Close message

Welcome to Kanopy

Brought to you by Riverina Regional Library

Not your library? Find it now

WatchIT

WatchIT >

53
Videos
Loading...
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever…
Modern Information Systems - IT Infrastructure
Today's modern information systems are difficult for the general business person to understand because the business work is largely managed inside a 'black box.' In this two-part program, technology writer and consultant Roger Grannis clearly explains and simplifies the inner…
2 videos
Agile Software Development: An Introduction
The Agile Method allows modern development teams to rapidly build software that is both efficient and effective. This course provides a comprehensive introduction to this approach to software development. The course begins with the major teaching points. Next, the methodology…
The Mobile First Approach to Application Development - Information on New Technologies, Techniques and Solution Providers
To help cope with the seemingly insatiable appetite for new mobile applications, as well as reduce development backlogs, enterprises are now looking toward a new process, Mobile First Application Design and Development. Mobile First offers a significant advantage over traditional…
Big Data in the Enterprise: An Introduction
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and…
Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Freedom of speech is an ideal that historians tell us has its roots in the early 5th century; the concept is generally credited to the ancient Greeks. The right to privacy is an equally coveted principle that has had an…
Principles of Cloud Computing - Perspectives on Business, Technology & Cost
This course, the first of a 3-part series, lays out the foundation and key principles of cloud computing. The initial section presents the variable cost business model, which some believe may be the greatest contribution that cloud computing is going…
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
Intoduction to France's "Right to Disconnect" Law - Advancing the Management Skills of IT Professionals
A new law dubbed the, "Right to Disconnect Law," says that French employers must specify certain hours when workers will not have to respond to, or even check, their work email. The French government says the law will "ensure the…
Social Media for Business: What You Need to Know
Public and private sector organizations must tread carefully with social networks or risk the possibility of legal entanglements, loss of business, and perhaps worst of all, unhappy customers. In this report, expert and attorney Peter Vogel, discusses the key areas…
User-Centered Design: Benefits, Challenges and Best Practices
For well over a decade, UCD methodologies have helped shape the technology solutions and devices that touch our daily lives. In this report, Rob Stokes, Director of User Experience at Spanning Cloud Apps, introduces viewers to the world of user-…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern…
Perspectives on Business Continuity & Disaster Recovery Planning 
Business Continuity & Disaster Recovery planning, also known by the acronym, BC/DR plans, are top of mind issues for IT and business professionals today. Smart organizations routinely evaluate and review their plans, make changes were needed and then always test…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored…
Cyber Ethics: A Growing Business Challenge
Organizations today are trying to stem the tide of increasing cyber attacks, as well as inappropriate online behavior, by raising the level of cyber ethics. In this report, Peter Vogel, Partner with Gardere Wynne Sewell LLP, examines this new area…
Best Practices for Improving Data Quality
Poor data quality wastes time, effort, and of course, money. Through this report, we intend to raise the level of awareness about the critical nature of data quality for organizations today. In addition, we'll offer IT and business professional's advice…
Introducing IoT: The Internet of Things
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing…
Authentication, Authorization and Accounting: Best Practices
It seems that a day doesn't go by when we don't hear of yet another high-profile breach that has made its way to the front page and the nightly news. These events have CIOs and business leaders intensely focused on…
Virtualization: An Introduction 
Articles and reports on the merits of Virtualization seem to dominate the IT press and media today. With all the attention and hype being generated, you might think that Virtualization is the latest in new technology. Well in some respects,…