First Steps Toward Getting Your PMP

Working towards your PMP? I am too. I have spent countless hours on PMI’s website, reviewing the requirements and the timeline of the process. What I learned is that you need to meet all of the requirements before you even begin your online application. The web site “says” you can apply online or through a paper application, however, it really sounds like they prefer the online version.

Read more

A Guide to Riding the Mobile Learning Wave

In January 2012, AllThingsD.com reported that Apple in its first quarter had sold 15.4 million iPads compared to HP’s fourth-quarter sales of 14.7 million PCs. It’s not a completely fair comparison as HP’s fourth quarter doesn’t include the Christmas season, which usually boosts retailers’ numbers. But, nonetheless, it’s a watershed moment when one considers tablets are now outselling PCs.

Read more

9 Cyber Security Threats to Watch Out for in 2013

Malware has been around for a while and is something IT security personnel already know to watch out for. But this software that is used by attackers to disturb operations, gather information, or gain access to systems will expand its threat in 2013 to include cloud computing, BYOD, and mobile devices. As online criminals become cleverer, here are just a few ways they will attempt to threaten your systems in 2013:

Read more

Beyond Engagement The Involved Employee

AN OLD JOKE GOES, “When it comes to a
breakfast of bacon and eggs, the chicken is
engaged; but the pig is involved!” Beneath
this witticism lies a deeper truth: when
we need the very best from our people –
when we need them to be ‘all in’ in terms
of their commitment — it’s not enough for
them to contribute from a distance: we need to provide an
opportunity for them to be involved and take ownership for
the outcome.

Read more