SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Michel de Goede

Michel de Goede

3 Followers
27 SlideShares 1 Clipboard 3 Followers 1 Following
  • Unblock User Block User
27 SlideShares 1 Clipboard 3 Followers 1 Following

Tags
it mobile information security energy security internet of things risk strategy byod architecture risk management cloud computing m&a information technology complexity reduction innovation venture capital cloud pmi synergies renewable energy value post merger integration asset management hacking lock-in portfolio optimization lean startup student happiness success life career privacy employee engagement devops internet iam eu entrepreneurship oil and gas crm sap gis integration merger database
See more
Presentations (27)
See all
Exploring the upside of risk: optimize the IT portfolio
8 years ago • 515 Views
Mobile: the up and downside of risk
8 years ago • 536 Views
The connected utility
7 years ago • 467 Views
The impact of consumerization
7 years ago • 221 Views
Smart data & smart energy
6 years ago • 188 Views
IT: make or break the deal
5 years ago • 154 Views
Database Technologies
4 years ago • 167 Views
IT PMI: tips and lessons learned
4 years ago • 114 Views
Enabling the energy transition in times of cloud, apps and BYOD
3 years ago • 68 Views
From reactive to proactive mobile scenarios
3 years ago • 35 Views
Mobile as a strategy
3 years ago • 28 Views
Mobile as a strategy
3 years ago • 34 Views
Are you a player? The EU, energy and entrepreneurship
3 years ago • 42 Views
IAM for mobile and BYOD
3 years ago • 47 Views
BYOD: Be your own device?
3 years ago • 49 Views
Mobile: the up and downside of risk
3 years ago • 36 Views
Mobile: the up and downside of risk
3 years ago • 41 Views
Enabling offline app usage within a set budget and timeline
3 years ago • 29 Views
BYOD: bring your own device or bring your own disaster?
3 years ago • 37 Views
The influence of consumerization on enterprise apps
3 years ago • 51 Views
The Connected Utility
3 years ago • 69 Views
Turning dreams into reality: it's your choice!
3 years ago • 78 Views
The intricacies of cloud integration
3 years ago • 45 Views
Cloudifying Alliander
3 years ago • 101 Views
Breaking down the layers of cyber security
3 years ago • 115 Views
Maximizing asset life with smart lighting and ev
3 years ago • 130 Views
5 dirt easy patterns for value delivery with IT in M&A
2 years ago • 99 Views
  • Activity
  • About

Presentations (27)
See all
Exploring the upside of risk: optimize the IT portfolio
8 years ago • 515 Views
Mobile: the up and downside of risk
8 years ago • 536 Views
The connected utility
7 years ago • 467 Views
The impact of consumerization
7 years ago • 221 Views
Smart data & smart energy
6 years ago • 188 Views
IT: make or break the deal
5 years ago • 154 Views
Database Technologies
4 years ago • 167 Views
IT PMI: tips and lessons learned
4 years ago • 114 Views
Enabling the energy transition in times of cloud, apps and BYOD
3 years ago • 68 Views
From reactive to proactive mobile scenarios
3 years ago • 35 Views
Mobile as a strategy
3 years ago • 28 Views
Mobile as a strategy
3 years ago • 34 Views
Are you a player? The EU, energy and entrepreneurship
3 years ago • 42 Views
IAM for mobile and BYOD
3 years ago • 47 Views
BYOD: Be your own device?
3 years ago • 49 Views
Mobile: the up and downside of risk
3 years ago • 36 Views
Mobile: the up and downside of risk
3 years ago • 41 Views
Enabling offline app usage within a set budget and timeline
3 years ago • 29 Views
BYOD: bring your own device or bring your own disaster?
3 years ago • 37 Views
The influence of consumerization on enterprise apps
3 years ago • 51 Views
The Connected Utility
3 years ago • 69 Views
Turning dreams into reality: it's your choice!
3 years ago • 78 Views
The intricacies of cloud integration
3 years ago • 45 Views
Cloudifying Alliander
3 years ago • 101 Views
Breaking down the layers of cyber security
3 years ago • 115 Views
Maximizing asset life with smart lighting and ev
3 years ago • 130 Views
5 dirt easy patterns for value delivery with IT in M&A
2 years ago • 99 Views
Tags
it mobile information security energy security internet of things risk strategy byod architecture risk management cloud computing m&a information technology complexity reduction innovation venture capital cloud pmi synergies renewable energy value post merger integration asset management hacking lock-in portfolio optimization lean startup student happiness success life career privacy employee engagement devops internet iam eu entrepreneurship oil and gas crm sap gis integration merger database
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.