Skip to main content

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Dreaded diseases, exalted festivities and laws

We are joined not to, as well as discouraged by our precocious and emphatic family members, friends, colleagues and even more from our leaders, or the laws and enforcers that sanctions, with our collective efforts to gather at full-capacity or fill our place crowded nowadays.

Even without laws we can still see and understand what needs to be done when it goes against our belief to being presentable to others, our freedom, pride including but not limited to faith. With all the sudden accessories of the face it might make some allergic and defiant. A bare face could be the only way to the detriment of the people around us. 

When we are requested to be present in parties, not to enjoy, and we have to avoid being overly happy like the days we have been accustomed to before for the sake of rectitude. The manner is to show respect to the people who needs to celebrate holidays especially for those who have been afflicted by this pandemic. These people are our grandparents, siblings, children, colleagues, the sick and those who needs help and that holiday party can give further hope and meaning to their lives. That with such reason a celebration cannot be prevented, and we have to do it with caution.

At a party, people knows and follows social distance and since this a gathering that we know, decorum is second to none. We might forgo the singing, dancing and drunking but eating. And while eating, one must not speak. If one or the other needs to speak, they must pause eating, and before speaking, be certain that facemask and faceshield must be worn first.

We might be thinking that the laws created surrounding the pandemic is a way to get us all behave like robots, especially lockdowns which might be a matter most controversial to some, but then there are a lot more than that people have to take note about. It's our existence and so we can imagine to do and continue on things our way, with the assurance of safety and healthy workplaces and neighborhoods. And there is more.

Deferences to, or enforcement of, our laws which reminds, or somewhat restricts us to be bold toward the risks that made it now at the forefront of our lives, without doubt is, constructive and useful.

Admit it, everything that we do, with or without the rule of law, has had its own way of being controlled. During pandemic, just at this very present, we have to tighten up some unnecessary loose ends to grasp the moment for safety and well-being, if we can still say the word. 

With all our actions we must be candid at all times, no excuses, and conflict shall be averted.

We have to try to protect ourselves, so that we can help others to protect more. Let's us respect, help and protect each other consciously.

Comments

Popular posts from this blog

Philippine telcos blocking entire SMS text with internet addresses in it

If you are sending SMS texts to your friends, family or colleagues and they contain internet or web address including IP and email addresses, and even a period or dot separating, regardless of, your words and numbers, they are automatically blocked and not going to be received by your waiting recipient. Cooler heads must prevail here especially if an important message is urgently being expected. IP version 6 address is fine. However, an IPv4 including localhost address (given automatically to every computers and network interfaces as their own alone designed for troubleshooting purposes), and your money in the billion figure using dot as separators would be blocked.  If you send "local.business, naman.naman etcetera" or any words that made you use dot in between them, as part of the text, they will be blocked. There are some, that isn't blocked in this category. Like check.iclassed, some.ent, whatever.local etcetera, that is because they do not form any domain name at all

Philippine cyber campaign

Are Philippine institutions being targeted or simply being probed? We don't know for certain. It could be either or both. Whichever comes first? What we can understand, with the success of such attacks, is that they have found their way. Really.   How hard or easy? The attacker knows, but probably, also, those being attacked. Inclination should be there no matter how sophisticated our security systems are. In cybersecurity, we do a very focused job. Making sure we disappoint whoever is trying to gain access to any resource without permission and authority regardless of the environment we are in. What happened is that every asset deemed to have every variant of resource built-in, operating, that makes up the entire system working whatever it is trying to employ, in that case the primary purpose. Meaning, we have to know if we are running our system in a manner that is really secure, provisioned properly during design stage and managed continuously afterwards, post-implementation. No

iclassed privacy policy, unbelievable at first sight

Those who, before engaging us and was reading our business conduct, alerts and notices , could not restrain themselves asking, "can you really do your job without keeping any data at all? At the end of the day, you should still be looking at those information and make sure you did, and will, do well. I am expecting a lot from you here, you said so yourself!" Now, that last sentence is so loud. We keep them, not in our premises, but yours. If you've been our clients, you'll know how persistent we are when it comes to the reliability and security of your systems, data and credentials. That's our responsibility, as is made popular by cloud computing, and we don't need to be in a cloud.