Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

What is the admissions process?

Q

What is the admissions process?

A

All students must complete a university application, submit a non-refundable application fee, and participate in an interview with an Admissions Advisor.

How to Thrive as an IT Professional

The Information Technology (IT) function has become increasingly important to overall decision-making and strategy implementation in businesses. That’s not surprising when you consider how technology drives competitive advantage. Innovation enables businesses to stay ahead of the competition, delivering and satisfying more customers more effectively and efficiently. Further, IT is now an important revenue generator as an increasing share of consumer sales are transacted through mobile and online channels.

Are Businesses Profiting at the Expense of Society?

On February 14, 2013, Dr. Ingo Böbel spoke as part of the CTU Distinguished Lecturer Series. A published author and scholar, Dr. Böbel has had a profound impact on industrial organization research and shared his insight into the economic theory of creating shared value, also known as CSV. Here are a few of the key takeaways from his lecture.

The State of Homeland Security 3.0

Under her first four years as DHS secretary, Napolitano oversaw the broadening of the focus of homeland security. Focus went from a primary interest in terrorism and counterterrorism to coping with threats such as natural disasters and allocating resources based on an assessment of risks and vulnerabilities. In providing examples in the use of risk-based methodologies, the secretary pointed to the issues of terrorism, border security, immigration enforcement, cybersecurity, and disaster preparedness and response, suggesting that she views these as priority areas for her second term.

Six Reasons Businesses Go Global

In August 2012, we launched Colorado Technical University’s new Distinguished Lecturer Series with Amy Powell, Director of Operations for Starbucks Coffee Co. The CTU Distinguished Lecturer Series continued on February 21 with Dr. Marika Taishoff, Director of MBA programs at the International University of Monaco, who offered her insight on Going Global.

3 Critical Factors for Cultural Sensitivity in Business

If you’re studying international business, then you’re learning how unique social, legal, political and cultural factors affect business dynamics. To be effective, you need to have an open mind, great observation skills and most importantly, cultural sensitivity.

Securing the Systems We Can’t Live Without

What’s the first thing you do when waking in the morning? Turn on the lights? Brush your teeth? Or maybe fire up your laptop to check the morning’s emails? Much of the activity we perform is tied to a web of interconnected systems that allow us to function throughout our day. But what happens when systems critical to our daily living stop working? An example is noticeable on the East Coast, where many of our fellow students and faculty recently dealt with the effects of the havoc wreaked by Hurricane Sandy and hazardous winter conditions.

How to Successfully Pass the PMP Exam

Interested in adding a Project Manager Professional (PMP) designation to your career toolkit? Recently, I reached out to PMP and friend, Fahad Usmani, to gain his insight on the PMP certification process.

Demand for Cybersecurity Experts on the Rise

Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.

6 Overlooked Internal Security Threats

For data to truly be an asset, there must be processes, procedures, systems and ownership that insure the accuracy, integrity and timeliness of the data. If data does not have these attributes and capabilities, then why should we be concerned with protecting it? This reveals an obvious front-end requirement of the spectrum of data protection.

Can Fair Trials Exist with Social Media?

In previous blogs, we looked at how criminals are using social media and what they’re doing with the information they find online. We also discussed how law enforcement uses social media to track and ultimately prosecute criminals. Now let’s look at how social media is impacting the courtroom.

Is Cloud Technology the “Next Big Thing” in Healthcare?

Hands down, cloud technology is changing the IT landscape whether we’re ready for it or not. The cloud offers businesses and their IT functions greater flexibility and at a more cost-effective rate, so we can expect this trend to become a mainstay, especially in health care related businesses.

The Benefits of Creating Shared Value as a Business Strategy

The CTU Distinguished Lecturer Series continued with Dr. Ingo Böbel, a published author and scholar who has had a profound impact on industrial organization research.

Clear and Present Danger - National Security’s Top Five Threats

Recently, National Defense Magazine (NDM) published a report on the top five threats to national security.

What Makes Rapists Tick?

One of the most difficult things law enforcement officers must do is to interview rape victims. They must be asked highly intrusive questions that force them to relive an extraordinarily painful experience. Yet the hard, cold fact is that cops aren’t therapists. Their primary goal is to capture the rapist and to keep another victim from going through the same pain.