Loading...
Social Media - What You Don’t Know Can Hurt You
As postings on social media have routinely replaced conversations over lunch or around the water cooler, workers have filed almost 100 social media-related complaints against employers with the National Labor Relations Board. Mich'l Schmidt, a partner at Cozen O'Connor P.C.,…
Big Data in the Enterprise: An Introduction
Part of the Series: Business Intelligence Collection
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and…
Technology Economics: A Driving Force Behind Business Today
Part of the Series: IT Project Management Collection
Combined technology spending in today's global economy now tops $4.2 trillion dollars, a number larger than the gross domestic product of most nations. This rising global "Technology Economy" is most certainly a driving force in business today. In this program,…
Cloud Computing: Trends, Strategies and Best Practices
Part of the Series: WatchIT Computer Science Collection
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern…
Social Media for Business: What You Need to Know
Public and private sector organizations must tread carefully with social networks or risk the possibility of legal entanglements, loss of business, and perhaps worst of all, unhappy customers. In this report, expert and attorney Peter Vogel, discusses the key areas…
Social Networking - Does it Work at Work?
Not all that long ago, CIOs and IT managers were listening to the grumblings of many of their business colleagues who wanted to shut down or ban employee access to popular social networking sites such as Facebook, Linkedin and Twitter.…
Effective Data Management
Part of the Series: Data & Storage Management Collection
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
The Role of Technology in Counter-Terrorism
Part of the Series: Security & Risk Management Collection
Through the tragedy of 9/11, the Boston Marathon bombings and the recent NSA surveillance controversy, we have become aware of the critical nature of technology in the detection and investigation of terrorist threats and actions today. From biometrics and communication…
Cyber Attacks and Security Breaches: Coping with External Threats
Part of the Series: Security & Risk Management Collection
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored…
Principles of Cloud Computing - Perspectives on Business, Technology & Cost
This course, the first of a 3-part series, lays out the foundation and key principles of cloud computing. The initial section presents the variable cost business model, which some believe may be the greatest contribution that cloud computing is going…
The Five Big Bang Theory of the Internet
In this WatchIT On the Horizon program, The "Five Big Bang" Theory of the Internet, Peter Vogel, a technology expert and attorney from the firm of Gardere Wynne Sewell LLP, based in Dallas, Texas explores the evolution of the Internet…
Red Teams: Securing the Enterprise
Part of the Series: Security & Risk Management Collection
To protect business critical networks and applications from a malicious cyber-attack, organizations today often employ Red Teams to challenge and test enterprise system defenses. The Red Team's goal is to covertly seek out vulnerabilities and identify them before the "bad…
Incident Response Plans - Advice and Best Practices
CIOs, IT and business leaders must be proactive in their planning and always ready to respond when it comes to cyber threats and attacks. Security experts agree that attacks are no longer a matter of "if" but are now clearly…
Perspectives on Business Continuity & Disaster Recovery Planning 
Part of the Series: Security & Risk Management Collection
Business Continuity & Disaster Recovery planning, also known by the acronym, BC/DR plans, are top of mind issues for IT and business professionals today. Smart organizations routinely evaluate and review their plans, make changes were needed and then always test…
Supply Chain: Understanding the Risk Factors
Part of the Series: Security & Risk Management Collection
Where would our global economy be without supply chains? Going nowhere fast, would be a quick but accurate response. Let's face it, no matter if your firm is a manufacturer, retailer or financial organization you are undoubtedly tethered to, and…
Cyber Terror and Cyber Risk: What You Need To Know
Part of the Series: Security & Risk Management Collection
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC…
Business Intelligence: Best Practices for Successful Project Management
Part of the Series: Business Intelligence Collection
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This program discusses best practices for organizing and managing a BI…
Virtual Teams: Strategies for Success
Part of the Series: IT Project Management Collection
Organizations that have successfully incorporated virtual teams into their business practices have realized significant benefits. Benefits including reduced business costs, accelerated product delivery and improved levels of competitive advantage. However, along with the advantages virtual teams can offer come many…
Cyber Attacks: The Best Defense is a Good Offense
Part of the Series: Security & Risk Management Collection
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security…
Modern Information Systems - IT Infrastructure
Today's modern information systems are difficult for the general business person to understand because the business work is largely managed inside a 'black box.' In this two-part program, technology writer and consultant Roger Grannis clearly explains and simplifies the inner…
2 videos