Securing the organization, where is the weakest Link? – Management
The Crac des Chevaliers, Syria is an excellent example of medieval fortification during the Crusader wars and is an excellent representative of the fusion of European and Asian approaches to security.
(more) |
Tis the Season for Turkey and Deviled CopperEggs
While Feliz Navidad permeated our eardrums at a local Austin eatery, we looked around at one another with the same thought in our head… “Can the holidays already be here?” We began discussing our Thanksgiving plans and what each of us was most looking forward to on Thursday.
(more) |
7 Ideas for Your Next Social Network for Employees
Since attending Dreamforce in early September, I spend a lot of airplane time pondering the future of social enterprises, especially social networks for employees. Whether we’re talking about co-workers or customers, the objective is still the same – successful attraction and retention.
|
A view from the clouds: Cloud computing for developers
IBM Workload Deployer v3.1 firmware has been released and is available for download. V3.1 includes many improvements, building upon the solid foundation that was laid in V3.0 and earlier releases of WCA. There are many improvements and enhanced features.
(more) |
The Cloud is Alive !
On a vacation you often find that the best way to enjoy is to try and disconnect from the regular working day routine. Part of my blogging tasks include searching for knowledge resources and publishing news and articles to my followers.
(more) |