Skip to main content

How functional and secure AES is

How functional and secure AES is? The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems. In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike. This time, we could say

Basic idea of strategy in the 𝖎* of 𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, cyber and TICO as a whole

Organization can impress upon with different tasks and responsibilities being attended to regularly by its stakeholders thereby gaining the upper hand in its production relative to smaller ones or individuals with limited workforce, and in a relentless aim a strategy of smaller entities cannot even be subdued, as history would suggest, by the greater ones. Productions caused by technology may not be affected by the number in human resources running it for a very good reason. It is entirely dependent on technology capacity with a leaders’ know-how on the business objective. With strategy, which can be mustered differently in many situations and environment and where the size of the organization is necessarily not a repute is especially true in TICO, most evidently in the area of operational technology with its increasing reliance on data especially nowadays. This is apprehended by those who has organization’s or top decision-maker's responsibility, mostly with leadership position sensitive to stakeholders’ work output, ethics and style but a select role can also be designed and made strategic, to infer overall production performance using different methods including economic process and the causality of technology being applied.

The conduct of strategy may appear superficial to outsiders, and those who has only the basic fragments of the subject, but the entelechy differentiates a leader, wannabe, follower and machines due to reasons and actions, with inalienable know-how, intent and constitution. It is not exclusive of responsibilities and some authority in the case of the leader, and of machines the capacity to process data, but the fashion that each have to do and contribute to the business, just as it made preeminent. The management must be thoughtful and proactive to its own and stakeholders’ thoroughness of actions, in-depth knowledge of systems and processes, and substance in the practicality of goal to be achieved.

Some strategies are irrefutable if every conceivable information, which is not always the case in many contexts, to address a certain situation is provided as the enterprise bring up its goal and the responsibilities expected from the stakeholders, and testing any possibility of prejudices from both intellectuals and fatheads and reality of advance notion in the subject or solution can be taken up collectively to make sure the overall effort is consentaneous. A situation can be anything within the enterprise or a business unit, what causes it to falter either in its operation, finances or some areas which affects others and make them all unable to perform well.

Within the internals of IT, in businesses and industrials, and if acquisition of operating data has been well integrated, a problem in a prominent system feature may block off an entire service in which the stakeholders may not continue to perform, hence the captive, at work and productivity. Data generated from software or applications, machines, sensors, components including but not limited to physical environment are causing organizations to rethink their strategy so that the principal and management, not only the usual stakeholders such as business unit heads and workers, supplier and partners, can see what’s happening and their impact to their resources and bottom-line, that is because they can translate everyday output into a goal across-the-board.

The nisus in strategy and even policy is the key, everytime they are employed, a thorough research or investigation are conducted to ascertain an output favorable to, or the accomplishment of a goal for, the organization and better productivity for its stakeholders.

An IT strategy need not necessarily start to be grand though that is usually the case for big spenders or in the construct of smart city and publicly funded project. Most of the time even the fundamental architecture, which is naturally wide open to stakeholders, and enterprise system for a multinational company is based on gradual build up, which is a strategy that can be applied regardless of the size of any organization. Such strategy is not to remain with the basic infrastructure but to build a solid foundation for innovation and transformation, which must be a suitable setup as any organization prepare for whatever it will require next to achieve its aspiration. It is to have something conscious however small to have to begin with, must be dealt with efficiency, in which it is being contemplated for more including scalability, sustainability, and application of security and privacy as part of its overall consideration. It doesn’t need to look like a strategy even and sometimes it just remains in the head of management people or the limited few who are involved, who has control over and be guided by a direction, which is true with enterprise technology and application.

Security and privacy are even more significant as a premium case for strategy initiative. Everything in technology and its applications manufacturing or development have been continuously and increasingly more purposeful to the demand of security and privacy across many stakeholders, globally. Protection of systems and data must withstand anything that goes against its correctly directed mechanisms and policies.

Strategy is rich in organizational processes and the details that makes them up constitute the business, event, stakeholders, practices, technology, systems, software or application and data to name just the fundamentals. The leadership’s encompassing attention to such processes and their ability to quickly amend if any impediments are present, their governance definition requires desiderata in which this very nonspherical design, in addition to being a nonspatial continuum is discerning of both technological development, enterprise architecture and business strategy in which it has overall outlook of organization.

Strategy seeks a series if not continuous rally either with individual entity or their aggregates and is about discovering certainty of actions, harmonizing differentiated systems and fortes, establishing sustainability and intelligence within organization, where the stakeholders can successfully measure their business goal and future plans. It meant to establish appropriate business standard unique for their organization. Strategy makes honesty, the best policy, which makes stakeholders, no matter the odds, to work hard and achieve a goal.

It is important in strategy for leadership and technology (@𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉 it mean TICO in a holistic fashion) practitioner to appreciate how the big picture works, at the same time can decide on comminuted events dependably on their own, must be superb in performance with a highly-vetted team, and based on collective efforts and global data relevant to a goal.

Comments

Popular posts from this blog

[TW] IT documents, audit and leaders

IT documents comes with different names such as the following: - Manual or handbook, - Policies and procedures, - Management systems, - Project plans. In the real world we have various names with unique descriptions and purposes when in fact they could be made to do a uniform direction for which actions are based for the entire IT initiatives, probably the longest in IT lifecycle is operation. The problem is our inclination on something else which is wrong. IT remains an IT area. Business remains a business area. The same problem is carried out when we conduct IT audit. Most audit are missing the gists in which IT is being used by businesses. We once said that an effective IT audit is conducted by IT people themselves but there is something wrong with that even. Business and accounting people have been doing it with a different bias and preconceived notions which doesn't make the cut for IT direction and audit respectively. Leaders play the same game and so the problem continues an

[TW] Technology impact on enterprises, consumer and data

The best time to learn the art and science of technology consulting or just the necessary practice required for a business not to be left behind or not to bleed cash unnessentially is now. Technology is magnanimous but it doesn't mean it has to continue being an alien to almost everyone. Technologies surrounding computers, the Internet, programmable devices, sensors, AI, differentiated network convergence and decentralized systems, data and content are gaining an unprecedented development and adaptation within, and greatly affecting, enterprises, societies and their people. It must be the more powerful that everyone become a learned stakeholder, not just an end-user and leave everything to the vendor, service provider and their technology counterparts. Smart cities are a giant technological upgrade and the experience must make people deal more for their lives in a better way. Why make everyone learn? Businesses can focus what matters to them. Technology can primarily help organizat