Category: compliance

ERP, Sustainability + and Corporate Business Valuations

Thanks to MIT for their leadership position in pulling together the conceptual with the implementable! After reading their below article, then speaking with a leader in the emerging new norm in fashion and garment (www.newvesturesfashion.org) and with a 30+ year

Posted in adjacent possible, analytics, BI, business architecture, CEO, collective intelligence, compliance, CPG, creativity, disruptive, emerging, ERP, information technology, innovation, inspiration, internet of things, IoT, ITconnecter, IVIS, M2M, manufacturing, MIT Sloan, process, process industries, taxonomy, thought leader, transformation, transparency, VaaS, vision Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

IVIS-42; Innovate Through Early Standards Adoption #OpenFin | Secure HTML5 Runtime

Next Step:  For financial services firms, the next step is easy.  Have you explored and evaluated OpenFin and/or  the Google Chromium project?  For non-financial services firms, is there value to your vertical in what is being done here?  How can

Posted in business architecture, business of IT, BYOD, Chrome, CIO, compliance, creativity, CTO, financial services, Google, GUI, HTML5, information technology, IT as a business, ITBM, ITconnecter, ITDM, ITFBM, ITFM, ITFMA, IVIS, software, TBM, user interface Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Microsoft joins FIDO group hoping to replace passwords w/public key cryptography | Ars Technica

Microsoft joins FIDO group hoping to replace passwords with public key cryptography | Ars Technica.

Posted in BYOD, CISO, compliance, cybersecurity, DaaS, industry, interoperability, ITconnecter, IVIS, Microsoft, public key, risk, security Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

“Securing the Internet of Things: Is the IoT DoA?”, by Jason Bloomberg of ZapThink

Good article on security challenges associated with the Internet of Things.  While the article closes with personal opportunity, the article also highlights the importance of security in the technology, not just IT, realm. The more involved an enterprise business is

Posted in analyst, business of IT, compliance, consumer, CrossWaves, CTO, customer, cybersecurity, industry, internet of things, IT as a business, IVIS, privacy, security Tagged with: , , , , , , , , , , , , , , , , , , ,

IVIS-34, Innovation via corporate policy – Dallas Tech Firm Delivers New Maternity Policy with Paid Leave for Both Parents | General Datatech

IVIS-34, Existing corporate policies, including in HR, can be “innovated” as well as new ones can be implemented (see IVIS-16 and IVIS-30) Next Step – Are there any existing policies “ripe” for innovation opportunity in your company?  Maybe “employee onboarding”

Posted in business, CEO, CIO, compliance, creativity, CrossWaves, education, employment, industry, innovation, inspiration, insurance, ITconnecter, job, leadership, management, policy Tagged with: , , , , , , , , , , , , , , , , , , , , , , ,

NIST draft cybersecurity framework | Federal Times | federaltimes.com

…its a good start, and can be a useful reference document as it evolves for mid-sized companies not having the depth of resources a F500 enterprise might… NIST seeks feedback on draft cybersecurity framework | Federal Times | federaltimes.com

Posted in compliance, Crosswaves Ventures, cybersecurity, education, government, ITconnecter, IVIS, privacy, risk, security, VaaS, vision Tagged with: , , , , , , , , , , , , , , ,

IVIS-31 – Use Security/Privacy Policies to Improve Customer Relationships | MIT Sloan Executive Education Blog

IVIS-31, Use Security/Privacy Policies to Improve Customer Relationships Next Step –  Review the article and determine if the same opportunity exists in your company.  If not, consider other security or privacy policies, legal regulations or even DR/BCP processes.  Can any

Posted in agile, agility, BrandIT, CIO, compliance, creativity, Crosswaves Ventures, customer, industry, information technology, innovation, inspiration, ITconnecter, IVIS, leadership, privacy, security, TBM, transformation, user interface, UX, VaaS, vision Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , ,

TBM and the cloud, CloudHealth Technologies

Congrats to my former client, Melodye Mueller, now VP of Marketing at CloudHealth* Technologies! As my partner (Rich Froble) and I launch Crosswaves Ventures to focus on TBM (including Apptio software), we’ve been exploring the role of ITSM/ITIL under TBM.

Posted in agile, agility, analytics, Apptio, CIO, cloud, compliance, creativity, Crosswaves Ventures, elasticity, hybrid cloud, industry, information technology, innovation, integration, ITconnecter, ITIL, ITSM, IVIS, nimble, process, software, startup, TBM, transformation, VaaS, vision Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

IT Service Management “Value?”

Interesting survey done by Informationweek Research regarding ITSM and relative maturity from 200+ IT respondents… The below indicates that while the # 1 benefit cited by respondents is “better relationship with IT and customers” at 39%, 46% of the respondents

Posted in CIO, compliance, education, industry, information technology, integration, ITconnecter, ITDM, ITSM, IVIS, manufacturing, process, risk, TBM, vision Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Microsoft Licensing & DaaS: You asked…we answered! Part 1 Licensing – Blogs – Desktone

GREAT 4 part Microsoft licensing Q&A from Desktone CTO Danny Allan…just heard MS Surface tablets include VDA to try and force cos. to use Surface over iPads Microsoft Licensing & DaaS: You asked…we answered! Part 1 Licensing – Blogs –

Posted in Android, Apple, BYOD, CEO, CIO, Cirrus Dynamics, Citrix, cloud, compliance, DaaS, desktop, Google, HP, HVD, iOS, iPad, ITconnecter, IVIS, LibreOffice, licensing, Microsoft, open source, OpenOffice, smartphone, software, tablet, thinclient, VaaS, VDA, VDI, VMWare View, VXIaaS, Windows Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Clef two-factor authentication
%d bloggers like this: