Posts Tagged: control

How to Cause Panic: Television, Social Media and Emergency Management

Http://LeonardSipes.Com CBS “Sunday Morning” (best news show on television) produced “Casting a Skeptical Eye” on April 1, 2012 stating, “No fooling – it’s April 1st, which means we should be extra skeptical about everything today. But correspondent Mo Rocca says with technology letting mis-information and myths spread so quickly, being skeptical is good advice everyRead… Read more »

Sprint M2M to Boost Utility Industry Operations; Make Systems Smarter

Press Release Jan. 19, 2012, 9:00 a.m. EST Sprint M2M to Boost Utility Industry Operations; Make Systems Smarter Itron, Lanner, Power Insight and Silver Spring offer Sprint connectivity to utilities for automated monitoring and data collection http://www.marketwatch.com/story/sprint-m2m-to-boost-utility-industry-operations-make-systems-smarter-2012-01-19 OVERLAND PARK, Kan., Jan 19, 2012 (BUSINESS WIRE) — Electric and water utilities are changing the way theyRead… Read more »

Water Works – PLCs control all USA remote pump sites.

So it would be wise for all Water Works personnel to seek additional real-world PLC safety and reliability training, not just scholastic learning. (A PLC is a Programmable Logic Controller) See the video to learn more about the risk to our infrastructure and proper training. If any of you have questions about PLCs, I canRead… Read more »

Waldo in the Light of Austerity and Federal Debt Crisis, Part 2

“This is Part 2 of a 2 part series. Read Part 1 by clicking the link in the Related Articles box below this article. Jan Kallberg Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only thatRead… Read more »

The Art of Letting Go: Freeing Up Grief, Defusing Power Struggles and Inspiring Flow

The phrase “letting go” has long been a vital part of my stress management overview, especially related to breaking the “erosive spiral” of that all-consuming “b”-word. (When it comes to stress, actually, a number of emotionally charged “b” words jump to mind, for example, “botox,” or when you have a BMW colleague, which I recentlyRead… Read more »

Resistance is a Judgment, Not an Action

This article was originally published on the Tri Tuns Blog.OBSERVATION When talking about user adoption of major IT systems – CRM, ERP, HRIS, etc – at some point the discussion always focuses on overcoming “user resistance”. When I probe deeper and ask clients to define exactly what they mean by “user resistance” (what form itRead… Read more »

Tobacco Control State Highlights 2010

Tobacco Control State Highlights 2010 A new report released by CDC’s Office on Smoking and Health confirms that smoking rates can be significantly reduced if high-impact strategies such as higher cigarette prices, stronger smoke-free laws, aggressive media campaigns, and increased funding for tobacco control programs are implemented across the country. Tobacco Control State Highlights 2010Read… Read more »

Tobacco Control State Highlights 2010

At 5:30 p.m. CDT, CDC Director Dr. Thomas Frieden and HHS Secretary Kathleen Sebelius presented a new CDC report, Tobacco Control State Highlights 2010, at the Association of Health Care Journalists’ annual conference in Chicago. This important resource provides a state-by-state snapshot of tobacco use prevention and control efforts throughout the nation and highlights high-impact,Read… Read more »

Myth: “They Will Have No Choice – They Will Have to Use the System”

There tends to be an assumption amongst many IT and business leaders that if a system is core to their operations then people cannot perform their jobs without using it. This leads to the fallacy that employees will have no choice but to use the system and no further effort is required to drive andRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »