Presentation+TopicsSchedule


 * Surname || Given Name || Topic || Date ||
 * Ali || Shaun || Agile development || 17-Oct ||
 * Amar || Nouh || Application Programming Interface (API) || 31-Oct ||
 * Amir || Mohammed || Authentication of users || 7-Nov ||
 * Arocena || Trisha Ann || Backdoor programs/viruses || 14-Nov ||
 * Balyasnikova || Darya || Benchmarking || 21-Nov ||
 * Chin || Terry Yi Sheng || Bullwhip effect || 17-Oct ||
 * Dehghan || Roxanna || Business intelligence || 31-Oct ||
 * Derulski || Maciej || Business process Reengineering || 7-Nov ||
 * Ekujumi || Mobolade || Capacity planning in IT || 14-Nov ||
 * Gao || Yue || Chief Information Officer (CIO) || 21-Nov ||
 * Gomes || Christopher Frank Antunes || Clickstream data || 17-Oct ||
 * Gugala || Pauline || Cloud computing || 31-Oct ||
 * Jagsarran || Ashley Seerajie || Cold, warm and hot sites || 7-Nov ||
 * Jenkinson || Cory || Content Management Systems || 14-Nov ||
 * Kaoukdji || Ramzy || Data Flow Diagram || 21-Nov ||
 * Kazim || Syed Zain || Denial of Service Attacks || 17-Oct ||
 * Kim || Joongwon || Digital Dashboards || 31-Oct ||
 * Kim || Sol || Disruptive Technology || 7-Nov ||
 * Lam || Dai Vinh || Electronic Data Interchange (EDI) || 14-Nov ||
 * Lawton || Matthew || Enterprise architectures in IT || 21-Nov ||
 * Lindsay || Cheryl Elizabeth || Explicit knowledge || 17-Oct ||
 * Lipson || Blake David || Feature creep || 31-Oct ||
 * Liu || Yi || Gantt Chart || 7-Nov ||
 * Manikkavasagar || Dinesh || Granularity || 14-Nov ||
 * Marmer || Leslie Michael || Information overload || 21-Nov ||
 * Mascarenhas || Ashton Lino || Intelligent agents || 17-Oct ||
 * Mayassi || Louay || International Organziation for Standardization (ISO) || 31-Oct ||
 * Moawad || Monica || Key performance indicators (KPI) || 7-Nov ||
 * Mukhtar || Sidra || Mass customization || 14-Nov ||
 * Naeem || Hassan || mobile commerce (m-commerce) || 21-Nov ||
 * Nashaat || Marc || Nearshoring || 21-Nov ||
 * Olagunju || Mariam || Open source software || 31-Oct ||
 * Palazzo || Michael Nicholas || PERT charts || 7-Nov ||
 * Pasha || Arqam Iqbal || Phishing || 14-Nov ||
 * Paul || Gurpreet Singh || Primary keys || 21-Nov ||
 * Perumal || Premraj || Public key encryption || 17-Oct ||
 * Pithia || Hinal Dinesh || Rational Unified Process methodology || 31-Oct ||
 * Reale || Elisa || Semantic web || 7-Nov ||
 * Saglam || Sami Hasan || Service-oriented architecture (SOA) || 14-Nov ||
 * Saqib || Shizra || Software development life cycle (SDLC) || 21-Nov ||
 * Sbeit || Reema || Trojan Horse virus || 17-Oct ||
 * Scicluna || Monique Esther || Value chains || 31-Oct ||
 * Sekhon || Manraj || Virtual private networks || 7-Nov ||
 * Shams || Ayman || Web 1.0 || 14-Nov ||
 * Shewnarine || Amanda || Web 2.0 || 14-Nov ||
 * Sit || Konrad Kong Ngai || Web 3.0 || 14-Nov ||
 * Vakani || Mohammad Uzair || white-hat hackers || 17-Oct ||
 * Vanderklei || Samantha || Service level agreements (SLAs) || 31-Oct ||
 * Wen Shea || James || Sustainable/green IT practices || 7-Nov ||
 * Wraich || Mohammad Usman || Middleware || 14-Nov ||
 * Wu || Sue || Information privacy policy in Canada || 21-Nov ||
 * Zagorowicz || Bartosz || Relational database systems || 31-Oct ||