Skip to main content

Posts

Showing posts from May, 2010

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Information security

The ISO/IEC 27000:2009 provides overview and vocabulary for the information security management system, the ISO/IEC 27001:2005. It defines information security as a preservation of confidentiality, integrity and availability of information. In addition, other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved. In order for an information security activities to be successful, one would have to think about the mentioned preceding elements. Considering a top secret information, which the stakeholders cannot allow to be processed through the systems and internetworks without a good mechanisms in place. Doing so otherwise would only put information in peril. It may also be that information could never be trusted completely. Taking into account all factors and resources have been in proper places. Let us look at the two important mechanisms that may satisfy the above mentioned security elements: Cryptography and digital certificates

EU unveils five-year digital economy plan

If you are going to look at the targets, they not really are going to be delivered in that span of five-year. It maybe that is to initially put all of the foundations (e.g. infrastructure to be laid out all of EU) necessary to accomplished the mentioned targets. After the infrastructure and other critical dependencies has been deployed and ready, I am thinking enabling the services would no longer be that hard considering said foundation has been carefully planned, designed and delivered to provide necessary services to the member countries and stakeholders. EurActiv have just posted on 19 May 2010, European time, a report by European Union’s five-year plan to concentrate on infrastructure for high-speed Internet. The following are the main objectives in support of the said plan:  Ultra-fast broadband by 2020: 50% of European households should have subscriptions above 100Mbps (no baseline). Promoting eCommerce: 50% of the population should be buying online by 2015. Cr

Interconnected Philippine islands

With the recently concluded automated election, where only few were said to be not reach by the telcos to transmit results, there is a good chance that all over or majority of the parts of the Philippines is now possible to be connected to the global Internet. If the government, in support to the Strategic Roadmap for the ICT Sectors, ESkwela, et al, is going to pursue and fund the program as an immediate and priority project the connectivity can now happen or at any moment on. That is if the connections used during the 10 May 2010 automated elections are to be considered for the mentioned government projects.

Probing mobile networks

On 14 May 2010 we were scheduled to go to several places and decided while on the road to use our phones to check how signals for Globe and Smart would switch from typical GSM signal or 2G, 3G and HSDPA or 3.5G. The phones we used are both SE with models of G502 for Globe and C902 for Smart. Both are 2G, 3G and HSDPA capable. Going to Libis, Quezon City, the following were the routes we take: From EDSA along Roxas Blvd > Gil Puyat > Finlandia > cross South Super Highway > Philippine National Railway > Dela Rosa, Pio del Pilar > Makati Medical Center > Dela Costa > cross Ayala Avenue > between RCBC building and Cityland > Gil Puyat > EDSA > Boni > EDSA Central > Shaw Blvd > Ortigas Center > San Miguel Ave > Julia Vargas > SM Pasig > Frontera > Ortigas Avenue > E. Rodriguez > Eastwood City Going to back to EDSA, Roxas Blvd, the following were the routes we take: Eastwood City > E. Rodriguez > C5 > Kalaya

Deal security

Do not talk security attacks unless things, in the first place, have already been ironed out. This can be taken up but not as the primary issue yet. It goes to say, particularly if information infrastructure is still being laid out, that ICT strategies e.g. few to consider are usability, capacity and security, and in general, have to be dealt with first and foremost. With all the tested technology specifically for security purposes, why organizations still cannot get rid of the attacks? The following few might be one of the answers: IPv4 is really not secure There is two or more, if not a single straight way, to mitigate it. If it is done correctly organization can still be secure. Plan IPv6 and turn it on now. Caveat: We still have to see how capable it is however the next generation Internet protocol has been addressed to have security integrated in the design. Funding not enough to address security Fund it or what many advised it never connect to the Internet.

What speed did you really subscribe to

For some customers who just want to have Internet connection, speed is 2MB wireless broadband, they would ask the telco’s sales representative if they can avail of the current offering, and if it is available in their area. Some sales representative would surely shoot it with yes, and we already have presence nationwide , and you would pay less from the service if you subscribe now. Maybe, because there is an on-going promotion especially if the so-called offering is a new service. Like for instance, a customer have subscribed on the service. The customer, does not know anything except that it already paid it and, is now ready and excited to use broadband. It turns to be not getting what has been expected.  If you are familiar with the real situation you would always know there is an exception. Not all areas are suitable for that kind of speed or in other term frequency. Plus if you live, even though you are in the city, where, no signal is reachable, service is still being provision

Outsource overall management and operation of IT possible

With the ever increasing reliance of organizations to IT, and others not keen to supporting their in-house technical staff to update skills, there is a big chance they cannot deliver what is expected of them. Some years ago, many claims that IT already plays a major part in the business including national infrastructure like energy, finance and transportation. It is critical that IT including the most important element of it, the people, are given reasonable access to resources they require to become effective in what they have been assigned to do. Organizations even though they require it, cannot maximize IT if so-called resources are not being treated fairly. Solution is outsource overall IT activities. Though outsourcing has been successful in many areas, IT management and operations might require a different parameters, a carefully crafted policy, terms and service agreement, so customers are assured that IT is constantly being delivered to support the needs of the organization.

dotPH improved 24/7 downtime monitoring system

As a customer, I am updated with dotPH notification. Here is the new one, see below, received 7 May 2010. To our valued client, This is to inform you that we have expanded our downtime monitoring system to provide you better service. In addition to our 24/7 automated monitoring system, we have now assigned personnel to attend to webhosting and dotPH site downtime issues even after office hours. To report downtimes, call our office at (+632) 6372104-05, 6336906, 6354152 or 6384483. Leave a voicemail stating your domain name, mobile number, email address and the details of the downtime. Please be as specific as possible -- the more details you can provide, the better it will help us address the issue quickly and efficiently. A text message will be sent to the personnel on duty informing them that a downtime issue has been reported. An email containing a recording of your voicemail will also be sent to ensure that the downtime can be resolved as soon as possible. For

An IT consultant is

An IT practitioner, who is technical in various elements of, directly or indirectly relevant to its, business.  The core being information technology and contiguous facilities, the kind of work we cover, in iclassed or as IT consultants, contractors, managed service provider and educators. It's number one in the entire agenda to be suave in its technical worth. The others or various number twos that require the IT consultant's attention, for the sake of being in business, are to take care of its market, customers, research, finances et al.  That should mean the IT consultant must know its own business and is the real deal.  An IT consultant must be an IT practitioner.  It cannot be magic that all of a sudden somebody became an IT consultant, doing high level kind of job, they say. With solid foundations, these are learning, practice which must be encompassing and research at the very least, an IT consultant will have practical and tangible impact in the business. IT is not impo