April 2022 - Contents:
The Power of Resilience
5G vs. Aviation
The Truth on Paper
Securing the Cloud
This is the April 2022 issue - Volume 9 Issue 1.
See the
catalog
for a list of all issues.
Currently, most organizations are designed to please the stockholder or taxpayer, making cost efficiency a primary driver. Those organizations that have maximized cost reduction and increased efficiency have learned a painful, sometimes fatal lesson from Covid–19, even if they had Business Continuity Plans in place. On the other hand, resilient companies have fared far better.
Organizations that have maximized cost reduction and increased efficiency have learned a painful lesson from Covid–19. Resilient companies have fared far better.
Like any new technology, 5G cellular has its fair share of PR challenges. Is it safe, do we need it, will it work? We have looked at some of the safety issues in previous articles, so this time we turn to look at the allegation that 5G is unsafe around airports. What is the truth behind this—and might there be an issue that is way larger that 5G or aviation?
Continuing our 5G series, we turn to look at the allegation that 5G is unsafe around airports. What is the truth, and is there be an issue that is larger that 5G or aviation?
There are 3 kinds of IT departments, find out where you stand:
Run: Keeping the lights on | |
Grow: Improving existing systems | |
Transform: Changing the nature of the business |
For a free copy of “IT Assessments 123,” email:assessment@tmcconsulting.ca.
For a free copy of “IT Assessments 123,” email:assessment@tmcconsulting.ca.
Paperless offices are rare. Those few that exist usually rely on external, paper–using offices for various kinds of support. Despite the claims of digital experts, the world continues to depend on paper, and will continue to do so for many years. So before we complete our transition to paper–free and still rely on paper documentation, let’s explore the risks associated with it.
Despite the claims of digital experts, the world continues to depend on paper, and will continue to do so for many years. So, let’s explore the risks associated with it.
There are a number of reasons why traditional security approaches are futile when they are applied to cloud security. Mainly, it’s that they are designed for isolated, unchanging systems, with a set of rules that the security systems can follow. However, the cloud is not unchanging, and it frequently does not adhere to the rules that we may think of.
Using traditional security approaches to secure the cloud is impractical. This is because the cloud does not adhere to the rules that we may think of.