Skip to main content

Posts

Showing posts from February, 2010

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Internet Society Next Generation Leaders

ISOC: Are you a Next Generation Leader? Each year, the Internet Society will accept a group of qualified young Internet professionals from academia, the public sector, technology industries, and civil society into its Next Generation Leaders programme. Candidates will be between the ages of 20 and 40 and must be able to demonstrate leadership potential in their chosen field. Individuals accepted into the programme will automatically become Global Members of the Internet Society. Accordingly, the Internet model of decentralized architecture and distributed responsibility for development, operation, and management has been the catalyst for boundless innovation and creativity. That model also creates important leadership opportunities, especially in those spaces where technology, policy, and business intersect. Please find more about the program at ISOC Website .

ISO/IEC 27003:2010 ISMS' implementation guidance

It is new and got published 13 Feb 2010! This standard, accordingly, focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the processes of ISMS specification and design from inception to the production of implementation plans, obtaining management approval to implement an ISMS, defines a project to implement an ISMS and provides guidance on how to plan the ISMS project, resulting in a final ISMS project implementation plan. The ISMS or ISO/IEC 27000 family composition: - 27000 is overview and vocabulary (can be downloaded here for free); - 27001 is requirements; - 27002 is code of practice; - 27004 is measurement; - 27005 is IS risk management; - 27006 is requirements for bodies providing audit and certification; - 27011 is guidelines for the telecommunications industry. The above are published documents and more from this family of standards are still in

Corporate governance of IT

A small and purely a consultancy firm (registered in Philippines), StrateGICT Company, says, the high level principles-based advisory standard, the Corporate Governance of Information (and Communications) Technology or the so-called ISO/IEC 38500 have taken its own place, along the many and earliest IT management systems e.g. ITIL, ISMS, QMS, et al, as a valuable resource particularly developed to aid, however not limited to, business owners and directors to achieve the paragon of, no matter how small or big the organization is, including how they can understand and coherently extend and discharge duties on, their strive in IT. According to the standard, it must be effective, efficient and acceptable. Where each of the six principles namely: 1. Responsibility; 2. Strategy; 3. Acquisition; 4. Performance; 5. Conformance; and 6. Human behaviour; in conjunction of their use of IT, should be evaluated, directed and monitored.

Computer as a Driver

Yes, I did say that. Human would feed the instruction and the computer would drive it in its own without any hitch. Computer can be a driver to all, even people can be drive by. Computers are being used to facilitate day-to-day activities including operation of businesses, provide efficient and quick services, controls transportation unmanned and those travelling in space, helping medicine, reach out to loved ones and even committing crimes. In a great context the technology can contribute significant effect to characters and activities. It follows what is being instructed to do for and only human can discern a profound choice which is supposed to be drive by. It must be for good and the right ones, an instrument that would provide amplest benefits to all. Otherwise a corrosion loom towards. That is not so good.