FORGOT YOUR DETAILS?

The Future of Smart Space

The future of smart space. As mention before smart space is the physical environment equipped with linked sensors and monitors that operate IoT powered technology to make our human communications with environment and each other become more simple and meaningful. So what does smart space hold for us in the future. There are many area
Tagged under:

Digital Transformation in Hotel Sector

Digital Transformation in hotel sector played an important role on how to be successful in this industry that is increasingly competitive and where customer experience and reviews is strongly related. Their reviews based on their experience can be delightful or disastrous for a brand, it is a must to make sure guests are delighted and
Tagged under:

The Importance of Computer Network Defense

We already discussed about what is Computer Network Defense or CND. Now let dive in on the importance of Computer Network Defense for business world, be noted it applicable for your home networks as well. Computer security violations are commonplace are typical and several take place around the world every day, it happen even in
Thomas Cook bankruptcy alert old may-not survive under new market
Thomas Cook bankruptcy alert old may-not survive under new market, management failing to bring digital transformation for new market reality. This is the conclusion made base on  current headline for travel news is about long established 178-year-old travel company and airline company declared bankruptcy, on 23 Sep 2019, after failing to reach a last rescue
Tagged under:
As the world keeps moving toward digital economy, so do traditional global payment business that used to be controlled by traditional players and now being challenged by non traditional competitors. With the use of big data, blockchain and AI, focus on the effective and efficient online channel to serve the global market at large is
Tagged under:
Google Way for Digital Transformation

Google Way for Digital Transformation

Company rise and company falls as you can observed from the history. We had just saw Samsung release their mobile Note 10, follow with recent Apple release iPhone 11 Pro. The whole world is eye on Google update event in October. Basically new modern phone standard is triple or quad camera len, 5G depend on
Tagged under:
For those who had watched Apple September 10 event, will know for new ipad 7th generation, smart watch 5 series, iphone 11 and new “pro” range of iphone 11 Pro, together with Arcade and Apple TV+ subscription at unbelieved USD 4.99 per month each, and free 1 year for any customer who bought new Apple
Tagged under:

Computer Network Defense (CND)

What is Computer Network Defense? Computer Network Defense (CND) is a set of procedure and securing measures that use computer networks to detect, monitor, protect, analyze and defend against network infiltration resulting in service or network denial, degradation and disruptions. CND will acknowledge against an unauthorized activity, for instance within the Department of Defense (DoD)
Cybersecurity Automation and Integration

Cybersecurity Automation and Integration

Cybersecurity Automation and Integration is keyword for what moving for next decade. After few decade of IT evolution, from IT security to modern cyber security, from traditional vulnerability management, like assess and determine vulnerability and likely risk for IT asset (such as networks, end points, application) to modern cyber exposure management, to advise likely cyber
Digital Transformation Modern Workplace Now is one of the theme and topic bring attention from management to employee alike. When company in the digital transformation (DT) journey, implementing what the modern digital business (MDB) required, obviously modern workplace where work get things is one area need to be under the transformation, and with artificial intelligence

How Zigbee Impact the World

How Zigbee Impact the World, a noted wireless security expert once said,”No wireless technology has been more integrated or impacts the physical world more than Zigbee.” Zigbee Alliance, a group of companies that maintain and publish the Zigbee standard is the leading expert in Internet of Things (IoT). IoT help user to communicate with the
Tagged under: ,
Work Automation and Continuous Intelligence. Just imagine for modern digital business (MDB) able to intelligently optimize business operations in order to improve customer service and internal productivity for effective digital transformation (DT) and achieve Operationalize End-to-End Digital Processes, what will be the benefits:- Automate the multitude of day-to-day processes that build customer journeys and deliver
The Power of Real-time Continuous Intelligence. As businesses become more software and digital centrist, the importance of real-time analytics is now more pronounced than ever. Some digital businesses have even shifted their business models to adapt to this change. The Power of Real-time Continuous Intelligence (CI), in one word, is automation. It’s not another buzzword

Attacks Against Zigbee

Today we going to discuss about attacks that can happen against Zigbee. Nowadays, technology is developing rapidly from time to time. Even the technology changing so fast it still face threat; physically or virtually from outsider. Despite using encryption AES 128 standard, which is also used by governments and banks but there is no network
Vulnerability Management explained in E-SPIN Vulnerability Management Wheel model
Why is Continuous Intelligence important? Because IT has historically focused on batch processing, the concept of continuous processing is fairly new to most organizations. Continuous intelligence waits for nothing, not data collection periods, not resource availability, not processing time. It is the nonstop generation of insight and actions based on operational data stores as well
Tagged under:
A Continuous Intelligence (CI) framework starts with the process of acquiring data and, with the help of analytics and machine learning (ML), derive insights from it to be able to make confident decisions and actions which are in turn reviewed and validated, to ensure the organisation continuously improves its decision-making capabilities, for decision support. If

Zigbee Network Topology

Network topology is the design of the elements such as links or nodes of a communication network. It can be used to illustrate various types of telecommunication networks. We already talk briefly about one of the three Zigbee network topology in previous post. Now let dive in a little deeper about all three Zigbee network
Tagged under:
From those who had watch Apple’s Worldwide Developers Conference (WWDC) 2019 event, will note that one of the service Apple will launch is the Apple Card. No sure how other is watch for along the transition from Apple from hardware, software and service digital transformation (DT). But for this Apple Card, it go beyond Apple
Tagged under:
If you owned a smart home, you probably stumble the word Zigbee or Z-Wave when you purchased some of your home appliance. We already discussed a little bit about Zigbee. Now the question is what is Z-Wave? We will discuss some key categories between this two smart home standards. Both Zigbee and Z-Wave operate on

What is Continuous Intelligence?

What is continuous intelligence? And, what does it provide to software development, IT operations and business teams? Continuous intelligence (CI) from all your data is not another phrase to describe real time, speed or throughput. It is a business-saving technique that helps enterprises analyze data in real-time from previous experiences and use it to optimize

Zigbee: The Introduction

What is ZigBee? The name refers to the waggle dance of honey bees after their return to the beehive. ZigBee is an open global standard for wireless technology invented to use energy-saving digital radio signals for personal area networks (PAN). It was created in 1998, standardized in 2003, and revised in 2006. It also designed
Tagged under:

Cloud Security Governance

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

Security Governance Framework

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight
VMware AirWatch Technical Overview by E-SPIN

Edge AI Computing

What is meant by Edge AI Computing? Edge AI Computing in IT is defined as the deployment of data-handling activities or other network operations away from centralized and always-connected network segments, and toward individual sources of data capture, such as endpoints like laptops, tablets or smartphones. Edge AI Computing deployments are ideally suited in a
Tagged under:

The Rise of Smart Spaces

The Rise of Smart Spaces is global phenomena, it keep rise in the global scale to improve personal and professional productivity, increase energy efficiency, simplify complex processes, and potentially make daily work life easier and less stressful for employee. World shifted toward digital economy and all sectors and industries is struggle to make their own

CIA Triad in Security Governance

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine
Security Governance Characteristics
Before, we already discussed on what is security governance or information security in an organisation all about. Today let dive into what are the characteristics or attributes for effective security governance that can be implement in an institution. The first characteristic is leaders or board members are accountable. What does it mean by accountable? Accountable
AI take over IT job
When you open news and read it, you will notice for overall trend of “downsizing”, or close down branches, relocated core process into low cost countries. It first reaction for traditional business management, if you can not generate more revenue, then the better option is to bring down the cost of operating, that involved downsizing
Tagged under:

What is Security Governance?

What is security governance? Basically every company have their own framework of standards, processes and company activities to ensure the whole organisation run smoothly everyday. All this company data and activities must be keep in private and only authorized people can access the data and activities. This is security governance or in other simpler word

Edge Computing in IoT

Edge Computing in IoT. What is edge computing in IoT? Edge computing allows data produced by internet of things (IoT) devices to be processed closer to where it is created instead of sending it across long routes to data centers or clouds. Edge computing is perfect for IoT for three reasons. Firstly because the data is
TOP