Skip to content

How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis

This is the thing BPM often ignores – to the chagrin of both customers and employees. In the algorithms of any given BPM-implementation, there is a need to be able to overrule the machine by individuals and these individuals need to be entitled and properly empowered to do so. There are too many incidents in which an exception from the rule is called for but not catered for. Gregory Bufithis mentions this in his analysis of the case of the infamous UA airline incident: Southwest Airlines and its “hub social team” that… Read more How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis

Security flaws in Pentagon systems “easily” exploited by hackers

Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago. Source: Security flaws in Pentagon systems “easily” exploited by hackers | ZDNet Not only for the Pentagon, it would be a great idea to install a suitable solution for Disaster Recovery (DR), just in case.

E-Commerce Migration? Get ready for a headache!

Migrating your shop to a different platform? Get ready for headaches. The net is full of complaints. Always, regarding any topic, but when it comes to e-Commerce, there is much more irritation than about any other topic, at least so it seems. The reason is that there is never a full comparison to be found (exceptions do exist, such as http://www.ecomparo.de in Germany, but not completely for altruistic reasons, as they are playing a systems integrator role). In this overview, we will look at the issues, pitfalls and concerns when… Read more E-Commerce Migration? Get ready for a headache!

engineuring

This is an astonishing and highly fascinating blog. Recommended reading! “Brain of each human being is completely unique. Its structure is highly influenced not only by our DNA but also by everything we experience in our life. You can find people even with the same DNA – but life history is something that cannot be duplicated. So brain activity is unique biometric every person has. And such biometrics are used in access control systems when security is needed. Simply, you can use your biometric as a password to gain access… Read more engineuring