Close message

Welcome to Kanopy

Brought to you by Fontana Regional Library

Not your library? Find it now

WatchIT

WatchIT >

53
Videos
Loading...
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored…
Effective Global Program Management for IT
Today's technology and business initiatives have broken free of the local enterprise by expanding to involve organizations and workers across the far reaches of the globe. In this report, Paula Wagner, project management expert and co-author of the popular new…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever…
The Mobile First Approach to Application Development - Information on New Technologies, Techniques and Solution Providers
To help cope with the seemingly insatiable appetite for new mobile applications, as well as reduce development backlogs, enterprises are now looking toward a new process, Mobile First Application Design and Development. Mobile First offers a significant advantage over traditional…
Enterprise Security Landscape: Risks and Controls
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director…
Introduction To IT Controls for Technologists
This course describes the importance of IT controls and their potential benefits to the technology staff. Major topics include what controls are, why they are needed, applying controls to IT, building a control framework, and discussing critical IT control areas.…
Agile Software Development: An Introduction
The Agile Method allows modern development teams to rapidly build software that is both efficient and effective. This course provides a comprehensive introduction to this approach to software development. The course begins with the major teaching points. Next, the methodology…
Modern Information Systems - IT Infrastructure
Today's modern information systems are difficult for the general business person to understand because the business work is largely managed inside a 'black box.' In this two-part program, technology writer and consultant Roger Grannis clearly explains and simplifies the inner…
2 videos
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern…
Social Media for Business: What You Need to Know
Public and private sector organizations must tread carefully with social networks or risk the possibility of legal entanglements, loss of business, and perhaps worst of all, unhappy customers. In this report, expert and attorney Peter Vogel, discusses the key areas…
Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Freedom of speech is an ideal that historians tell us has its roots in the early 5th century; the concept is generally credited to the ancient Greeks. The right to privacy is an equally coveted principle that has had an…
Virtual Teams: Strategies for Success
Organizations that have successfully incorporated virtual teams into their business practices have realized significant benefits. Benefits including reduced business costs, accelerated product delivery and improved levels of competitive advantage. However, along with the advantages virtual teams can offer come many…
Social Media in the Workplace: Advice and Best Practices
In this report, James Boyan, an attorney with the New Jersey-based law firm of Pashman Stein, explores current issues with the "social at work" scene. We'll learn about government regulation and oversight, as well as the current thinking on employer…
Introducing IoT: The Internet of Things
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
The Five Big Bang Theory of the Internet
In this WatchIT On the Horizon program, The "Five Big Bang" Theory of the Internet, Peter Vogel, a technology expert and attorney from the firm of Gardere Wynne Sewell LLP, based in Dallas, Texas explores the evolution of the Internet…
Big Data: Good for the Customer Not Just the Business
An important lesson learned about Big Data is that collecting and storing data may be the easier part of the job, analyzing and utilizing the data, well, that's the challenging task. It's become abundantly clear, that today's organizations need to…
Big Data in the Enterprise: An Introduction
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and…
Insider Threats: Avoiding the Next Snowden
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive…