On Cloud, Cyber Security, Process, General Tech & Musings
Pages
(Move to ...)
Home
Books Authored
Articles
Contact
▼
Cyber Security Threat Classifications
›
Read an interesting book where the usual Cyber Security Threat Classifications were listed as below: Security Threat Supply a) Internal Thr...
Four Types of Security Threats
›
You need to be aware of the Four Types of Security Threats: Disclosure: This involves leaking secrect information or data to the wrong guys....
Cyber Security
›
Cyber Security is extremely important for an Organization of whatever size it might be. Cyber Security breaches can be so awful that it can...
Indian Heathcare sector on the High
›
Interesting read on the healthcare special by Punita Jasrotia in SpiceRoute Healthcare sector indeed on a high with government's en...
Lean IT vs Six Sigma
›
The confusions between the concept of Lean IT and Six Sigma still exist. Many I times, I get asked the same question, "Can you tell me...
Cloud Changing the Tech Landscape
›
Read an interesting article on the wired: http://www.wired.com/2015/10/meet-walking-dead-hp-cisco-dell-emc-ibm-oracle/ It shows how cloud...
Lean's aim
›
If we use Lean as a mean to employee reduction, it is not a right way to go. First focus on removing the waste - on quality and process imp...
›
Home
View web version