This is the thing BPM often ignores – to the chagrin of both customers and employees. In the algorithms of any given BPM-implementation, there is a need to be able to overrule the machine by individuals and these individuals need to be entitled and properly empowered to do so. There are too many incidents in which an exception from the rule is called for but not catered for. Gregory Bufithis mentions this in his analysis of the case of the infamous UA airline incident: Southwest Airlines and its “hub social team” that… Read more How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis →
“From what I understand they have tools to collect CDRs (Call detail record) that are generated on GSM core networks for billing purpose (who is calling who, etc.),” x0rz said. “They are deep into these systems.” There are more than 1,000 files included in the dump and it’s unknown whether any of the vulnerabilities being exploited remain unpatched. Read on here
Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago. Source: Security flaws in Pentagon systems “easily” exploited by hackers | ZDNet Not only for the Pentagon, it would be a great idea to install a suitable solution for Disaster Recovery (DR), just in case.
Applying IT Disaster Recovery/Business Continuity During the development of Security Policies for an organization that was at the beginning of a journey towards safeguarding their own (and their customer’s) data,… Read more The Ransomware-Attack Has Hit Us! Now What? →
Using a Microsoft-Tool for Software- and patch-distribution can’t be wrong, can it? I have tried a while to come up with a couple of good reasons to use SCCM, but… Read more Microsoft SCCM as the ride a malicious hitchhiker would love →
Both in Security as in the “business as usual” operations, patch management is a financial draught. OpEx in IT has many hidden slings and arrows, and patch-management (and its bigger… Read more Reducing cost of patch management →
Migrating your shop to a different platform? Get ready for headaches. The net is full of complaints. Always, regarding any topic, but when it comes to e-Commerce, there is much more irritation than about any other topic, at least so it seems. The reason is that there is never a full comparison to be found (exceptions do exist, such as http://www.ecomparo.de in Germany, but not completely for altruistic reasons, as they are playing a systems integrator role). In this overview, we will look at the issues, pitfalls and concerns when… Read more E-Commerce Migration? Get ready for a headache! →
This is an astonishing and highly fascinating blog. Recommended reading! “Brain of each human being is completely unique. Its structure is highly influenced not only by our DNA but also by everything we experience in our life. You can find people even with the same DNA – but life history is something that cannot be duplicated. So brain activity is unique biometric every person has. And such biometrics are used in access control systems when security is needed. Simply, you can use your biometric as a password to gain access… Read more engineuring →