- Secure Cloud Networking
- No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers
- Adapting Qi-compliant wireless-power solutions to low-power wearable products
- All Clouds are Not Created Equal
- The Hybrid Cloud Helps Midsize Companies Compete - Gaining Large Corporation Advantages at a Midsize Price
January 2008- This paper published by jobs.ac.uk describes what the right person at the right role at the right time can do. In corner offices and boardrooms across the globe, a new weapon: Talent Management is reemerging in the executive arsenal with powerful implications for driving and even predicting business success. It states that talent management can be a major part of a companys value proposition and a distinct competitive advantage.
January 2008- Mentor programs in education are found at all levels of the American system from preschool to graduate studies. Mentors are active in many schools both within and across the boundaries of populations of the school culture, including students, student teachers, new and experienced teachers, new to the school building teachers, teaching assistants, new and experienced administrators, state education agencies, university faculty, and community members. An effective mentor creatively paints from a palette of skills that ...
January 2008- Education providers concerned with developing, providing and funding education activities and curriculum relevant to the requirements of older people and facilitating their continued engagement with the group and with the wider community. There is an increasing recognition of the role older people can play in developing the personal capacity of others. At the same time such engagement enhances the confidence, well-being and sense of value of the older person. Mentoring can take place in many ...
January 2008- Mentoring is a learning relationship between two people. It requires trust, commitment and emotional engagement. It involves listening, questioning, challenge and support. It has a timescale. Mentoring has been extensively researched on both sides of the Atlantic and across different sectors of society for more than 30 years. Consequently, a great deal is known about the many facets of mentoring. There is research about the problems of mentoring and the issue of formal schemes versus informal ...
January 2008- Mentoring incorporates core values important to most of us. It demonstrates a belief in the value of the individual and that each person matters to society as a whole. It expresses a commitment to ongoing development, capacity building and the expectation of contributing to one?s own life and the lives of others. Mentoring is about recognizing potential, enhancing growth and encouraging discovery. The purpose of this paper is to engage the reader in exploring ...
January 2008- The paper from IEEE Company describes the program, its success and disappointments, and the changes that have made based on the lessons learned during the first year. It describes a new program for female undergraduate computer science students. The program uses recognized strategies for engaging women in computer science. It includes multi-faceted mentoring, community building activities, and a research program with significant educational components. The research component gives women an opportunity to work in research ...
January 2008- Race continues to be a critical factor as one examines relationships in organizations, particularly if they are located in a U.S. based context. Race, is a socially embedded phenomenon that affects just about every aspect of lives, and as such, provides a critical lens with which to examine the mentoring literature. This research paper published by University of Pittsburgh explores how race has been positioned within the literature to provide a context for the ...
January 2008- This paper from City of Toronto Company identifies challenges inherent in setting personal and professional goals effectively, managing information, managing stress, adapting to change and preparing for leadership. Mentoring must be able to respond to special career development needs. An effective mentor identifies formal opportunities for career development, for example, short courses and workshops with an emphasis on team-based practice.
January 2008- Submarines revolutionized the way war was waged at sea. Silent, invisible and deadly, submarines challenged the very core of naval strategy. There are similar threats alarming in the deep that will challenge the effectiveness of every Human Resources Professional. Just as the Navies of the world found tools such as sonar and enhanced listening devices to reduce the threat of submarines, Human Resource departments need to develop the tools necessary to peer beneath the murky ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services