Media:
English
Navigation:
English
Please enter your search term
Sign In
Queue
Favorites
Cloud TV
FreeAir.tv Channels
My Library
A-la-carte Subscriptions
History
My Account
My Devices
Earn Cash
Help
International TV
Films
Packages
Video
Audio
Radio
Kids
Dorsey, Wright research is conducted along technical lines, adhering to the relationship between supply and demand. We believe this simple but accurate economic theory is manifested as a constant battle between these two forces for control of the equity vehicle. It is this objective, logical approach which helps reduce uncertainty in the market. We believe our Research, coupled with your own fundamental research, will greatly increase your probability of success whether your investment business is equities, fixed income, mutual funds, commodities or ETFs. (For complete podcast list please visit www.dorseywright.com)
Dorsey Wright & Associates Technical Analysis Podcast
Storyteller Lance Anderson lives somewhere between the Verge of success and the bohemian Fringe of Hollywood. This is his Podcast....
Verge of the Fringe
The Return of the Podcast is a podcast devoted to the discussion of the works of J.R.R. Tolkien.
The Lord of the Rings Radio Network - The Return of the Podcast
I have always enjoyed exploring the offbeat, the glamorous, the sexy. That led me to the geisha and writing my novel, The Blonde Geisha. I explore the exotic world of these living treasures of Japan in my podcasts. Look for my Podcast in the iTunes Music Store.
In the Zone with Jina Bacarr
Sue Morem is a career expert. Listen and get the the professional edge in the one activity that takes up most of your week – your job.
Professional Edge With Sue Morem
The Podcast for the Creative Professional, Media Artist Secrets provides creative artistic inspiration, tells how to market your talents in your business, fine-tune your vision, advance your skills and share your creations with the world - audio for iPod/iPhone
Media Artist Secrets (iPod/iPhone/iPod touch/iPod nano audio)
What happens in Las Vegas - and everywhere else. Vegas Buzz Radio features interviews with business, technology and entertainment leaders, and music from the latest and hottest indie bands.
VegasBuzzRadio.com
What a shopping carts reveals about awareness
Training
USA
Investing & Finance
About
Discover in
Share
Playing on
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:
Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
0 views
North America \ USA
Audio Books \ Bussines \ Investing & Finance
Video \ Training
Direct link
Playing on all devices
Most Popular
Newer Episodes
Older Episodes
Most Popular
Most Recent
Most Viewed
The Security Catalyst
In the previous segments, we focused on special-case transfers that may be hard to recognize. At the macro level, when a user transfers between HR systems, a legitimate transfer can be mistaken for a termination, leading to poor customer service (and the trouble that ensues). At the micro level, when a user transfers within a [...]
Related posts:Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 3: Terminating Employment vs. Terminating Access
In the first segment, we looked at one extreme of transfers – a job change entailing a move between HR systems. In this segment, we’ll look at the other extreme of transfers – a job change that may fall under the HR radar. When we talked about the implications of HR as a source of [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 2: Identifying & Prioritizing Enterprise Roles
Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
In the previous series, we started prepping for the key workflows that make an IAM implementation worth the cost and effort. Implementing workflows effectively is critical to achieving the desired value in terms of time savings and effort/cost reductions. It also gets the organization excited about IAM and makes them willing to keep maturing the [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – HR as a Source of Record Part 1: Overview and Approach
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Faced with the choice between changing one’s mind and proving that there is no need to do so, almost everyone gets busy on the proof. ~John Kenneth Galbraith We set out in January to live and explore full time in an RV. We challenged ourselves; we challenged our notions of nearly everything about modern life [...]
Related posts:Why people are not the problem and where to look (hint: grab a mirror)
Why the definition of awareness matters
How can The Catalyst Method™ benefit your efforts?
The wheels are turning… you ready to roll with the catalyst?
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
In Chapter 6 of Into the Breach (click here to listen to the audio book version of the chapter), I shared a method I use to effectively assess people, information and risk – in their own context and with a personal connection. That success led to the creation of The Catalyst Method™ — a powerful [...]
Related posts:Into the Breach – Audio Series – Chapter 7 (Putting the Strategy to Work: A Pilot)
Into the Breach – Audio Series – Chapter 8 (Measuring Success)
How can The Catalyst Method™ benefit your efforts?
1
2
3
4
5
6
Next
Total 113
Show More
The Security Catalyst
9/15/2010
Feedback
please wait...