Remove Diversity Remove Examples Remove Information Technology Remove System
article thumbnail

2020 Top CHRO List – The People Leaders To Watch

N2Growth Blog

For members of the 2020 Top CHRO List, Diversity and Inclusion are a cornerstone of their work, not an afterthought. With a diverse background in human resources, information technology, and operations, his business and leadership acumen is only exceeded by his commitment to making others better.

article thumbnail

Fueling Business Process Management with the Automation Engine that Can!

Strategy Driven

Today’s C-level executives understand peripheral management of their critical applications, data systems, and shared services is not an effective, efficient, secure, or financially-feasible effort and require more robust, permanent solutions for assimilation into their BPM. Richard Milam is the president and CEO of EnableSoft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Here's Why Successful Presentations Planning Must Begin with an.

Strategy Driven

They’ll help you determine the different examples or different words you might choose for the presentation. For example, you might speak differently to senior citizens than to a group of teenagers. For example, let’s say you’re making a presentation to your senior executives to get funding for a project.

article thumbnail

Embrace the Complexity of Cyber Defense

Harvard Business Review

Traditionally, cyber security research has focused on technical solutions to specific threats: for example, how to filter spam or protect PCs and mobile devices against the latest malware. This approach has greatly enhanced our ability to defend information systems against attack.

article thumbnail

Create a Strategy That Anticipates and Learns

Harvard Business Review

Consider, for example, the work that Apple is doing with Epic (an electronic health record provider for hospitals and large medical groups). Not only can patients gather more comprehensive “home-based” data with Apple’s HealthKit platform , but also potentially stream that data (with permission) to their doctors via Epic’s systems.

article thumbnail

Rethinking Security for the Internet of Things

Harvard Business Review

Cyber attacks, once primarily directed against networks to steal confidential information and wreak virtual havoc, have begun to expand and are now directly affecting the physical world. They also have the potential to allow cyber attackers into the physical world in which we live as they seize on security holes in these new systems.

article thumbnail

The End of the Line for the Analog Phone Network

Harvard Business Review

It’s a perfect example of the phenomenon that Paul Nunes and I refer to as Big Bang Disruption. To complete the revolution in IP voice, however, we still need to untangle the remnants of profoundly complicated regulatory machinery that for decades carefully controlled the Bell System at the federal and state levels.