans: Planning and Managing Change, Pt. II – Three plan types

Posted by: David Scott
business management, business planning, business projects, change management, five year plan, individual action plan, IT planning, IT plans, IT projects, one year plan


  Bookmark and Share     0 Comments     RSS Feed     Email a friend

October 29, 2010  12:16 PM

Velocity of Risk

Posted by: David Scott
2010 Global SMB Information Protection Survey, AITP, Association of Information Technology Professionals, business management, business policy, business risk, business security, business security plan, information securrtiy, IT risk, IT security, risk management, Security Plan, securtiy policy, velocity of risk


Wow.  I was reading an article in InformationWeek...

May 28, 2010  1:27 PM

WorkFors: Those to Whom you Report

Posted by: David Scott
business management, HR, human resources, IT Wars, personnel management, the business-technology weave


We’ve discussed WorkOns and WorkWiths – let’s wrap this series up with...

May 27, 2010  8:02 AM

TechnoShines, TechnoFinds and TechnoBinds

Posted by: David Scott
business management, eCulture, HR, IT Wars, the business-technology weave


You will find three kinds of people in the WorkWith group. ...

May 22, 2010  1:01 PM

The WorkWith: Squeezed in the Middle

Posted by: David Scott
business management, human resources, IT Wars, people management, workons, workwiths and workfors

As planned, let’s return to our discussion as originally begun on May 7th, Managing People in the Weave.  As necessary, review that post and its follow-ons...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: