Blue Ocean Strategy Tools and Frameworks A useful exercise for a corporate management team pursuing profitable growth is to plot the company’s current and planned portfolios on the Pioneer-Migrator-Settler Map created by W. Chan Kim and Renée Mauborgne. © Kim & Mauborgne. All rights reserved. Settlers are defined as me-too businesses, migrators are business offerings better than most in the marketplace, and a company’s pioneers are the businesses that offer unprecedented value. These are a company’s blue ocean strategic moves, and are the most powerful sources of profitable growth.
Congress Asks to Review DoD and NSA Contracts With HBGary Update: This story was updated with comment from the House Armed Services Committee and Johnson’s office March 17, 2011 at 2 p.m. PDT. Anonymous’ recent exposure of a federal contractor’s plan to take down WikiLeaks has led to a congressional probe seeking data on contracts the company and its partners hold with the U.S. military and intelligence agencies. The House Armed Services Subcommittee on Emerging Threats and Capabilities on Wednesday asked the Defense Department and its intelligence arm — the National Security Agency — to hand over copies of any contracts they may have signed with HBGary Federal, Palantir Technologies and Berico Technologies. Rep. Hank Johnson (D-Georgia) grilled Gen.
Identity Assurance & Strong Authentication Solutions - ActivIdentity Delivering a full range of flexible authentication and credentialing options that give businesses confidence in their users’ identities, the HID ActivID® IT Security portfolio protects access to everything from the cloud, to the data, to the door. HID Global’s ActivID product offering gives enterprises, financial institutions, governments, and healthcare organizations a single, coordinated view for logical and physical access, enabling them to efficiently manage various credentials for all of their different users, across all types of devices. HID Global understands that each customer has different needs, and therefore requires a different solution. With that in mind, we offer multiple form factors and deployment options for our solutions, to effectively address every application.
Case Studies - SchellingPoint Case Study: Chartering a Client-Server to Web Application Transfer Ensuring full support and commitment to a complex, expensive, IT initiative. A government software and services firm wanted to upgrade a core enterprise application from client-server to the internet. The current version was established and operating in multiple states across the country, and several CIO’s indicated interest in collaborating with the supplier in the transition. Balkinization Bradley Manning, Barack Obama and the National Surveillance State In 2006, Sandy Levinson and I predicted that the next president, whether Democratic or Republican, would ratify and continue many of President George W. Bush's war on terrorism policies. The reason, we explained, had less to do with the specific events of September 11th, and more to do with the fact that the United States was in the process of expanding the National Security State created after World War II into something we called the National Surveillance State, featuring huge investments in electronic surveillance and various end runs around traditional Bill of Rights protections and expectations about procedure. Barack Obama has largely confirmed these expectations, much to the dismay of many liberals who supported him.
First Cyber Security - Home Protecting your Company's Brand online is fundamental to maximising your bottom line. The loss of revenue from counterfeit goods, additional costs of fraud or the damage to goodwill and brand image from fake websites does nothing but harm to the confidence of those customers you have tried so hard to attract. S.O.L.I.D. Authentication® - Secure On-Line ID Authentication
5 Strategy Questions Every Leader Should Make Time For Have you ever noticed that when you ask someone in your company, “How are you?” they are more likely to answer “Busy!” than “Very well, thank you”? That is because the norm in most companies is that you are supposed to be very busy – or otherwise at least pretend to be – because otherwise you can’t be all that important. The answers “I am not up to much” and “I have some time on my hands, actually” are not going to do much for your internal status and career.
Japan syndrome shows why we need WikiLeaks The damaged third and fourth reactors of the Fukushima No1 power plant. Source: AFP IN December 2008, an official from the International Atomic Energy Agency pointed to "a serious problem" with nuclear reactors in areas of Japan prone to earthquakes. Recent earthquakes "have exceeded the design basis for some nuclear plants", he told a meeting of the Nuclear Safety and Security Group of the Group of Eight countries. Moreover, safety guides for seismic activity had been revised only three times in the past 35 years, he added. The information was recorded in a US diplomatic cable and comes to us courtesy of WikiLeaks. GB Group. Age & Identity Verification to prevent ID Fraud; People Tracing, Address, Data Management, Data Cleaning & Database Marketing Applications. Enabling global online business, is our business International software and services for quick and accurate customer registration; and the verification of identities of individuals and businesses remotely Find out more