article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. This is a guest article written by Robert A. The author’s views are entirely his own and may not reflect the views of IT Governance.

Risk 75
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'. One of the earliest intranet case studies was actually written by Jakob Nielsen and Darrel Sano in 1994 about their approach to designing Sun Microsystems' intranet - and yes, one of the methods was card sorting !

Cloud 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'. One of the earliest intranet case studies was actually written by Jakob Nielsen and Darrel Sano in 1994 about their approach to designing Sun Microsystems' intranet - and yes, one of the methods was card sorting !

Cloud 40
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Vamosi: In 2002, I wrote an article for ZDNET titled “Jail Time is Not The Answer to Cyber Crime.” ” I wrote about the pending Cyber Security Enhancement Act of 2002 (CSEA) and said: “ The problem with this legislation is that it's often very difficult to determine who is responsible for any given cybercrime.

IT 52