Intelligent Information Sharing

Ted McLaughlan

Subscribe to Ted McLaughlan: eMailAlertsEmail Alerts
Get Ted McLaughlan via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Ted McLaughlan

Here's a very good article concerning the various types of strong identity management, multifactor and two-factor authentication solutions that are necessary for healthcare system and process identity enforcement - recently written by John D. Halamka MD, a self-described Healthcare CIO. Strong Identity Management In this article, Dr. Halamka states that he's had a wide range of experience with many of these token-based and tokenless two-factor authentication methods, including security tokens, smart cards, biometrics, certificates, soft tokens, and cell phone-based approaches. His summarized findings include: Security Tokens - many challenges and prohibitive expenses. Smart cards - a good consideration, though requires installation of many readers. Biometrics - great results, but still requires major technology upgrade for existing PC/LAN infrastructure (this is especiall... (more)

Executing Real Time Enterprise Governance Strategies with Enterprise BPM 3.0

It remains true that the most valuable aspect of the Business Process Management (BPM) discipline is its ability to help an organization govern rather than just manage, but this ability requires a comprehensive view of the technologies and methods that truly make up enterprise class BPM. It also requires real time, collaborative information sharing from both the governance and participant perspectives. Executing to such a view can help deliver IT Governance Process Integration benefits, in real time. Read more here about this Blackstone Technology Group Enterprise BPM Consulting ... (more)

Ten Tips for Promoting your Employer with Personal Social Media

New Media on Ulitzer I’ve been asked from time to time by businesses about how to educate employees on using Social Media – from two perspectives. One perspective is simply as part of a broader Internet use policy, to help employees stay safe and protect information assets. Another perspective is to encourage employees to support their business in their daily online activities, should they choose to do so. This is essentially giving employees as “social media enthusiasts” the tools and guidance they should get, to help them positively contribute to the overall online marketing e... (more)

Automated Social Media Governance and Government 2.0

With the proliferation of Internet-based tools and forums to share information, deliver announcements or warnings and create collaborative networks, it’s become apparent that “self-policing” strategies for controlling and managing the risks involved in delivering content through the corporate firewall can’t mitigate most risks. Most corporations and government agencies do indeed require, as terms of employment and various legislation, that care be taken and policies or procedures followed when engaging in online public discourse or otherwise moving content from the corporate-cont... (more)

Government Social Media & Cloud Computing

GovIT at Cloud Expo June 23, 2009 - During this morning’s IAC breakfast, discussing “Transparency, Collaboration and Web 2.0”, a panelist made a very interesting point. While the US Federal Government’s use of Internet social media services and cloud-based information-sharing applications is well underway, albeit at the very earliest of stages (mainly due to significant policy, privacy, security and simple “newness” issues), by far one of the major risks lies with accountability. Accountability in collaboration and information-sharing environments is typically achieved to some d... (more)