Day 1 (Wednesday) of EDUCAUSE 09 has been defined for me by Kenneth Green's ONE/TWO punch of his essay "LMS 3.0" and his presentation of the 2009 Campus Computing Survey. Everywhere I went on the ...
How does a chief information security officer (CISO) navigate an ever-changing cybersecurity environment full of heightened threats with constrained resources? To answer that question and understand ...
The constraint management model identifies performance standards for employees and seeks to improve operational efficiency. A business using constraint management requires structured schedules for ...
Most of the companies I work with tell me that they are resource constrained and do not have enough capital and engineers to do everything they want to do. I tell them that is a blessing not a curse.