Skip to main content

Posts

Showing posts from March, 2010

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Cyber bill if pass require a worldwide effort

Following few statements about what the bill is by the authors. Since the Internet is of global in nature, a legislation that address global cyber crime may be needed. Also, maybe it can do good for all. “Cybercrime must be a top priority for our national security,” Gillibrand said in a joint statement with Hatch. “If we’re going to protect our networks, our infrastructure, our economy and our families, we have to go after cyber criminals wherever they may be — and it must be an international effort." “Cybercrime is a serious threat to the security of the global economy, which is why we need to coordinate our fight worldwide. Until countries begin to take the necessary steps to fight criminals within their borders, cybercrime havens will continue to flourish,” Hatch said. One of the authors have reported how much New York businesses are losing because of cybercrime. The U.S. law would be called, International Cybercrime Reporting and Cooperation Act . In fact, prior to this law,

8Ps preview

We've seen varying and elaborate ways to accomplish uncommon artifacts and rock solid business systems but still we had to create our own. For a simple reason, methodologies are not always full-clad, and practitioners concur on and adjust them, subsequently, overcoming problems and be able to pull through on agreements and goals. That's why we had to establish our own basic prerequisite for whatever job we should be in -- Purpose (Initiative, beginning of master plan) - does it solve issues for or augment the business? People (Strategy and requiring correct Specifications) - who can deal with such assignment?  Humans make everything and miss a lot! Product (Architecture and Technology) - do we need it and how do we use it? However and whatsoever they are must not influence the major portion of the decision. Policy (Practices, Standard, Rules, Regulations and Laws) - we need comprehensive and  panoptic  guidelines. Process (Action  guided by the purpose ) - make sure we are cons

In spite of the many security development, IPv4 still have flaws

Not fine, solved, okay but the correct term, maybe, on IP version 4 security is, mitigated. Isn't it safer to say that way? While working on our presentation slides to be delivered next week to one of the computing organization's cyber security event in the country, I connected my computer to the Internet to look for claims, that IP cannot provide 100% guaranteed security, at least for now, it may also be forever, particularly on matters that concerns politics -maybe the toughest concern ever, maybe national infrastructure too, high-profile individual and organizations and more. They developed the Internet Protocol version 4 without considering security in the design [and the myth that the Internet protocols were designed for warfare environments, CPNI, 2008]. According to the report, in page 5, "As a result, any system built in the future according to the TCP/IP specifications might reincarnate security flaws that have already hit our communication systems in the past. Pr