IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives Informatiion Security Today Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives Informatiion Security Today Book Proposal Guidelines
IT Today is brought to you by Auerbach Publications

Channels

IT Performance Improvement

Management

Security

Networking and Telecommunications

Software Engineering

Systems Engineering

Project Management

Database

Auerbach Information Management Service

Book Excerpts

Archives


Editorial Calendar

Author Guidelines

Advertising Rates

Contact Editor

 

New Books

Securing an IT Organization through Governance, Risk Management, and Audit by Ken E. Sigler and James L. Rainey, III; ISBN 978-1-4987-3731-9
Cable and Wireless Networks: Theory and Practice by Mario Marques da Silva; ISBN 978-1-4987-4681-6
Ethical IT Innovation: A Value-Based System Design Approach by Sarah Spiekermann; ISBN 978-1-4822-2635-5
Securing an IT Organization through Governance, Risk Management, and Audit by Ken E. Sigler and James L. Rainey, III; ISBN 978-1-4987-3731-9
Telehealth in Rural Hospitals: Lessons Learned from Pennsylvania by CJ Rhoads; ISBN 978-1-4987-2435-7
Leveraging Data in Healthcare: Best Practices for Controlling, Analyzing, and Using Data by Rebecca Mendoza Saltiel Busch; ISBN 978-1-938904-84-4
Systematic Strategic Planning: A Comprehensive Framework for Implementation, Control, and Evaluation by Hakan Butuner; ISBN 9781498724814

Click on a book cover for more information or to order.
SAVE 20% AND GET FREE SHIPPING when you order these or any book online! Simply enter this code--813DA--when you checkout.


The Impossibility of Designing a "Perfect" Virtual Meeting in a Multicultural World
Nancy Settle-Murphy started to wonder, "If I am leading workshops that demonstrate "best practices" virtual meetings with global teams, who's to say that my best practices are right for other cultures?" For guidance, she turned to the brilliant new book by Erin Meyer. She got no further than the first chapter before she started to jot down dozens of ideas. Here are just a few.

Introduction to Change Management
This chapter from Change Management: Manage the Change or It Will Manage You by Frank Voehl and H. James Harrington answers the question, "In a nutshell, what is change management?"

Integrating Changes into Operations: Transition Management
This chapter from Improving Business Performance: A Project Portfolio Management Approach focuses on integrating the changes into the operations of an enterprise.

Fire Up Your Communications Mojo in a Virtual World
Public speaking is a full-body sport. To keep people engaged and maintain a strong presence when face-to-face, you must use your full body: your posture, gestures, voice, eye contact, and movement. Demonstrating a compelling presence is no less important in the virtual world, but it's done a bit differently. Here are some tips.

Lean Primer for IT Professionals
This chapter from The Lean IT Field Guide: A Roadmap for Your Transformation by Michael A. Orzen and Thomas A. Paider provides you with some familiarity on various applications of lean to IT. It's important to have a basic understanding of fundamental concepts and areas of practice in order to stay grounded in principles that really provide lasting results. We often see IT organizations jump from hot new topic to hot new topic, applying a flavor of the month strategy that never sustains itself.

IT Innovation and Ethics
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains. The book explores the latest thinking on computer ethics, including the normative ethical theories currently shaping the debate over the good and bad consequences of technology. This excerpt makes the case as to why IT professionals, managers, and engineers must consider the ethical issues when designing IT systems.

Protecting the Oil and Gas Industry from email Threats
According to a recent report from the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the energy sector is facing a significant rise in cyber attacks. The high volume of business communications conducted via email within this industry give hackers quite the window of opportunity to intercept sensitive information through the use of spear phishing. This article by OPSWAT's Doug Rangi describes spear phishing attacks that have occurred in various sectors of oil and gas, along with recommendations on how the industry can boost their cyber security and specifically adopt new preventative measures to protect against these and other email-borne threats.

Predicting the Cyber Security Future in 2016
In this article, Lancope CTO TK Keanini provides a brief retrospective on 2015, including the biggest patterns seen from within the cyber security industry; highlights the biggest trends to expect in 2016; from cracking as a service to DNA breaches; and discusses how these trends will impact businesses and individuals alike and have long reaching implications.

The Threat Within: 3 Out of 4 Companies Affected by Internal Information Security Incidents
Costly cyberattacks are now almost routine for businesses, but while many organizations are focusing on external attackers, it's important to also look at threats from within. According to the IT Security Risks Survey conducted by Kaspersky Lab and B2B International, 73% of companies have been affected by internal information security incidents. The survey also found that the largest single cause of confidential data losses is by employees (42%).

Introduction to Dependable Embedded Software
Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, the book has evolved from a course text used as a training module on building embedded software for safety-critical devices. This excerpt introduces the concepts of dependable embedded software and the safety culture.

6 CyberHacks That Will Affect Your Life in 2016
As we are quickly marching toward the end of another year, Stephen Newman, CTO of Damballa, discusses the new types of cyber attackes that will likely see in 2016. He points out that these new types of attacks will draw everyone's attention to the lack of privacy and security in our interconnected world.

How Timeshifting Truly Transformed a Top-Performing Virtual Team
Basically, "timeshifting" means that a team can work together when it can't be together, either physically or virtually. Um, okay. But what does that really mean, and how do you accomplish it? This edition of Nancy Settle-Murphy's Communiqué shares just a few creative and insightful tips on how to make this happen.. You’re not going to want to miss a single one.

Drones in the City: Toward a Floating Robotic Panopticon?
A social robot is a robot that interacts and communicates with humans or other autonomous physical agents by following social behaviors and rules attached to its role. Just Ordinary Robots: Automation from Love to War provides a socially involved, yet sober, insight into the questions of robotics. Which robot technologies are coming? What are they capable of? Which ethical and regulatory questions will they consequently raise? The authors examine the social significance of the new generation of robots in five areas: home robot, care robot, auto robot, police robot, and military robot. This excerpt discusses Civil Applications of Drones.

4 Steps to Prepare Your Business for an ERP Implementation
One of the most common mistakes businesses make when preparing for an ERP system implementation is assuming it's just another project for the IT department. This couldn't be further from the truth. An ERP system implementation is a major period of change for any business, and the key to a successful deployment is the preparation. Before any software gets installed or any training takes place, there are several critical things you must do to prepare your business for the systemic overhaul of key operational processes. By preemptively accounting for common pitfalls, a business can avoid obvious mistakes and make the implementation process more seamless. These four steps can help ensure ERP implementation success.

Leading the Internal Audit Function
In this book, Lynn Fountain presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book explains how to clarify management expectations for the internal audit and balance those expectations with the IIA Standards. It examines the concept of risk-based auditing and explains how to determine whether management and the internal audit team have the same objectives. It also looks at the internal auditor's role in corporate governance and fraud processes.

Oracle Case Management Solutions
Oracle Case Management Solutions is the first book to translate case management from a business problem perspective into appropriate Oracle product usage. Covering the key Oracle technologies that support case management solution components, it explains how to conceptualize and implement quality case management solutions with these products.

If You See Marty McFly, Can You Tell Him ...
In honor of 'Back to the Future Day' (in case you're not a fan, October 21, 2015 is the day Marty McFly visits in the 1989 second film in the trilogy.) This article, written for fun by Martyn Ruks, Technical Director of MWR InfoSecurity, looks at the technology of the fictional 2015 and ponders just how secure it is.

Three Questions about Online Security
When you give your personal information to a financial institution, government, or insurance company, you have a certain level of trust that they will do everything in their power to keep it safe. It's easy to forget that at the same time you're filling out paperwork online, in the dark world of cybercrime, hackers are doing everything in their power to get your information. This article explains why hackers want this information, what they do with it, and how you can safeguard themself.

Managing Performance from Afar Made Easier: 10 Tips for a Happier Outcome
It can be awkward to give someone tough feedback when they're miles away. And that's the least of it. Without visual cues, the delivery of even the most well-meaning and thoughtful performance feedback can have the opposite effect. It can damage relationships, erode trust, sap motivation, and in reality, it can actually weaken performance, instead of strengthening it. In this edition of Communiqué, Nancy Settle-Murphy embellishs on a few tips from her Tips for Leading Amazingly Productive Virtual Teams guide.

Providing an Integrated Environment for Big Data Management with the Hadoop Ecosystem
As the new technologies developed for Hadoop continue to rise, it is essential to note that there are some products which will be better suited for specific requirements than others. This article provides an overview of the entire suite of technologies collectively constituting the Hadoop ecosystem. These include tools for database and data management, core functionalities, data transfer, security enhancement, analytics, data serialization as well as Hadoop-based cloud computing functions.

Espionage Tradecraft
Only by understanding the threats and the basics of the tradecraft utilized to facilitate industrial espionage can an organization develop an effective counterespionage program. This chapter from Industrial Espionage: Developing a Counterespionage Program by Daniel J. Benny reviews espionage tradecraft including the intelligence cycle, the categories of intelligence collection, and the methods of collection.

Overview of Cloud Computing Networking
This chapter from Cloud Computing Networking: Theory, Practice, and Development introduces the types of networks and the operating systems that are able to provide network services and manage network devices. It analyzes the functionalities of these operating systems and presents their functionalities through network architecture. Finally, it explains how cloud computing is supported by the operating systems, and discusses the networking process and illustrates how to implement a network system.

CRC Press Exclusive Publisher and Distributor for the Healthcare Information and Management Systems Society
CRC Press announced that it has teamed up with the Healthcare Information and Management Systems Society (HIMSS) to become the exclusive publisher and distributor of HIMSS books. HIMSS is a global, cause-based, not-for-profit organization focused on better health through information technology (IT). HIMSS leads efforts to optimize health engagements and care outcomes using IT. To celebrate this new alliance, CRC offers exclusive savings plus free shipping on the healthcare information and informatics books. You can also browse the complete collection of healthcare informatics books at the HIMSS Bookstore and save 20% on your order with promo code HWP37.

It's What People Aren't Saying That Leaders Most Need to Hear
In this article, Nancy Settle-Murphy uses a hypothetical example, representing a composite of some of our actual clients, to show how unmet expectations can undermine trust, demotivate teams, and chip away at relationship equity. It provides some practical steps for self-aware leaders who know they can do much more to create the kind of environment where every team member can flourish.

Protecting Medical Record Data
After a slew of data breaches in 2014, the FBI warned the healthcare industry that cyber-criminals would be directing more attention their way in 2015. The healthcare industry, valued at $3 trillion, has become an increasingly valuable target for cyber criminals and, in some cases, a much easier target to attack, due to their often less than adequate investment in cyber security. What is it about the healthcare industry that has captured the cyber criminal's interest in the last few years? This article from OPSWAT discusses reasons for the popularity of medical data theft and gives advice on how to prevent future breaches.

The Privacy Professor's September Tips: Don't Let the Bloom Fade from Privacy Diligence
The latest tips from Rebecca Herold, The Privacy Professor. Her latest book is Data Privacy for the Smart Grid, co-written with Christine Hertzog.

Top 3 Factors Driving the Rise in Data Breaches
It comes as no surprise that the number of companies falling victim to data breaches is on the rise. These stories are making headlines, and making CEOs and employees alike nervous that they will be the next victim. As computers are getting faster, so are hacking attempts. Hackers are now more capable than ever to implement their plans. This article outlines the top three factors that are contributing to the rise of data breaches.

Call for Chapters: Nature-Inspired Networking: Theory and Applications
The book will contain highly original contributions about how the nature is going to shape networking systems of the future. Hence, it will focus on rigorous approaches and cutting-edge solutions, which encompass three classes of major methods. The book's purpose is to make a formal basis more accessible to researchers, scientists, professionals and students as well as developers and practitioners in ICT by providing them with state-of-the-art research results, applications, opportunities and future trends.

Avoiding the High Cost of Ambiguous Decisions
Truly bad decisions are made every day, often because the decision-making process is murky, and needed conversations are rushed. What is a better approach to facilitating group decisions? Joining Nancy M. Settle-Murphy, the author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results, in writing this Communiqué is her friend and colleague Rick Lent, president of Meeting for Results. Although the concepts can be applied to any kind of meeting, we offer tips for those who lead virtual meetings, where you lose vital visual cues.

Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law
Facial recognition technology, which can verify or identify an individual from a facial image, has rapidly improved in performance and now can surpass human performance in some cases. The Department of Commerce has convened stakeholders to review privacy issues related to commercial use of this technology, which GAO was also asked to examine.

Security Countermeasure Selection and Budgeting Tools
This chapter from the second edition of Risk Analysis and Security Countermeasure Selection explains what makes a security countermeasure effective or ineffective, the functions of security countermeasures, infiltration and attack scenarios, attack objectives, criminal offender types, criminal offender countermeasures, how to develop countermeasure effectiveness metrics, and how to develop a Decision Matrix to help decision makers reach consensus on a specific countermeasure when there are many points of view to consider.

Protests or Profiteering: The Hack Remains in Same
Whether it's cyber terrorism, hacktivism, or just another set of hackers trying to get famous by jumping on the media's hot topic, the key to fighting back is threat intelligence. Staying ahead of future attacks requires a proper investment in intelligence groups who have the proper tools, people and processes to deliver up-to-date intelligence.

Multilevel Modeling of Secure Systems in QoP-ML
This book introduces the Bogdan Ksiezopolski's quality of protection modeling language (QoP-ML), which provides the multilevel modeling language for making abstraction of security systems that put emphasis on the details concerning quality of protection. The analysis of the secure systems can be performed automatically by means of an automated quality of protection analysis tool. Based on the multilevel analysis, the foundations of the new decision support system can be introduced. The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML.

Just Because You're Silent, You May Not Be Really Listening
Most communications skills courses tend to focus on making people more articulate, effective and expressive through writing, speaking and presenting. Listening is rarely a focus. In this article from Communiqué, Nancy Settle-Murphy offers some practical tips for making you a better listener.

Agile Stakeholder Engagement
This chapter from Agile for Project Managers discusses the importance of stakeholder engagement on the agile project. This is an essential practice that ensures a successful product delivery. The chapter concentrates on important concepts such as getting the right stakeholders for the project, cementing stakeholder involvement, and managing the interests of stakeholders.

Provide Leadership Across All Levels
The nature and level of leadership on a program designed and launched to transform the entire business or significant parts of the business are primary determinants of the program being successful by achieving the intended business goals. Given organizational matrices, work complexities, and corporate politics, the program management team personnel rely heavily on their leadership traits to deftly guide issues and manage risks through multiple organizational levels and across functions. As this excerpt from Transforming Business with Program Management explains, leaders can model the behavioral changes needed to embrace the changes the program is driving.

Leveraging Stakeholders to Prepare Your Organization for Change
This excerpt from Stakeholder Engagement: The Game Changer for Program Management focuses first on change management theory to help drive in change management concepts and the importance of change management. It then introduces a simple change management model to incorporate change management activities into your program plans. After learning the foundational elements of change management and reviewing a change management model, the focus shifts to how to implement the change management elements for each of the four stakeholder quadrants.

Emerging Technologies in Healthcare
Connecting millions of patients with caregivers like never before, mobile health (mhealth) technologies are changing healthcare for good. Emerging Technologies in Healthcare by Suzanne Moss Richins provides detailed descriptions of the latest mhealth technologies. It outlines the role of mhealth for self-care and remote care and describes the differences between telemedicine, telehealth, and telecare. The book justifies the use of mhealth technologies for meeting regulatory standards of care and explains how analytics and social media are being used to improve healthcare delivery. It addresses healthcare reform, risk management, and future directions for healthcare technologies.

Call for Book Chapters: Vehicular Social Networks
Selected topics that are covered in this book are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, as well as novel trends and challenges in VSNs. The book aims to provide significant technical and practical insights in different aspects, starting from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Operational Models of Corporate Security Intelligence
This excerpt from Corporate Security Intelligence and Strategic Decision Making discusses why it is useful to have a model of intelligence to help guide structures, processes, and the deployment of resources. It then introduces a simple security intelligence model, applicable to any scale of deployment. Finally, it discuss aspects of a common dedicated countercrime model (the National Intelligence Model).

Turn 9 Common Virtual Meeting Misconceptions Inside Out
The basic premise: Successful virtual meetings require a thoughtful discipline that demonstrates a deep sense of respect for all participants, enabling them to be full and equal participants in the conversation. We also believe that any kind of meeting should be held only when discussions are needed. (If content review is required, let people do that somewhere else.) This article by Nancy M. Settle-Murphy refutes nine of the most popular misconceptions people hold about virtual meetings, and offer some practical tips that can help transform virtual meetings from mediocre to memorable. Nancy M. Settle-Murphy is author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results.

Call for Chapter Proposals: 5G Radio Access Network (RAN) - Centralized RAN, Cloud-RAN and Virtualization of Small Cells
Being at a very nascent stage, C-RAN and virtualized Small Cell technology poses several major research challenges. This book aims to provide a deeper insight into the next generation RAN architecture; especially in the presence of virtualization and cloud environment. The book will present a survey of the coexistence of SDN, C-RAN and Small Cells solutions proposed in the literature at different levels; e.g., physical characteristics, open access, dynamic resource allocation, technology-neutrality, coverage obligations, minimization of the interference problems, etc.

Healthcare Analytics Use in Population Health
Data collection and aggregation provide an opportunity to look for patterns and based on these patterns to make decisions to improve quality and decrease costs. The driver of this change comes from the payment shift from volume to value inherent in the Patient Protection and Affordable Care Act (PPACA). It augments the Health Information Technology for Economic and Clinical Health (HITECH) Act, which requires the implementation of electronic medical records (EMR).

Requirements Generation in ERP Planning
This excerpt from Directing the ERP Implementation: A Best Practice Guide to Avoiding Program Failure Traps While Tuning System Performance discusses the requirements generation process. It defines, in detail, the system functionality as well as the engineered process changes essential for an order of magnitude improvement in operational performance. The attributes of requirements definition include categories such as "mission critical," "essential," and "nice to have," which then establishes the baseline for a traceability matrix that flows through the project phases including design, prototyping, customization, testing, piloting, and delivery.

Flip Your (Virtual) Meetings - Learning from Our Best Teachers
To stave off boredom and stimulate learning that lasts longer than a class period, my kids' teachers are experimenting with "flipped classrooms." Rather than lecturing at kids with a bunch of PowerPoints during the precious classroom time, the teachers assign the content in advance. This way, sutdents come to class ready to debate ideas and apply what they've learned in ways that make the topics come alive. Let's take a page from teachers who have seen great results by flipping their classrooms. Here are a few steps to get you started.

Privacy Threats Come from All Corners
The types of personal information crooks, marketers, surveillors and others are after varies greatly. You can see it in the kinds of organizations under attack from black-market entreprenuers, just-because-I-can hackers, and even Chinese computer manufacturers. Increasingly, consumers must practice diligent privacy practices with every entity they allow access to their personal information. Read on for tips on doing exactly that.

Introduction to Human-Computer Interaction (HCI)
This excerpt Human-Computer Interaction: Fundamentals and Practice by Gerard Jounghyun Kim introduces HCI as a cross-disciplinary area that deals with the theory, design, implementation, and evaluation of the ways that humans use and interact with computing devices.

Genesis of Personal Communications
This is an excerpt from Mobile Evolution: Insights on Connectivity and Service by Sebastian Thalanany. The book presents insights, interpretations, concepts, and interdependent views--in the landscape of mobile connectivity and service--that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. The author explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem.

Definition and Evaluation of IT Human Factors
This chapter from Modeling, Evaluating, and Predicting IT Human Resources Performance adopts the "Big Five" theory, widely used in the recruitment and personnel selection process, in order to evaluate human factors of software development team members and to find the connection with individual performance.

Onslaught of New Ransomware Strains
Ransomware is now a common term in our vocabulary, but it continues to evolve. The release below warns of an onslaught of new flavors and how they can be found and averted. The tactics range from using help files to infect along with phishing emails. Games are also now being targeted, bad news for those with teenagers in the house.

Reliability and Availability
The concepts of reliability and availability are talked about, written about, equated with each other, and given star status but, in the main, remain somewhat one-dimensional concepts. In this chapter, and throughout High Availability IT Services, Terry Critchley shows that these concepts, particularly availability, have other dimensions and interpretations as well.

Big Data: Architecture and Its Enablement
The concept of big data not a database or data architecture but is more the solutions that leverage any and all data, wherever they come from. In health care, the concepts of big data are enabled only in organizations that focus on data--capture, management, and usage. Health care data is extremely broad, deep, and complex, yet the needs for data access are even greater and ever evolving. To meet such needs, effective data architecture must be intertwined with a formal data governance program. This combination unlocks analytics and begins to leverage big data.

Planning Meetings: The Risk Management Plan
Planning meetings are conducted to ensure the organization has a consistent vision in terms of the project's risk methodology, roles and responsibilities, timing, thresholds, reporting formats, and approaches to tracking. Planning meetings focus on bringing together key stakeholders on risk to determine the risk practices to be pursued and the approach to be used in pursuing them.

Introduction to Customer Relationship Management (CRM) Systems
What is a Customer Relationship Management (CRM) system? Not only is there little agreement on what it really stands for, there is even less agreement on what constitutes a CRM system, how it should be used, the potential of profitability gain, the impact on customer loyalty, the costs involved, the personnel needed, and the training needed for the CRM personnel. CRM system characteristics are not limited to the CRM products and tools that are currently available in the market, and CRM is certainly not a technique or methodology.

Ten Tips to Avoid Massive Data Breaches. Don’t Be the Next Sony!
With Sony recently setting aside $15M to investigate the reasons for and remediate the damage caused by last year's data breach, many organizations—from large enterprises to small business—are wondering what they need to do make sure they aren’t the next big data breach headline. The good news is that most data breaches can be prevented by a common sense approach, coupled with some key IT security adjustments.

Creating the Requirements Management Plan and Requirements Traceability Matrix
The requirements management plan (RMP) is a document that describes how requirements will be analyzed, documented, and managed throughout the project. It is frequently published in conjunction with the requirements traceability matrix (RTM). Both the RMP and RTM are supposed to be created along with the requirements specifications, and all three documents act as key inputs in the creation of the project plan document. This excerpt from Project Scope Management: A Practical Guide to Requirements for Engineering, Product, Construction, IT and Enterprise Projects discusses creating the RMP and the RTM.

Overarching Topics in Managing the PSTN Transformation
This chapter from Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks provides an overview of major organizational overarching topics, for example, the project structure with roles and responsibilities, the PSTN migration process, as well as a checklist of the main questions and risks that should be considered during the project.

The Smart Grid and Privacy
This chapter from Data Privacy for the Smart Grid discusses the emerging privacy risk and the need for privacy policies, reviews relevant privacy laws, regulations, and standards, and outlines privacy-enhancing technologies and new privacy challenges.

Critical Infrastructure Executives Complacent about Internet of Things Security
Tripwire, Inc. recently announced the results of an extensive study conducted by Atomik Research on the security of the "Enterprise of Things" in critical infrastructure industries. The study examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study respondents included 404 IT professionals and 302 executives from retail, energy and financial services organizations in the U.S. and U.K.

The Lean Leader: A Personal Journey of Transformation
In The Lean Leader, Robert B. Camp uses a compelling novel format to tackle the nuts and bolts of leading a Lean transformation. You'll follow along as the characters face real crises and what seem to be unreasonable deadlines. After reading this book, you'll know how to shed the decision-making tasks that have cluttered their days and delegate those decisions to employees who are closer to the action. You'll also learn how to look over the horizon to define and communicate a new course of action and compel others to follow. Click here to read Chapter 1.

How to Create a 12-Month Plan in Just Two Hours
There's something about the blank slate of a brand new year that makes it a perfect time to get your group together and lay down plans for the next 12 months. Sounds like a good idea in theory, but it can be near impossible to persuade people to hunker down in a meeting room for a couple of days when their 'day jobs' are so demanding. In this article Nancy Settle-Murphy describes how (and why) a processed called the Magic Wall works in a face-to-face (FTF) setting, and explores how some of these concepts might be played out virtually.

Brainstorming
In this chapter from Techniques and Sample Outputs that Drive Business Excellence, H. James Harrington and Chuck Mignosa discuss brainstorming (creative brainstorming), a technique used by a group to quickly generate large lists of ideas, problems, or issues. The emphasis is on quantity of ideas, not quality.

The Digital Divide and the Global Post-2015 Development Debate
In this chapter from Digital Divides: The New Challenges and Opportunities of e-Inclusion, Jeremy Millard provides a global overview to put digital divides into perspective with a view toward the future. He argues that ICTs have a critical role to play in the proposed Sustainable Development Goals (SDGs), which will replace the Millennium Development Goals (MDGs) after they expire in 2015, but that stark digital divides, both between and within countries, could limit their potential effect.

 
Free Subscription to IT Today






Productivity Press



Google Reader or Homepage
Add to My Yahoo! Bookmark and Share


Search the Site


Facebook


From Our Authors

Nancy Settle-Murphy: CommuniqueThe Impossibility of Designing a "Perfect" Virtual Meeting in a Multicultural World

Rebecca Herold: Privacy Professor Tips of the Month—Who Ya' Gonna Call to Protect Your Privacy?


Events

SPTechCon: The SharePoint Technology Conference on February 21-24, 2016 in Austin, Texas

SharePoint Fest on March 1-3, 2016 in Denver

SMi's European Smart Grid Cyber Security Event on March 7-8, 2016 in London, United Kingdom

connect:ID 2016 on March 14-16, 2016 in Washington, DC

Cyber Security for Healthcare Exchange on April 3-5, 2016 in Atlanta, Georgia

InfoSec World 2016 on April 4-6, 2016 at Disney's Contemporary Resort in Lake Buena Vista, Florida

Web Application Security International Masterclass on April 13-14, 2016 in Vienna, Austria

Mobile Dev + Test and IoT Dev + Test Conference on April 17-22, 2016 at the Westin San Diego in San Diego, California

SharePoint Fest on April 27-29, 2016 in Washington, DC

The Women In Technology International (WITI) Summit on June 5-7, 2016 in San Jose

Nice Global Forum on Homeland Security and Crisis Management on October 25-28, 2016 in Nice, France

Partners

Here are links to all Rebecca Herold's monthly Privacy Professor Tips.

Guided Insights




© Copyright 2016 Auerbach Publications