Skip to main content

Posts

Showing posts from 2023

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Jobs we observed in a system performance

They are made either any of the following- - Tech job, - Business job, - Nut job, or - Enterprise job. What's yours? Can you do it better from your existing drive? Whatever you do, your output should facilitate not just your organization's goal but a little more than what you originally planned. Leaders usually kept them in the mind, so subtle only them knows it, but with some useful and delicate strategies employed people really are doing a good job, and working to improve them, too. That's the beginning why corporate social responsibility, or even the consequential environmental, social and governance initiatives can be a potent move to do something, if pertinent or weighty is even the right word. That doesn't need an ostentatious resources but the effect is meaningful for stakeholders, everyone we meant.

Philippine cyber campaign

Are Philippine institutions being targeted or simply being probed? We don't know for certain. It could be either or both. Whichever comes first? What we can understand, with the success of such attacks, is that they have found their way. Really.   How hard or easy? The attacker knows, but probably, also, those being attacked. Inclination should be there no matter how sophisticated our security systems are. In cybersecurity, we do a very focused job. Making sure we disappoint whoever is trying to gain access to any resource without permission and authority regardless of the environment we are in. What happened is that every asset deemed to have every variant of resource built-in, operating, that makes up the entire system working whatever it is trying to employ, in that case the primary purpose. Meaning, we have to know if we are running our system in a manner that is really secure, provisioned properly during design stage and managed continuously afterwards, post-implementation. No

Single problem in a technology project may break everything

Any leading staff, if not the most responsible individual, in an organization decides if it follows either policy, favorable inclination of end-users to a certain product or service or a direction from management which is different from the views of the others. Then there is the preference of a vendor, if not the only the factor that's been considered.  Every proven policy is vague for every new project. Such inclination to a product/service, even a best practice, is detrimental. Such management direction is unhelpful. On top of it all during the acquisition period, no matter the size of a certain, if not just one of the forms in a bigger, project plan, the responsibility within the acquiring organization must be muzzy. Or the responsible individual lacks the role and know-how about the project's practical application and business value, first for the end-users, and the entire organization's operational requirement. This must have been elucidated before bringing in any vend

Cloudflare maintenance in Atlanta datacenter

This post is a few minutes from the start of this event, in between 2023-08-17 05:00 and 2023-08-18 22:00 UTC, see https://cloudflarestatus.com .  If you use Cloudflare and watch the scheduled maintenance activity start or kicked in, you'd notice that resources got a blip, just for a second. They went out and a refreshed would make those affected resources return and its noticeable for websites.  In our end, everything seemed to be working fine, with a little, lag, if your eyes are set on to your traffic right now.  Here, we can see it's okay overall. Right?

iclassed privacy policy, unbelievable at first sight

Those who, before engaging us and was reading our business conduct, alerts and notices , could not restrain themselves asking, "can you really do your job without keeping any data at all? At the end of the day, you should still be looking at those information and make sure you did, and will, do well. I am expecting a lot from you here, you said so yourself!" Now, that last sentence is so loud. We keep them, not in our premises, but yours. If you've been our clients, you'll know how persistent we are when it comes to the reliability and security of your systems, data and credentials. That's our responsibility, as is made popular by cloud computing, and we don't need to be in a cloud.

How did you do it?

That's the question you get from the people around you.  That's when you first found a solution to a problem, discovered something useful for everyone, thought of new and more efficient process for work or business, overall. At work, regardless of what we do, this is every team member wants to do and in business wants their employees do. We don't always encounter such an experience.  This alone is already a problem. Even if they are working, someone with a good eye would easily spot it.  In every organization, one can easily detect a pattern. We, however, find that what we've learned and done would work anywhere and so we apply the same thing. We also find not long enough that this will become a problem, for employees to work long hours without any improvement at all and for business paying the price for not doing it right.  Then, again, you have to use a good eye to even see it. Who would not be happy when everyone is clocking for long hours, isn't that a hard work

Skiff's subdomain email

Skiff is an end-to-end encrypted workspace which includes  - Email service using skiff.com, or company/personal registrant owned custom domain which has been made free as well with a limited number of accounts that can be created,  - Cloud drive,  - Pages, and  - Calendar.  When using your company domain name simply follow the instructions given in your account setting.  However, if you prefer a subdomain, say, using the email address [email protected], you may need to append www, which is the subdomain you prefer to use, to the given CNAME records, there are two of them, and to illustrate it, we will use one which is, skiff1._domainkey and make sure to look completely like skiff1._domainkey.www in order for Skiff email service to recognize the configuration made with your DNS.  Not doing so will result in an error which you will see, and never displays your domain name in your account's domain configuration.

Could this be the greatest news for Earth and mankind 2023 beyond?

A scientific assessment of ozone depletion 2022 conducted by international organizations and government agencies says the ozone is healing.  The document's executive summary identifies the highlights including -Major achievement of the Montreal Protocol, -Current scientific and policy changes, -Future policy considerations.