The APICS Certified Supply Chain Professional (CSCP) exam consists of three modules which help you demonstrate your knowledge and skills...
Showing results 1 to 20 of 348
The planning and implementation of the Australian Defence Force's health records management system in 2009 has been found to have been 'deficient', resulting in a AU$110 million blowout of the project's original budget, according to the Australian National Audit Office.
If these numbers were reported in a corporate situation, they would be considered an absolute triumph of big data management and implementation. UPDATE: Response/corrections/clarifications from Washington Post reporter.
Buyers are tired of long software deployments. Here's some background and tips for rethinking how your company implements business software.
New research highlights the importance of communication in driving project success. Many executives are misguided on this topic.
Here's a policy to help ensure that everyone in your organization understands the guidelines and procedures surrounding the use of personal devices in the workplace.
Providing a mobile view of your VGE Vodafone Telecoms Management implementation, this app shows the Key Performance Indicators and...
Companies will need to fork out for device management and individual mobile and data plans to enable BYOD initiatives, but the extra costs mean they're holding back from implementation.
Spike in cyberattacks not spurring similar rise in cyberinsurance adoption worldwide due to issues of cost, trust and limited regulation, which reflect a still immature market especially in Asian region, observers note.
Blue Mercs Data Gateway is a framework features: support for SQL Server, MySQL, and Oracle, high level API generic abstraction for...
Technology remains nascent and will need to "prove itself" to financial institutions its effectiveness as an authentication tool over more mature methods such as biometrics, say observers.
Dubbed ACAD/Medre.A, malware targets AutoCAD software, steals and sends files to e-mail accounts located in China, says security vendor ESET, which is working with Chinese firms to prevent further harvesting of data.
Security and privacy concerns over patient data legitimate, but industry needs to adopt balanced view by defining importance of information and avoid being overly "paranoid", execs state.
Businesses need to decide if they want to devote resources to secure own infrastructure when cloud providers can offer more robust environment since their core business requires it.
Web sites, using names of government organizations or charity groups, conned money from businesses or individuals through blackmail, identity thefts and ransoms.
Cloud-based distributed denial of service protection a lucrative business opportunity, especially in Asia where awareness of DDoS attacks and risks is growing, industry exec says.
Students ought to be taught cybersecurity knowhow as soon as tech is introduced to them, and such courses should be holistic to include ethical and societal impacts, observers say.
Hackers using improved attack techniques with distributed denial-of-service, while new technologies spurred its propagation and damage level, industry watchers point out.
States need to plan and conduct online monitoring activities to stay informed and ready against cyberattacks, but issues such as national sovereignty pose challenges, say security watchers.
Cross-border treaties to collaborate and protect against online threats growing in importance, but potential allies need trust and right incentives to ensure such agreements are effective, security observers note.
update Social networking site reveals some of the reported 6.4 million passwords stolen matched its users; is taking measures to protect users and make passwords more difficult to hack.
Tough economic climate and low capital base mean small and midsize businesses not focusing on security, but being ill-prepared might hamper their survival efforts, market players warn.
Attempt to carve out Internet safe haven might bring additional security, as well as cost, challenges for operators and participating companies, security observers note.