Browse by Tags

Tagged Content List
  • Blog Post: This Blog URL Has Changed – Please Update Your Readers

    Things have been quite on the blog for while. There is a LOT of code being cranked out at the moment as we work towards some deadlines in the summer on various projects. Our team name has also changed from the Connected Information Security Group (CISG) to the Microsoft IT Information Security Tools...
  • Blog Post: Trip Report : Day Three of Gartner BPM Conference

    Marius here again..... Highlights: On average, 80% of the IT budget goes toward maintenance and only 20% goes to new projects. On top of that, IT budgets keep shrinking year after year. This creates a big challenge in funding large initiatives like BPM. IT projects for cost reduction have been successful...
  • Blog Post: Designing Whole Systems

    Hi Dennis Groves here...... Recently I was questioned over a comment I made about a USB key being functionally equivalent to a Smart Card in a discussion about bit-locker . I of course not understand that they are technically not equivalent. Smart cards have their own operating systems and USB keys don...
  • Blog Post: Trip Report : Day Two of Gartner BPM Conference

    Hi Marius here again with highlights from day 2 of the Gartner BPM conference. Back of the Napkin You may have heard of the book called The Back of the Napkin : Solving Problems and Selling Ideas with Pictures. It’s one of the latest books creating a buzz in business community. Dan Roam, the author...
  • Blog Post: Trip Report : Day One of Gartner BPM Conference

    Marius Grigoriu here.... I am a Program manager with CISG and in keeping with good program management its straight down to business. Today was the first official day of the Gartner BPM Conference at Washington DC and I am posting daily trip reports. In the Connected Information Security Group we believe...
  • Blog Post: It’s All About the Persona(s)

    Birm here… Has this ever happened to you? It’s happened to me. You sit down to write an application that looks great and works even better. The UI you’ve designed is a model of esthetics and efficiency. You’ve demo’d it to the developer in the next cubicle and she’s...
  • Blog Post: Checklists and Mnemonics

    Dennis Groves here.... The most common list is the to-do list , and it is the one we are all most familiar with and so the real value of a checklist is often very misunderstood . Aviation and medicine make heavy use of them. Computer programs are basically a sequential list of operations to for the computer...
Page 1 of 1 (7 items)