WatchIT

WatchIT >

65
Videos
Loading...
Agile Software Development: An Introduction
The Agile Method allows modern development teams to rapidly build software that is both efficient and effective. This course provides a comprehensive introduction to this approach to software development. The course begins with the major teaching points. Next, the methodology…
Social Media for Business: What You Need to Know
Public and private sector organizations must tread carefully with social networks or risk the possibility of legal entanglements, loss of business, and perhaps worst of all, unhappy customers. In this report, expert and attorney Peter Vogel, discusses the key areas…
Modern Information Systems - IT Infrastructure
Today's modern information systems are difficult for the general business person to understand because the business work is largely managed inside a 'black box.' In this two-part program, technology writer and consultant Roger Grannis clearly explains and simplifies the inner…
2 videos
Big Data in the Enterprise: An Introduction
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and…
Intoduction to France's "Right to Disconnect" Law - Advancing the Management Skills of IT Professionals
A new law dubbed the, "Right to Disconnect Law," says that French employers must specify certain hours when workers will not have to respond to, or even check, their work email. The French government says the law will "ensure the…
Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Freedom of speech is an ideal that historians tell us has its roots in the early 5th century; the concept is generally credited to the ancient Greeks. The right to privacy is an equally coveted principle that has had an…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored…
Introducing IoT: The Internet of Things
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever…
Extensible Business Reporting Language
The Extensible Business Reporting Language, or XBRL, is a language that enables the electronic communication of financial data. XBRL has truly revolutionized business financial reporting around the globe. XBRL offers an opportunity for IT professionals to closely align with their…
3 videos
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern…
The Mobile First Approach to Application Development - Information on New Technologies, Techniques and Solution Providers
To help cope with the seemingly insatiable appetite for new mobile applications, as well as reduce development backlogs, enterprises are now looking toward a new process, Mobile First Application Design and Development. Mobile First offers a significant advantage over traditional…
Business Intelligence: Best Practices for Successful Project Management
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This program discusses best practices for organizing and managing a BI…
Principles of Cloud Computing - Perspectives on Business, Technology & Cost
This course, the first of a 3-part series, lays out the foundation and key principles of cloud computing. The initial section presents the variable cost business model, which some believe may be the greatest contribution that cloud computing is going…
Enterprise Security Landscape: Risks and Controls
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director…
Perspectives on Business Continuity & Disaster Recovery Planning 
Business Continuity & Disaster Recovery planning, also known by the acronym, BC/DR plans, are top of mind issues for IT and business professionals today. Smart organizations routinely evaluate and review their plans, make changes were needed and then always test…
Managing Virtual Teams: Techniques and Best Practices
A key tool enabling global businesses to keep pace, remain competitive and be profitable is the Virtual Team. Managing Virtual Teams is a skill that many leaders struggle with. This course will offer insights and best practices to help managers…
Mobile Application Management: An Introduction
The widespread adoption of mobile devices coupled with an insatiable appetite for new applications by workers, has forced organizations to broaden the scope of their mobile policies and strategies. Today, IT and business leaders must look beyond simply managing mobile…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
Social Networking - Does it Work at Work?
Not all that long ago, CIOs and IT managers were listening to the grumblings of many of their business colleagues who wanted to shut down or ban employee access to popular social networking sites such as Facebook, Linkedin and Twitter.…