When is a technology matured?

For the new technology, the key factor is how quickly its ecosystem becomes sufficiently developed for users to realize the technology’s potential.In the case of cloud-based applications and storage, for example, success depended not just on figuring out how to manage data in server farms, but also on ensuring the…

Continue reading

IDS-IPS-SIEM on corporate network

Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security information and event management (SIEM) tools are critical part of a corporate or enterprise network. An Intrusion Detection System (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. There are network based (NIDS)…

Continue reading

Shadow IT- the ignored threat

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at risk, or could even be breached already, and you don’t know it. At least not yet.…

Continue reading

Culture of evidence-based decision making

Evidence-based management entails making decisions and creating organizational practices that are informed by analyzing the best available data. The practice of evidence-based decision making in management (often abbreviated as EBMgt) evolved from medicine and emphasizes a rational, objective, and empirical approach to addressing business issues. It is analogous to the…

Continue reading

Zero Emissions, Zero Accidents and Zero Ownership

I recently came across the term : Zero Emissions, Zero Accidents and Zero Ownership through a linkedin article. These terms were loosely connected with various concepts but now they are closely related to electric motors, which include hydrogen fuel cells, batteries, supercapacitors, and flywheel energy storage devices. As the impact of…

Continue reading