The Five Big Bang Theory of the Internet

WatchIT
Show More

Related videos

Negotiating Agreements for Software Development and ERP Projects
In just the past year or so, projects such as the UK government's PS12 billion pound National Health Service IT project, New York City's infamous City Time Project and Idaho's Medicare claims processing system have ended up hopelessly delayed, totally scraped or tied up in lengthy court battles. In this…
Cyber Ethics: A Growing Business Challenge
Organizations today are trying to stem the tide of increasing cyber attacks, as well as inappropriate online behavior, by raising the level of cyber ethics. In this report, Peter Vogel, Partner with Gardere Wynne Sewell LLP, examines this new area of concern and the issues it raises, especially for IT…
Introducing IoT: The Internet of Things
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing interconnected world. By watching this program, professionals will gain valuable…
Social Networking: Legal Update 
Rapidly growing, constantly changing, and providing everyone - and anyone - the power to instantaneously broadcast information to the world, social media is potentially as risky as it is revolutionary. Peter Vogel, a partner at Gardere Wynne Sewell, reminds you why your company cannot afford to fall behind in this…
Introducing IoT: The Internet of Things - An Explanation of IoT
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing interconnected world. By watching this program, professionals will gain valuable…
Semantic Intelligence: The Enabler of Mobile Search and Advertising
Part of the Series: Business Intelligence Collection
On average every worker in every company spends 2.3 hours per day looking for information. Even with brand name systems, two-thirds of the information received is never used. These systems are brittle, imprecise and ambiguous. They are largely a waste of time. Semantics is the science of eliminating ambiguity. Organizations…
Global Connectivity: Revolutionizing the Way We Do Business
Imagine a world where ubiquitous connectivity joins all global citizens to the people, products and services they need - anytime, anyplace and anywhere. This vision of the not-too-distant future is presented in a groundbreaking book titled, Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business, by author Emily…
Labor Automation: The Next Wave of Innovation
Enterprises today rely on technology, control systems, robotics and automated machinery to deliver high-quality products and services to global markets quickly and cost effectively. Experts tell us that the next major wave of innovation will center on the expansion of automated processes as industries and organizations look to further drive…
Rootkits: A Growing Security Threat
Rootkits are malicious programs, that when downloaded, can allow an intruder control over a system without ever being detected. Once installed, Rootkits can enable access to personal information, track a user's Internet activity or even hijack a computer for botnet attacks or spam distribution. In this program viewers will learn…
How Do You Protect Data in an Era of BYOD and Cybercrime?
Course Overview It seems as if everyone, from strategic partners to ex-employees, may be able to access your corporate data. It also appears that industrial spies are as clever as ever, despite advances in technology and a bevy of new regulations requiring businesses to safeguard their data. Gardere's Peter Vogel…
Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Freedom of speech is an ideal that historians tell us has its roots in the early 5th century; the concept is generally credited to the ancient Greeks. The right to privacy is an equally coveted principle that has had an interesting history as well. In fact, Louis Brandeis, a prominent…
Are You on the Software Police's Most Wanted List?
In recent years, software vendors - and their affiliated 'software police' - have stepped up their onsite audits of computer systems at U.S. businesses. Peter Vogel, a partner in the law firm of Gardere Wynne Sewell, explains why you should conduct a 'self-audit' of your company's computers to check for…