Remove 10
Remove 2010 Remove Computer and Electronics Remove Education Remove IT Remove Security
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared.

article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Plug a keyboard and mouse into a PS3 and you have a pretty good cloud computing home workstation - we had the session schedule up and running in this format. Hot Topics iPhone iPad Enterprise 2.0 Office 2.0 Office 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Conferences as conversation starters | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Conferences as conversation starters By Oliver Marks | June 30, 2008, 10:00am PDT Summary Ten years ago Comdex - the gigantic Las Vegas hi tech conference and show - was reaching its high point.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Wearing a fascinating looking tube valve watch (which didn’t look like Apple’s industrial design) Steve took to the stage and ran through a rapid history of modern personal computing from a very personal perspective.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Later in the last century email swept the world, creating another wave of huge change in the way we communicate. However, in large enterprises many people believe their email is being read or bugged by management.

article thumbnail

Openness | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. The challenges facing Jive’s prospects are well characterized by Sam - locked down, silo’d work methods make it a misery working in a blizzard of electronic paperwork and email.

Paper 40
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Data is not just a resource for better marketing, better service and delivery.

GDPR 120