Skip to main content

Posts

Showing posts from July, 2010

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Cyberspace added another dimension in warfare

Cyberspace has become the (new) fifth domain in warfare after land, sea, air and (orbital) space according to Economist’s article . If we have been following events about how the Internet has been playing a role in our lives, on how our organizations functions and our governments provide services to the public, we would have noticed some extra-ordinary events that had already happened. Some are very nice and others the not so good. How are we preparing to embrace the new generation securely?

iclassed Educating

Our training is based on decades of industry experience and IT practice consulting with companies. It's not only the result of empirics within which we deal on IT directly. Our consultants' work goes along with their delivery an extensive research of their subject(s), making sure they will resolve successfully. The goal is to make sure participants, IT practitioners or internal staff are not simply going to be dependent what the their current IT efforts are telling them to do. There is always work to be done within business-IT ecosystem even when everything seem to be working perfectly.  Modules include: 1. Productivity in the Knowledge Era *, 2-day; 2. The IT Practice , 3-day; 3. Business-IT Fabric (or simply) Cyberstrategy (in our own terms and language), 5-day (3-day lecture, 2-day practical workshop, best deal for you and especially your company). A professional education concentrated with business and enterprise productivity and major efforts constituting IT through: 1.

Consulting, managed services and differentiated IT solutions

Never have IT been as exciting and challenging as today due to  > business systems—don't forget society's—continuing technological advancement; and >  conformance  (or  compliance ),  administrative  and  technical  aspects especially for  regulatory requirements .       If you take adaptation of standards and compliance of regulations as expensive for you, your team and your business, we can help you reverse that experience.       They are going against our very normal way of doing things or becoming a lot more inconceivable to our already demanding duties and responsibilities. It simply means they are all coming along for us to confront them. We can do it in an affirmatively flawless manner. As much as possible the disbursements wouldn't have to be imperceptible or quetching anymore. If it was, that is.       For a very quick engagement with our clients, we have laid a solid foundation for their business systems and IT.       We’ve repeatedly been saying these for m