This Blog URL Has Changed – Please Update Your Readers

Things have been quite on the blog for while. There is a LOT of code being cranked out at the moment as we work towards some deadlines in the summer on various projects. Our team name has also changed from the Connected Information Security Group (CISG) to the Microsoft IT Information Security Tools Team. This…

1

Trip Report : Day Three of Gartner BPM Conference

Marius here again….. Highlights: On average, 80% of the IT budget goes toward maintenance and only 20% goes to new projects. On top of that, IT budgets keep shrinking year after year. This creates a big challenge in funding large initiatives like BPM. IT projects for cost reduction have been successful in the past, but…

1

Designing Whole Systems

Hi Dennis Groves here…… Recently I was questioned over a comment I made about a USB key being functionally equivalent to a Smart Card in a discussion about bit-locker. I of course not understand that they are technically not equivalent. Smart cards have their own operating systems and USB keys don’t. And that is huge;…

1

Trip Report : Day Two of Gartner BPM Conference

Hi Marius here again with highlights from day 2 of the Gartner BPM conference. Back of the Napkin You may have heard of the book called The Back of the Napkin: Solving Problems and Selling Ideas with Pictures. It’s one of the latest books creating a buzz in business community. Dan Roam, the author of…

2

Trip Report : Day One of Gartner BPM Conference

Marius Grigoriu here…. I am a Program manager with CISG and in keeping with good program management its straight down to business. Today was the first official day of the Gartner BPM Conference at Washington DC and I am posting daily trip reports. In the Connected Information Security Group we believe that BPM or Business…

1

It’s All About the Persona(s)

Birm here… Has this ever happened to you? It’s happened to me. You sit down to write an application that looks great and works even better. The UI you’ve designed is a model of esthetics and efficiency. You’ve demo’d it to the developer in the next cubicle and she’s loved it! Then you hand it…

1

Checklists and Mnemonics

Dennis Groves here…. The most common list is the to-do list, and it is the one we are all most familiar with and so the real value of a checklist is often very misunderstood. Aviation and medicine make heavy use of them. Computer programs are basically a sequential list of operations to for the computer…

1