Skip to main content

Posts

Showing posts from April, 2022

When AI isn't delivering on expectations

Their limitation to  this  could be predominant and the fact that they can only artificially provide with data which was practically fed from third-party sources without any initiative to find, associate and use the most updated account. Presently, AI is definitely a little farther than what search engines could do when giving out information. Although, AI seemed to have changed how search engines deal with data entirely.  Their large language models, unless prudently orchestrated either by AI or human, or hybrid entities, we shall say that, we'll continue to see their performance, in such context, to be stillborn or lagging, if not full of primitive suggestions and information which can be useful, somehow, to the humans. In the meantime, the original source and those with firsthand information, if still around, shall be sought out.

Basic idea of strategy in the 𝖎* of 𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, cyber and TICO as a whole

Organization can impress upon with different tasks and responsibilities being attended to regularly by its stakeholders thereby gaining the upper hand in its production relative to smaller ones or individuals with limited workforce, and in a relentless aim a strategy of smaller entities cannot even be subdued, as history would suggest, by the greater ones. Productions caused by technology may not be affected by the number in human resources running it for a very good reason. It is entirely dependent on technology capacity with a leaders’ know-how on the business objective. With strategy, which can be mustered differently in many situations and environment and where the size of the organization is necessarily not a repute is especially true in TICO, most evidently in the area of operational technology with its increasing reliance on data especially nowadays. This is apprehended by those who has organization’s or top decision-maker's responsibility, mostly with leadership position se...

How do we see security and privacy in the enterprise

Enterprise system, infrastructure, data, services, distinct roles, operating functions and management controls have built in basic security and privacy capabilities. Whether or not it is a mandate, which is usually assured and backed by business conduct and applicable policies, security and privacy have to be utilized and configured correctly to suit the needs of the entire organization not just a particular scope or business unit. Security and privacy attack vectors and velocity have never been so dynamic and logistical opportunity is not a burden at all nowadays. There has to be an unwavering disposition on security and privacy initiative. Regardless of industry setting, security and privacy must remain a foothold mechanism by the technology at large. Security can be designed and deployed to prevent incidents and malicious intents toward technology and data. Technology and data are complementary on purpose and they can be tightened, not restricted, not only by making sure their built...