Blogs

Previous index Page 6 of 353 Next
Business Presentation over your IT: When Apple's iPhone Becomes Rich: The Road to Flash or Silverlight on iPhone
Business Presentation over your IT: Office's Running Hour: Sketching Out Your PowerPoint Presentations in Ten Minutes
Business Presentation over your IT: IBM White Paper: The Value of Training and the High Cost of Doing Nothing
Business Presentation over your IT: SlideShare Ribbon: Socialize Your Presentation from PowerPoint 2007 Now
Business Presentation over your IT: No Death by PowerPoint: We Know Its Midlife Crisis
Business Presentation over your IT: Online Holiday Boom with Stand-Out Sales Presentation
Business Presentation over your IT: Ideas about Showing PowerPoint Presentations on iPhone
Business Presentation over your IT: Not Late to Send Your Online Christmas Card Today!
Business Presentation over your IT: We Must Read More for Making Good Design
Business Presentation over your IT: Project Presentation Essential: Create Project Report Effortlessly in Office 2003
Business Presentation over your IT: On the Meeting: Teleconferencing, Videoconferencing and Web conferencing
Business Presentation over your IT: Mouse Over Multimedia: Add Interactive Content to Your Site with Apture
Business Presentation over your IT: Besides Presentation Skills, More about Those PowerPoint Professionals...
Business Presentation over your IT: Let's Talk about Presentation Skills from Our President Obama
Business Presentation over your IT: Why I am Interested in Flash on Mobile Devices Like iPhone or BlackBerry
Business Presentation over your IT: Know the Audience, No Other Rules on My Presentation
Business Presentation over your IT: Valentine's Day Special: Your Personal Presentation about LOVE
Business Presentation over your IT: No News is Good News for Microsoft PowerPoint in Office 14
Business Presentation over your IT: [REFERRAL] Please, for Your Audience's Sake, Use PowerPoint Animation Well
Business Presentation over your IT: Keynote Remote: Easier iPhone Presentation via Wi-Fi
Business Presentation over your IT: Enrich Your Presentation: Yet Another Note about Video Sharing on PowerPoint
Business Presentation over your IT: [Referral] 5 Ways to Convert PowerPoint to Video
Business Presentation over your IT: My Late Review for Acrobat.com - Adobe's Silly Trick over Online Presentations
Business Presentation over your IT: YouTube Says, Downloading Your Own Videos is Legal
Business Service Management Today & Tomorrow: Welcome and Introduction
Business Service Management Today & Tomorrow: A Transformation of the Way IT Works
Business Service Management Today & Tomorrow: CMDB and SRM -- The Anchors of BSM
Business Service Management Today & Tomorrow: Is the CMDB Relevant in the Cloud (or Anywhere Else for that Matter)?
Business Service Management Today & Tomorrow: Business Service Management is About Being Part of the Business
Business Service Management Today & Tomorrow: Service Catalog vs. Service Request Catalog
Business Service Management Today & Tomorrow: A CMDB is Not Just for IT
The Business-Technology Weave: Welcome to "The Business-Technology Weave"
The Business-Technology Weave: Data Breaches and the Business-Technology Weave (BTW)
The Business-Technology Weave: BiT: The Business Implementation Team
The Business-Technology Weave: Knowing Where You Are: The Two Types of Organizations in Today's Weave
The Business-Technology Weave: Knowing Where You Are, Part II: Now What?
The Business-Technology Weave: The People Prism
The Business-Technology Weave: Change – A Difficult Sell and a Difficult Buy?
The Business-Technology Weave: Change - The Basics
The Business-Technology Weave: Data Security and Transport - How Do You and Your Organization Operate?
The Business-Technology Weave: The Quickening of Business and Technology
The Business-Technology Weave: False "Solutions"
The Business-Technology Weave: False “Solutions” Continued - Beware the “Solution” that Adds Layers of Effort to Business Process
The Business-Technology Weave: What is Being Done in the Name of Your Domain?
The Business-Technology Weave: False "Solutions" Part III: Automating Poor Process is Wasteful
The Business-Technology Weave: False "Solutions" Part IV: Real Solutions are Often Hiding in Plain Sight
The Business-Technology Weave: False Solutions Part V: Out with the New, In with the Old
The Business-Technology Weave: False Solutions Part VI: Misunderstanding Where You Are
The Business-Technology Weave: BUSINESS AND IT: WHO DOES WHAT, WHY, AND WHEN?
The Business-Technology Weave: Determining the "Why" for Who Does What
The Business-Technology Weave: Empower Business; Free IT
The Business-Technology Weave: A Business Deficit
The Business-Technology Weave: Workplace Privacy
The Business-Technology Weave: An IT Deficit
The Business-Technology Weave: Putting Activity Where It Belongs
The Business-Technology Weave: The "Whens" of Activity for IT and Business
The Business-Technology Weave: Managing People in the Weave
The Business-Technology Weave: Managing People in the Weave, Part II: WorkOns; WorkWiths and WorkFors...
The Business-Technology Weave: WorkOns; WorkWiths and WorkFors: A Quick Consideration of Class
The Business-Technology Weave: WorkOns; WorkWiths and WorkFors: Shifting of Class and the Power Prism
The Business-Technology Weave: You Say "Business Security," I Say "IT Security"...
The Business-Technology Weave: Insecurity: A State Agency’s Data “Security" Posture
The Business-Technology Weave: Insecurity, Part II: A State Agency’s Data “Security” Posture
The Business-Technology Weave: Insecurity, Part III: A State Agency’s Data “Security” Posture
The Business-Technology Weave: The WorkWith: Squeezed in the Middle
The Business-Technology Weave: TechnoShines, TechnoFinds and TechnoBinds
The Business-Technology Weave: WorkFors: Those to Whom you Report
The Business-Technology Weave: Cloud Computing and Security: Forecast Cloudy?
The Business-Technology Weave: Lions and Tigers and Data Breach … OH MY!
The Business-Technology Weave: Business Continuity and Data Breach; hardly mutually exclusive, and yet…
The Business-Technology Weave: BP and the Gulf Oil Spill: Lessons for IT and Business.
The Business-Technology Weave: Understanding IDRU (Inadequacy, Disaster, Runaway and Unrecoverability) in contrasting Disaster Recovery (DR) vs. Disaster Awareness, Preparedness and Recovery (DAPR)
The Business-Technology Weave: EMP: Electro-Magnetic Pulse – A Reasoned Discourse for DAPR’s Replacement of Standard DR Policies
The Business-Technology Weave: Social Networking and the Workplace
The Business-Technology Weave: Security: Small and Medium Business (SMB) - Late to the Party?
The Business-Technology Weave: Enterprise IT: Users Re-define “Workaround” in Using Unsupported and Disallowed Devices, Apps
The Business-Technology Weave: Critical Need: The Success Culture
The Business-Technology Weave: Creating and Sustaining the Success Culture
The Business-Technology Weave: A Challenge to Success and Culture: The Excuse Factory
The Business-Technology Weave: In-House IT and The Cloud: Is your (IT) Job Secure? Make It Secure
The Business-Technology Weave: Information Technology's REAL Value
The Business-Technology Weave: The Point of Diminishing Return...
The Business-Technology Weave: Business Communication in the Electronic Age
The Business-Technology Weave: Apple iPhone 4 – Maybe It Should Have Been Called the “aPhone”
The Business-Technology Weave: Want To Be A Hero?
The Business-Technology Weave: Data Breach and Legislation: What’s Coming Your Way?
The Business-Technology Weave: Establishing the Appropriate IT Hierarchy
The Business-Technology Weave:
The Business-Technology Weave: IT Governance - Time to Pedal Faster
The Business-Technology Weave: E-Mail - A Parallel Universe?
The Business-Technology Weave: What Business Doesn’t Know CAN Hurt It
The Business-Technology Weave: What Business Doesn't Know CAN Hurt It - Pt. II
The Business-Technology Weave: What Business Doesn't Know CAN Hurt It - Pt. III
The Business-Technology Weave: Hackers Trying to Take Over Power Plants – “I.T. Wars” Indeed
The Business-Technology Weave: Centralized and Decentralized IT Deployment
The Business-Technology Weave: A New Security Wrinkle
The Business-Technology Weave: Security and Insecurity: Finite vs. Infinite
The Business-Technology Weave: Security and Insecurity: Finite vs. Infinite – Pt. II
The Business-Technology Weave: Security and Insecurity: Finite vs. Infinite – Pt. III
The Business-Technology Weave: Organizational Challenges in the Face of New Budget Realities