Remove 2004 Remove Case Study Remove Communications Remove IT
article thumbnail

Yes, I am a broken record at times: Is this really revolutionary?

ChiefTech

see my case study from 2004 ) At Ernst & Young Australia we even supported account teams with a structured process to deploy project databases (called Engagement Team Databases and Pursuit Team Databases , they could be deployed on demand using an automated process) where users could edit each others pages or simply add comments.

article thumbnail

IDEA 2008: An Interview with Bill DeRouchey

ChiefTech

I had been an information architect working strictly on web projects from 2000-2004, either within an agency or as a consultant, respectively before and after the tech collapse. " In 2004, I was hired as an IA by Ziba Design, a product design company, not an obvious match. So I had many angles on "tech."

IT 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

Real-time audio and video communication. In fact, the eventual aim was to allow what we would now recognise as wiki-style authorship of content because: "Making it easy to change the web is thus the key to avoiding obsolete information.". For end-users, the base line or 'native' intranet included: Email. Groupware and team collaboration.

Cloud 89
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

Real-time audio and video communication. In fact, the eventual aim was to allow what we would now recognise as wiki-style authorship of content because: "Making it easy to change the web is thus the key to avoiding obsolete information.". For end-users, the base line or 'native' intranet included: Email. Groupware and team collaboration.

Cloud 40
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

FireMon is a Dallas-based vendor for cybersecurity, compliance, and risk mitigation started in 2004. Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. FireEye Mandiant.

Risk 67