Ken Stewart | ChangeForge

Challenging conventional paradigms with lots of innovation and a dash of common sense: http://changeforge.com
Lenovo wrestles #1 PC mfg spot from HP http://www.fastmoving.co.za/news...
Round tables coming up @ 16:30... Facilitating a discussion around channel evolution. (@ Round Tables hosted by Photizo Group ...
Steve Pye just kicked things off. (@ Maximising Benefit in the Transform Maturity Model http://blog.doubledutch.me/transfo...)
Great presentation by John Taylor on partnering models for MPS providers. (@ Working in Partnership on MPS - For Mutal Gain htt...
I'm at Fight or Flight: Staying Relevant for Tomorrow's Customer http://blog.doubledutch.me/transfo...
I'm at Executive Panel: Industry Leaders Speak Out http://blog.doubledutch.me/transfo...
I'm at Europe is Transforming...to What? http://blog.doubledutch.me/transfo...
I'm at The Importance of Addressing the Entire Document Workflow http://blog.doubledutch.me/transfo...
I'm at A Way to Speed up Your Sales Process http://blog.doubledutch.me/transfo...
ESCo's competing with MPS providers? (@ Risk Management: Lessons from the Energy Services Sector http://blog.doubledutch.me/transfo...)
I'm at Risk Management: Lessons from the Energy Services Sector http://blog.doubledutch.me/transfo...
Paul Brody leads the conversation on transformation (@ Products to Services Transformation in B2B Electronics: Past, Present & ...
Consumers lead, enterprises lag transformation (@ Products to Services Transformation in B2B Electronics: Past, Present & Futur...
Ed Crowley introducing Paul Brody of IBM (@ Products to Services Transformation in B2B Electronics: Past, Present & Future http...
Checking in at Xerox Research Center Europe here in Grenoble, France #xrxiab12
Re: Not your usual breach | TechCentral.ie - http://www.techcentral.ie/19847...
"While you might not believe it be so, most security breaches are typically enacted or enabled by a corporation's own human resources. Whether knowingly (as in this case) or not, "social hacking" is very common primarily because of lax education and awareness. Sadly, this case demonstrates multiple gates of failure. While I had always thought that digitizing a document would allow for more control, many security professionals I've worked with have demonstrated just how viral a digital document can be. Aptly so, you've pointed out the immense damage each company's reputation might now experience. Semper Fidelis Ken Stewart ChangeForge" - Ken Stewart | ChangeForge
Digital disruption - Short fuse, big bang? via Deloitte Australia @Green_Dot http://t.co/Q4IDh0TU
HP Takes Aim at Security With Massive Launch via @channelnomics http://channelnomics.com/2012...
Samsung accused of mistreating workers, using child labour in China http://www.cbc.ca/news...
Active in Cloud, Amazon Reshapes Computing http://finance.yahoo.com/news...
Cloud Service Providers Challenge Traditional IT Outsourcing http://www.cio.com/article...
Photizo Group Listed in 2012 Inc. 5000, among America’s Fastest Growing, Privately-Held Companies (#918) http://www.photizogroup.com/blog...
Man fights his firing over a Facebook 'like' http://www.cnn.com/2012...
4 Winning Strategies for Selling to Top Executives http://www.raintoday.com/library...
Lessons Learned When Getting into Managed IT Services http://www.imagesourcemag.com/industr... by @myimagequest
The IT Tech’s Perspective on Managed Print Services http://www.imagesourcemag.com/industr... by @estavola