How to perfect the ‘elevator’ pitch

Networking is constantly hyped as the best way to find a job or project, but, as experts explain, if you don’t have a solid 30-second pitch ready, time spent networking is time wasted.

Improve your development processes with the Capability Maturity Model

The Capability Maturity Model (CMM) is a development methodology that’s designed to help projects make use of reusable processes. There’s some pain involved in making the switch, but the benefits to development staff and the organization make it worthwhile.

Eleven traits that distinguish successful IT managers

To succeed as an IT manager and to advance your career into the executive sphere, you need some very specific traits–11 to be exact. From needs assessment to team building, these are the skills you need to be at the top of your game.

Defining the ideal IT organization

Aligning IT with the business tops the list of goals for most CIOs. Here are the top IT issues and challenges facing CIOs in achieving that goal.

Why IT business alignment veers off track and how you can keep it on course

It’s one thing to say that IT is aligned with business strategy and another to make sure it’s happening. Understand where alignment goes wrong, and then take some simple steps to avoid that scenario.

Five ways to improve your intranet’s usability

Your intranet may be costing your organization thousands of dollars and leaving your employees frustrated. Find out the cure for the five biggest flaws uncovered by the Nielsen Norman Group’s recent intranet usability study.

Manage multiple possibilities with Excel scenarios

An Excel spreadsheet is a wonderful tool for “what if” analysis because you can change results throughout the workbook by editing a single cell. A disadvantage to this process, however, is that it isn’t always easy or convenient to restore the original values, especially when you’re changing multiple cells.

Fortunately, Excel offers the Scenario Manager, which allows you to substitute values in a number of cells … [ Read more ]

Beware these false security assumptions about work-from-home PCs

Work-at-home employees who link personal systems to corporate networks may expose enterprises to security risks. Four common assumptions make this a particularly dangerous practice. Get the details on each assumption, learn how it impacts security, and get suggestions for shoring up systems.

The four key elements in effective systems management

Systems management can be a failing prospect if you don’t have the four key elements in place. Learn how ignoring processes, data, tools, and organization can stop your systems management effort before it starts.