article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. The author’s views are entirely his own and may not reflect the views of IT Governance. on the Richter scale.

Risk 75
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

But on intranets, managers spent the following decade trying to use a combination of governance and centralised managed tools such as Web content management systems (WCMS), portals and enterprise search to tame the intranet. Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'.

Cloud 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

But on intranets, managers spent the following decade trying to use a combination of governance and centralised managed tools such as Web content management systems (WCMS), portals and enterprise search to tame the intranet. Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'.

Cloud 40
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Instead, the US government did, saying quote Stealing is stealing whether you use a computer command or crowbar and whether you take documents data or dollars. Vamosi: In 2002, I wrote an article for ZDNET titled “Jail Time is Not The Answer to Cyber Crime.” But MIT didn’t press charges. So yeah, was it a crime?

IT 52