Yearly Archives: 2011

PM Podcast Episode 185 How to Develop Your Project Team’s Leadership Skills (Project Leadership Series)

This week’s episode of The Project Management Podcast: In this premium episode we are going to continue to develop project leadership skills. But not just anybody’s skills. We are focusing on what you and I can do as project leaders in order to enable our own project teams to take more leadership responsibilities. After all,Read… Read more »

Enhancing Functionality and Security of your Enterprise with vPro

Enhancing Security Is a Full Spectrum Activity CTOlabs.com, a partner site of CTOvision.com, has just published a new guide meant to help further the awareness of the many new security features being fielded in today’s computer hardware. This guide, titled “Leveraging Hardware Design to Enhance Security and Functionality,” provides context, tips and strategies designed toRead… Read more »

Looking for All the Wrong Answers in All the Right Places: Is Christie Brinkley an Enterprise Model?

Reposting of an old article, still appropriate for today It was a Thursday afternoon and I was looking for an enterprise model. Specifically, I was searching for various models of how an enterprise business was organized. Using a common Internet search engine I tapped in the words and waited for the hits. I got 8,600.Read… Read more »

HopStop adds cities and features

HopStop, an online source of transit and walking directions, has added 20 new cities to its market and updated its search tools. Now people from 57 metropolitan areas world-wide — including Moscow, Winnipeg, Las Vegas, and Charlotte — have the option to search for one-way, round-trip and multi-stop options and to obtain city-to-city directions viaRead… Read more »

Is Social Recruiting a Growing Hotbed for OFCCP Claims?

CIO.com recently published a very informative article titled “Social Networks: A New Hotbed for Hiring Discrimination Claims.” The article gives a comprehensive perspective into the world of corporate recruiting, particularly how recruiters are using social networks more and more to evaluate potential hires. Social networks like Facebook, LinkedIn and Twitter give recruiters and hiring managersRead… Read more »

Templates For Project Management

Share This! Ah, templates. Everyone wants templates for project management. They can be great for reference. But watch out. I received this question in an email from Sudhir: Also appreciate if I could get some samples of Requirement Traceability Matrix, Requirements specification, Risk Register, Stakeholder Register, Progress Report, Status Report etc I know about theseRead… Read more »

Kitsap Transit plans real-time location info

Kitsap Transit (WA) plans to install automatic vehicle location equipment on all its buses, with a goal of providing real-time information to its customers via smart phones, computers, and kiosks at major stops. “It’s really whiz-bang,” service development director John Clauson told the Kitsap Sun. “I’m very excited about having texting ability, having the kiosks,Read… Read more »

New app rates urban walkability

A new web-based application from Walkonomics rates the walkability of city streets based on eight factors: Road safety Easy to cross Pavement/Sidewalk quality Hilliness Navigation Fear of crime Smart and beautiful Fun and relaxing These factors are distilled into a five-star rating and plotted on a Google map with color-coded markers. Ratings are drawn fromRead… Read more »

2011 ALA Annual Conference and Exhibit

The ALA Annual Conference and Exhibit is coming up on June 23-28, 2011 in New Orleans, LA. This conference brings together more than 25,000 librarians, educators, authors, publishers, literacy experts, illustrators and the leading suppliers to the market. (2011 ALA Conference Overview) Here are some key ALA 2011 conference links: ALA 2011 Preliminary Program RegisterRead… Read more »

CNO Part 2: Computer Network Defense

This is the second installation on my series about Computer Network Operations (CNO). The last blog explored the actions known as Computer Network Exploitation (CNE), and as always, please feel free to comment. Today, the topic switches from exploitation to defense. Computer Network Defense (CND): Includes actions taken via computer networks to protect, monitor, analyze,Read… Read more »