Glosario KW | KW Glossary

Ontology Design | Diseño de Ontologías

All categories

Page:  1  2  3  4  5  6  7  8  9  10  ...  61  (Next)


Picture of System Administrator

4-D printing (four-dimensional printing)

by System Administrator - Monday, 16 February 2015, 12:32 AM

4-D printing (four-dimensional printing)

Posted by Margaret Rouse

4-D printing is additive manufacturing that prints objects capable of transformation and, in some cases, self-assembly.

When a complex item is created using 3-D printing, the item is printed in parts that must be assembled. The purpose of 4-D printing is to reduce the total time needed to create a finished product by printing with materials that are capable of changing form or self-assembling with minimal human interaction. The "D" in 4-D printing stands for time -- more specifically, time saved.

The materials in a 4-D printed item are chosen to respond to a certain stimulus such as the transfer of kinetic energy from one medium to another. In such an example, the particles in printed material would start to bond together and change form when heat is introduced.  Another approach to 4-D printing involves programming physical and biological materials to change shape and change properties. 4-D printing is closely associated withnanotechnology, a branch of engineering that is also called molecular manufacturing.

While 4-D printing is still very much in the experimental phase, it has the potential to eventually save a lot more than just time by opening the door for new kinds of assemble-at-home products. Because unassembled items created with 4-D printing would be flatter and easier to ship in large quantities, they would also save on transportation costs. The recipient would simply introduce the needed stimulus and assemble the end product without requiring directions.

This video from FW: Thinking explains more about the possibilities of 4-D printing.


Picture of System Administrator

45 Database Performance Tips for Developers

by System Administrator - Thursday, 15 January 2015, 10:33 PM

45 Database Performance Tips for Developers

  • Speed up your development with ORMs and discover the 'gotchas' involved
  • Learn the best practices for efficiently indexing tables
  • Get expert advice on writing well-formed SQL queries

Please read the attached eBook.

Picture of System Administrator

5 Keys to Enterprise Knowledge Management (KM)

by System Administrator - Friday, 5 February 2016, 12:29 AM

5 Keys to Enterprise Knowledge Management


Here are five keys to successfully delivering on an agile enterprise knowledge management strategy for customer service and support.

By Duke Chung | Expert Opinion 

Three little words have turned enterprise knowledge management, and specifically information and knowledge related to customer service, on its head in recent years: "Just Google It." A recent study from Fleishman-Hillard found that 89 percent of consumers go directly to business websites or turn to Google, Bing, or another search engine to find information on products, services or businesses before any human to human interaction takes place, if it ever does. 

With the rise of search, brand transparency and agile channeling, corporate knowledge can no longer be contained within an organization's pre-determined boundaries; it must become an infinite, available and ever-evolving resource. Here are five keys to successfully delivering on an enterprise knowledge management strategy for customer service and support. 

1. Internal Collaboration

While many organizations have doubled their content marketing efforts and budgets over the past few years, it isn't always the case that customer service content has received equal attention. Perhaps it's simply a difference in terminology. While "content marketing" turns heads, "enterprise knowledge management" is typically met with an indifferent stare and so a brand's FAQ pages and knowledgebase sit idle for months without being updated while blogs and social media pages continuously produce and promote new content.

It's easy to make the case, however, that customer service content deserves an organization's equal attention, because improving the quality and frequency of service and support content produces many of the same results as mainstream content marketing including better SEO positioning, positive brand reputation, and increased consumer engagement. 

The best customer service content starts not only with a quality KB solution that includes workflow, versioning features, and the ability to see what content's most searched for and used, but also with an organized system of internal collaboration. Optimally, while many SMEs and CSRs within an organization should collaborate to suggest and produce raw customer service and retention content, there should be a focused KB team that works together to refine this content, and then one or a few knowledge managers (depending on the size of the organization) to ensure all content published for consumption is in a consistent voice and format, is well organized, and contains relevant keywords for search purposes.

2. External Collaboration

Sometimes your best content editors are often your best customers. Make features available in your public-facing knowledgebase so that customers can not only rate content, but add comments as to what they found helpful or not, and what may be missing. 

Communities and a brand's social media properties can also be used to improve customer support content. With social media and community monitoring tools, knowledge managers can bring in informative customer-to-customer Q & A and add frequently asked questions with their correct answers to the knowledgebase.

3. Agile Distribution

Even the highest quality content has no real value unless your customers are able to find it. According to a recent Ovum study of more than 8,000 consumers, 74 percent now use at least three channels when interacting with an enterprise for customer related issues, which is why your customer-facing content must not only be accessible via your corporate website, but must also consistently convey across your social media properties, mobile apps, and other customer service channels of convenience.

The other must is search indexing. Within the past two years, the number of Google searches on mobile devices has grown by 500 percent; and by 2016, mobile searches will overtake PC searches for local search, according to Google Our Mobile Planet Smartphone Research. To remain competitive, an organization's content must be everywhere, and ideally, in multiple languages.

On the flipside of the content coin, making information and answers available to your CSRs is equally important. Having customers come into a support conversation armed with more product or service knowledge than the service rep is unfortunate, but through the power of search, it's happening more and more. A recent Aberdeen multichannel customer service trends report notes that 57 percent of best-in-class customer service providers give their CSRs access to the company's resolution knowledgebase versus 41 percent of all others. For both self-service and full-service customer care, agile channel distribution of content to both customers and CSRs is key.

4. Channel-specific Formatting

If your organization's knowledgebase content is comprised of pdf documents or multiple pages of text devoted to one subject, you've just lost your connection with the growing number of mobile customers. Simplify or repurpose content to make it mobile-friendly, chat-friendly, email-friendly, and even social-friendly, and if you must present a great deal of content, use bolding to highlight the text that will be most useful to the customer trying to find quick and correct answers.

5. Context Development

While today's challenge is mastering the creation, organization, and distribution of knowledgebase content, tomorrow's is to incorporate context to help customers find the information and answers that are most relevant. Mastering context in addition to content ups the ante on self-service success and customer satisfaction.

So call it what you want—"knowledge" or "content" management—whatever you need to get your customer service content the attention it deserves. It's time to brush the dust off that corporate knowledgebase and realize its true potential. Content is king, every facet of it. 

Picture of System Administrator


by System Administrator - Wednesday, 22 April 2015, 3:06 PM

Understanding 5G

Making up new definitions in the telecoms market is generally frowned upon and in many cases the technical definitions are overtaken by marketing and publicity definitions: ITU defined 4G to be IMT-Advanced (100Mbps when user is moving, 1Gbps when stationary) but the market has decided otherwise. LTE, and even LTE-Advanced, does not yet meet these requirements, but on the other hand, some operators called HSPA+ a "4G" technology or Long Term HSPA Evolution as an LTE technology, both for marketing and competitive reasons.

A new mobile network generation usually refers to a completely new architecture, which has traditionally been identified by the radio access: Analog to TDMA (GSM) to CDMA/W-CDMA and finally to OFDMA (LTE). So the industry has started now to refer to the next fundamental step beyond fourth generation OFDMA (LTE) networks as being "5G". It is clear that 5G will require a new radio access technology, and a new standard to address current subscriber demands that previous technologies cannot answer. However, 5G research is driven by current traffic trends and requires a complete network overhaul that cannot be achieved organically through gradual evolution. Software-driven architectures, fluid networks that are extremely dense, higher frequency and wider spectrum, billions of devices and Gbps of capacity are a few of the requirements that cannot be achieved by LTE and LTE-Advanced.

This paper will review the technology and society trends that are driving the future of mobile broadband networks, and derive from here a set of future requirements. We will then look at the key technical challenges and requirements, and some of the research subjects that are addressing these. Examples of this include Cloud- RAN, massive MIMO, mmW access, and new air interface waveforms optimized for HetNet and super-dense networks.

The paper will then review the impact of these 5G developments to the test and measurement industry. We will look at both how the 5G technology will change the requirements and parameters we will need to test, and also at how the 5G technology will be used by Test and Measurement to align the test methods to network evolutions.

The final section of the paper will take a more in-depth review of some specific waveforms being evaluated for air interface access. We will study the theory and objectives for the waveforms, and then see how the waveforms can be simulated and analyzed using test equipment. Such an exercise is important as these tests need to be made early in R&D to evaluate the impact and inter-action of the waveforms onto real device technology, to evaluate the real performance. This will also inform closely the level of device technology development needed to support the widespread deployment of the different types of waveforms.

Please read the attached whitepaper.

Picture of System Administrator

7 plantillas para hacer infografías sin Photoshop

by System Administrator - Tuesday, 30 June 2015, 11:54 PM

7 plantillas para hacer infografías sin Photoshop

Por Carolina Samsing

Cuando le quieres presentar información a un colega ¿cómo lo haces? ¿escribes un reporte? ¿usas una plantilla de PowerPoint que ya te tiene aburrido de ver tantas veces? Realmente, esta es una duda que mucha gente tiene. Una buena solución para este problema es utilizar infografías.

¿Por qué una infografía? Una infografía es una herramienta muy eficaz para comunicarse y cautivar la atención del lector - te permiten presentar de forma simple información que de cualquier otra forma sería difícil de comunicar.

Una encuesta reciente nos mostró que este año, profesionales de marketing tienen como prioridad aprender sobre contenido original y visual. Y como también aprendimos en nuestro reporte sobre el estado del Inbound Marketing en Latinoamérica, 17% de las empresas considera el contenido visual una prioridad.

Pero aquí está el problema: ¿cómo aquellos que no tienen experiencia con diseño - o el presupuesto para pagar una agencia, un diseñador o un programa de diseño - van a crear infografías profesionales y atractivas?

Que bueno que preguntaste. Aquí te revelamos un pequeño secreto: puedes ser un diseñador profesional utilizando un programa que probablemente ya tienes en tu computadora hace años: PowerPoint. PowerPoint puede ser tu mejor amigo cuando quieres crear contenido visual.

Y para ayudarte a comenzar, hemos creado 7 plantillas de infografías increíbles que puedes usar gratuitamente.

>>Descarga aquí tus 7 plantillas de infografías gratuitas<<

En el siguiente video te mostraremos cómo editar una de estas plantillas y gacer tu propia infografía. No te olvides de descargar las plantillas para poder personalizarlas.

Herramientas básicas para utilizar en cualquier infografía

Cuando piensas en crear una infografía, tienes que considerar cuatro herramientas esenciales de PowerPoint que te ayudarán a lo largo del proceso de creación: 

  • Relleno: determina el color principal del objeto o el texto 
  • Líneas: determina el color del contorno 
  • Efectos: agrega elementos de diseño en la infografía 
  • Formas: te permite escoger una serie de formas pre concebidas


Una infografía con distintos colores e imágenes 

Una vez que ya entendiste cómo funcionan las herramientas básicas tienes que empezar por elegir los colores te gustaría utilizar. La mejor forma de hacer esto es seleccionando dos colores principales y dos secundarios. Trata de que estos colores vayan de acuerdo a tu imagen corporativa. 

Si quieres usar formas, íconos y tipos de letra distintos, un buen lugar para encontrarlos es el proprio PowerPoint, que tiene más de 400 opciones de íconos para descargar.


Muestra estadísticas utilizando distintos tipos de letra 

Es muy común querer compartir estadísticas dentro de una infografía. Los gráficos pueden ser monótonos y poco atractivos por lo que intenta utilizar distintos colores. Otra cosa que ayuda a destacar esta información es el uso de distintos tipos de letras y distintos tamaños. También le puedes agregar íconos que sean relevantes a cada estadística, o a las que quieras destacar más. Aquí hay un ejemplo de esto:


Compara alternativas

Una infografía es una muy buena forma de comparar dos cosas distintas porque puedes ponerlas lado a lado y es fácil de visualizar las diferencias. Divide cada slide en dos partes y elige un esquema de colores distintos para cada lado, de esta forma, el contraste será mayor. Incorpora todos los puntos que hablamos en este post - utiliza distintos tipos de letras, tamaños, gráficos e imágenes para hacer la información más clara.


Busca inspiración en Pinterest

Otra buena idea es inspirarse en Pinterest, por ejemplo, utiliza cajas grandes para mostrar información importante y utiliza tamaños distintos, siempre siguiendo la idea de utilizar imágenes.


Algo un poco distinto

Si quieres mostrar información y estadísticas en un formato que no tenga que ser tan formal, puedes utilizar esta plantilla: es divertida pero al mismo tiempo te ayuda a mostrar tu información de una forma clara y cautivadora. 


Para terminar

Cuando termines la infografía, guárdala en formato PNG - esto le va a dar mejor calidad de imagen si la quieres utilizar para web.



Picture of System Administrator

7 Tips on Becoming an IT Service Broker

by System Administrator - Thursday, 16 April 2015, 1:33 PM

7 Tips on Becoming an IT Service Broker

In the not-so-distant past, CIOs had only two choices: build or buy. Today, all that has changed. In addition to build vs buy, IT leaders can choose from an alphabet soup of “as-a-service” options offered in the cloud: SaaS, DaaS, IaaS, and PaaS. You name it; somebody is offering it as a service. Plus,

there’s the added dimension of three different types of clouds: public, private, and hybrid.

As the pressure on IT continues to grow, budgets do not. The demand to “do more with less” is the new normal. What’s a CIO to do?

Many believe the next logical step is for IT leaders to evolve from making build vs buy decisions to matching up line-of-business requirements with third-party service providers — many of them in the cloud.

In essence, an effective CIO must become an IT service broker.

This white paper provides seven tips on how to make that transition with maximum effectiveness and minimal disruption to services.

Please read the attached whitepaper.

Picture of System Administrator

802.11ac Access Points

by System Administrator - Wednesday, 22 October 2014, 1:36 PM

Why mobile businesses need 802.11ac access points

by: Craig Mathias

802.11ac access points have finally arrived, bringing significant improvements over 802.11n -- especially now that everyone's on Wi-Fi.

With Wi-Fi now the primary network access method for many business workers, the improved capacity and performance of the 802.11ac wireless standard is just what's needed today.

The 802.11ac wireless standard is really more evolutionary than revolutionary, but it represents a direction with quantifiable benefits that are valuable enough for 802.11ac to constitute the core strategic WLAN direction for just about every enterprise going forward. 802.11ac is that important -- and now it's here. Any thoughts of putting off deployment should be dismissed by the end of this article.

802.11ac or 802.11n: What's the difference?

Consider that enterprise-class 802.11ac access points essentially cost the same as their 802.11n predecessors, meaning that 802.11ac provides an immediate boost to the price/performance ratio. 802.11ac also gets better performance than 802.11n through a combination of improved modulation, which offers more bits on the air per units of frequency and time;beamforming, or the ability to focus transmitted energy in a particular direction, improving throughput, reliability and, where required, range; and wider radio channels that are defined only in the relatively underutilized 5 GHz unlicensed bands. Current 802.11ac access point models support up to 1.3 Gbps, with lower-cost 866 Mbps access points now becoming more widely available as well, and the standard itself extends all the way to 6.93 Gbps -- although products with that level of performance are unlikely anytime soon due to the underlying complexity of such implementations.

Even more important than this performance boost is that 802.11ac access points operating in backwards-compatible 802.11n mode, with current 802.11n clients, yield 15% to 20% better throughput than current 802.11n access points, based on our own testing to date. This improved throughput means that enterprise WLANs currently using 802.11n clients can realize a big boost in capacity, simply by substituting 802.11ac access points -- which, by the way, cost about the same as their 802.11n counterparts. It's also worth noting that while mobile devices equipped with 802.11ac are in short supply at the moment, the number is expected to rapidly increase during 2014.

Deploying 802.11ac

It's easy to recommend that any deployments of previously unprovisioned space (the greenfield case) should use 802.11ac. 802.11ac should also be substituted in any pending orders of 802.11n access points, with the only proviso being to make sure that the existing management console can support such mixed configurations.

It's difficult to understand how waiting to deploy 802.11ac access points makes any sense today. Assuming that demands for capacity are continuing to increase everywhere (driven by BYOD mobile devices often being unable to connect to a wired network), the alternatives are either to do nothing and wait, which exacerbates the capacity problem, or deploy more 802.11n access points, which means investing in a technology that is not going to see further enhancements.

Some have suggested waiting for the so-called wave 2 versions of 802.11ac, which feature higher throughput of 1.8 and even 3.5 Gbps, as well as a capability known as multi-user MIMO, which enables multiple clients to be addressed with distinct data streams during a single access point transmit cycle. Multi-user MIMO will require new clients to make this work (sorry, no firmware upgrades in this case), and while some products here may appear in late 2014, it will be several years before multi-user MIMO and the other advanced features of wave 2 dominate the market.

The need for assurance functionality

Even if a given IT shop chooses not to deploy 802.11ac today despite the obvious benefits, there is one irrefutable and even urgent justification for installation of at least some 802.11ac access points right now -- assurance functionality. Assurance in this case refers primarily to rogue access point detection and intrusion detection and prevention. Note that an 802.11n access point or WLAN sensor cannot detect 802.11ac, so 802.11ac access points configured as sensors -- or dedicated 802.11ac sensors -- are required no matter what. The security and integrity of the WLAN, and the network overall, demand at least some investment in what is clearly going to become the mainstream wireless-LAN technology going forward. Note that 802.11ac access points deployed as sensors can later be converted to access if desired, although assurance functionality is always required regardless.

There is one other gigabit-class WLAN technology that will see increasing utilization over the next few years -- 802.11ad, which was approved over a year ago and which operates in the 60 GHz bands. It's unlikely the two standards will directly compete, however -- 802.11ac will likely replace 802.11n as the mainstream enterprise standard, with 802.11ad filling in in critical power-user, video and specialized high-throughput applications.

Next Steps


Picture of System Administrator


by System Administrator - Thursday, 2 May 2013, 9:35 PM
Picture of System Administrator

A Strategic Timeline for Next-Generation ERP

by System Administrator - Tuesday, 14 February 2017, 10:42 PM

A Strategic Timeline for Next-Generation ERP

by Rimini Street

Today's rapidly changing technology landscape and the onset of the "Hybrid IT Era" are driving the vision for a next-generation ERP platform. CIOs have a golden opportunity to lead ongoing business transformation within IT - transformation with the potential to deliver new growth for the business as a whole.

Please read the attached whitepaper.

Picture of System Administrator

A Well-Orchestrated Trust Model

by System Administrator - Tuesday, 13 October 2015, 1:44 PM

A Well-Orchestrated Trust Model


by Tempered Networks

According to a recent IDG survey, 76% of companies would feel more confident in enterprise security if they were able to 'cloak' vital systems and endpoints--whitelisting trusted devices and making them invisible to the shared network. That kind of confidence comes to life when you flip your trust model. In this report, we explore how these strategic thinkers can do just that, applying trusted overlay networks to conceal sensitive networks, endpoints or applications.

Please read the attached whitepaper.

Picture of System Administrator

Advanced Threat Hunting

by System Administrator - Friday, 11 September 2015, 12:21 AM

eGuide to Advanced Threat Hunting

By Bit9

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

To combat this, enterprises must focus on:

  • Prioritizing endpoint data collection over detection: Businesses need to continuously record the critical data necessary while also maintaining the relationships of those data sets to fully scope an attack.
  • Leveraging comprehensive threat intelligence: Alongside continuous data collection, enterprises must possess the capability to layer threat intelligence and reputation over the data they collect to instantly classify and prioritize threats—accelerating threat discovery in the process.
  • Expanding detection beyond the moment of compromise: Businesses should deploy solutions that can hunt both past and present threats based off of a continuously recorded history—not just individual events.

Tags: advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, networking, security, it management

Please read the attached whitepaper.

Picture of System Administrator

Agile Operations

by System Administrator - Tuesday, 13 October 2015, 1:56 PM

eGuide: Agile Operations

by CA Technologies

In the application economy, constant application updates are table stakes. To gain a competitive advantage, you must deliver the very best user experience by ensuring those improvements are based on real user feedback and application and infrastructure performance - from mobile to mainframe, on-premise or in the cloud. End-to-end monitoring solutions from CA can give your enterprise the holistic monitoring and in-depth management capabilities it needs to turn this feedback into valuable functions and reduce mean-time-to-recover.
Read this eGuide to learn how you can enhance user experience by leveraging real-time insights from your entire application and infrastructure to drive improvements.

Please read the attached whitepaper.

Picture of System Administrator

Agile Planning

by System Administrator - Thursday, 25 June 2015, 9:36 PM

Learn the Top Five Challenges to Agile Planning


To set the stage, let’s visualize an Agile team getting started. Your senior team has heard all about Agile and wants to gain from all the benefits – better products, shorter development cycles, happy customers and bigger returns. You, as the Agile evangelist, have been selected to lead this effort. You also have a new project just getting started. The project is going to be a new home monitoring system that will cut down electric usage in the average home by 93%. You can picture building your Agile development process and sharing your success with the rest of the company until everyone is bathing in Agile goodness. Not only will you demonstrate the power of Agile, but solve most of the world’s problems in one fell swoop. We’ll further assume that your team is already using a collaborative... 

Please read the attached whitepaper.

Picture of System Administrator

Application Modernization

by System Administrator - Friday, 12 September 2014, 12:03 AM

Application Modernization

Picture of System Administrator

Aseguramiento (CALIDAD)

by System Administrator - Thursday, 9 May 2013, 1:12 AM


Proceso de medición; Conjunto de operaciones que permiten determinar el valor de una magnitud.

Confirmación metrológica: Conjunto de operaciones necesarias para asegurar que el equipo de medición cumple con los requisitos para su uso previsto.

Función metrológica: Función con responsabilidad en la organización para definir e implementar el sistema de control de las mediciones.

Sistema de control de las mediciones: Conjunto de elementos interrelacionados o que interactúan , necesarios para lograr la confirmación metrológica y el control continuo de los procesos de medición.

Equipo de medición: Instrumento de medición, software, patrón de medición , material d referencia o equipos auxiliares o combinación de ellos necesarios para llevar a cabo un proceso de medición.

Característica metrológica: Rasgo distintivo que puede influir sobre los resultados de la medición.

Picture of System Administrator

Asegurar los datos empresariales

by System Administrator - Wednesday, 18 February 2015, 7:58 PM

Cinco pasos para asegurar los datos empresariales

por Warwick Ashford

Las investigaciones han revelado que la pérdida de datos es una de las principales preocupaciones de los ejecutivos de TI, según la firma de gestión de datos Iron Mountain, que ha compilado cinco pasos para asegurar los datos para conmemorar el Día de la Protección de Datos.

La iniciativa internacional, ahora en su noveno año, tiene como objetivo sensibilizar a los consumidores y las empresas de la importancia de salvaguardar los datos, respetando la privacidad y creando confianza.

El 28 de enero fue elegido porque ese día, en 1981, el Consejo de Europa aprobó el Convenio 108 sobre la protección de los datos personales de los individuos, la raíz de toda la legislación sobre privacidad y protección de datos.

La gerente senior de marketing de producto y soluciones de Iron Mountain, Jennifer Burl, dijo que las empresas de todos los tamaños pueden beneficiarse con los consejos sobre cómo mejorar la seguridad de sus datos.

"De acuerdo con la Alianza Nacional para la Ciberseguridad, el 50% de los ataques cibernéticos dirigidos están apuntados a empresas con menos de 2,500 empleados", agregó.

Burl dijo que hay cinco pasos que las empresas pueden tomar para mantener los datos seguros y protegidos para evitar problemas legales y reglamentarios.

Paso 1: Conozca dónde residen su datos

"No puede completar su plan de seguridad hasta que usted sepa exactamente lo que está protegiendo y dónde se almacena", dijo Burl.

La mayoría de las empresas almacenan datos en múltiples tipos de medios: discos locales, sistemas de respaldo basados en disco, en cintas fuera de las instalaciones y en la nube. Cada tecnología y formato requiere su propio tipo de protección.

Paso 2: Ponga en práctica una política de “conocimiento según necesidad”

Para minimizar el riesgo del error humano (o curiosidad), cree políticas que limiten el acceso a los conjuntos de datos particulares.

Designe el acceso basado en descripciones herméticas de puestos. También asegúrese de automatizar las entradas de acceso al registro para que nadie que ha tenido acceso a un conjunto de datos en particular pase inadvertido.

Paso 3: Refuerce la seguridad de su red

"Su red está casi seguramente protegida por un firewall y un software antivirus. Pero es necesario asegurarse de que esas herramientas están actualizadas y son lo suficientemente amplias como para hacer el trabajo", dijo Burl.

Diariamente se lanzan nuevas definiciones de malware, y el software antivirus tiene que seguirles el ritmo.

La filosofía de traiga su propio dispositivo está aquí para quedarse, y su equipo de TI debe extender su paraguas de seguridad sobre los teléfonos inteligentes y las tabletas que los empleados utilizan para fines de negocios.

Paso 4: Monitoree e informe sobre el ciclo de vida de sus datos

Cree un plan de gestión del ciclo de vida de los datos para garantizar la destrucción segura de los datos datos antiguos y obsoletos de la empresa.

Como parte de este proceso, las empresas deben:

Paso 5: Educar a todo el mundo

"La seguridad de los datos se trata, en última instancia, de la gente", dijo Burl. “Cada empleado debe entender los riesgos y consecuencias de las violaciones de datos y saber cómo prevenirlas, especialmente con el aumento de los ataques de ingeniería social”.

"Hable con sus empleados acerca de las vulnerabilidades, como enlaces web de malwarehábilmente disfrazados en mensajes de correo electrónico no solicitados. Anímelos a hablar si sus computadoras empiezan a funcionar de forma extraña".

Construya una cultura de seguridad en la cual todo el mundo entienda el valor crítico de sus datos de negocio y la necesidad de su protección. "Porque cuando se piensa en ello, todos los días son días de protección de datos", dijo Burl.

Educar a los usuarios para proteger la economía

La firma de gestión de contenido Intralinks dijo que muchas personas traen malos hábitos de seguridad de su casa al negocio, por lo que la educación de los usuarios no se trata solo de protegerlos, sino también sobre la protección de la economía.

El director de tecnología para Europa de Intralinks, Richard Anstey, dijo que puede ser contraproducente decirle a la gente que utilice contraseñas seguras, ya que crea una falsa sensación de seguridad que la gente luego lleva al trabajo.

"Cuando se trata de información muy sensible, como el protocolo de Internet, la gente necesita saber acerca de medidas muy seguras, como la gestión de los derechos de información", dijo.

Según Anstey, la seguridad se trata de saber cuál es el peligro y cómo implementar el nivel adecuado de protección.

"Si queremos una sociedad con datos verdaderamente seguros tenemos que empezar por asegurar que las personas saben qué valor tienen sus datos, entonces pueden tomar una decisión informada sobre cómo asegurarlos", dijo.

Demasiado énfasis en las amenazas externas

La firma de cifrado Egress ha advertido que muchos negocios se están centrando en las amenazas externas.

Una solicitud de libertad de la Información (FOI) de Egress a la Oficina del Comisionado de Información del Reino Unido reveló que el 93% de las brechas de datos se producen como consecuencia de un error humano.

El directores general de Egress, Tony Pepper, dijo que las empresas deberían empezar a mirar más cerca de casa para evitar las violaciones de datos.

"Los errores tales como la pérdida de un dispositivo sin cifrar en el correo o enviar un correo electrónico a la persona equivocada están hiriendo a las organizaciones", dijo.

Pepper añadió que los datos del FOI muestran que se ha gastado un total de 7.7 millones de dólares por errores cometidos al manejar información sensible, mientras que hasta la fecha no se han aplicado multas debido a fallos técnicos que exponen datos confidenciales.

"El error humano nunca será erradicado, ya que la gente siempre comete errores. Por lo tanto, las organizaciones necesitan encontrar formas de limitar el daño causado por estos errores", dijo.

Según Egress, la política debe ser soportada por tecnología de fácil uso que permita formas seguras de trabajar sin afectar la productividad, al tiempo que proporciona una red de seguridad para cuando los usuarios cometen errores.

Las empresas necesitan un enfoque proactivo para la seguridad de los datos

La firma de gobernabilidad de datos Axway dijo que los negocios necesitan tomar un enfoque proactivo hacia la seguridad de los datos frente a los hackers maliciosos y las brechas de datos.

El vicepresidente del Programa de Salida al Mercado de Axway, Antoine Rizk, dijo que en un mundo cada vez más conectado, las empresas necesitan monitorear proactivamente sus flujos de datos para prevenir las brechas de datos costosos.

"Sin embargo, muchas organizaciones grandes siguen esperando a que algo salga mal antes de abordar las fallas en sus estrategias de seguridad –un movimiento que fracasó en algunas de las brechas de seguridad más famosas de 2014", dijo.

Axway predice que en 2015, traer tu propio dispositivo va a evolucionar rápidamente en traer tu propio Internet de las cosas, con los empleados trayendo dispositivos vestibles al lugar de trabajo.

“Para que esa mayor movilidad empresarial abra las ventanas de oportunidades para las empresas, sin allanar el camino para que los hackers accedan a los datos privados, la seguridad debe evolucionar a la misma velocidad que los propios dispositivos", dijo Rizk.

"Las organizaciones también necesitan saber qué datos están trayendo a la oficina los empleados y qué datos están sacando de ella para asegurarse de que los ataques maliciosos y la actividad conspicua están bloqueados", dijo.

Es importante destacar los riesgos en las plataformas móviles

La empresa de protección de aplicaciones Arxan dijo que, en el Día de la Protección de Datos, es importante destacar el aumento de los riesgos en las plataformas móviles, especialmente en el sector bancario y de pagos.

El director de ventas para Europa de Arxan, Marcos Noctor, dijo que la firma predice que los riesgos de seguridad en el sector financiero serán un área clave de amenazas para el 2015.

"Con esto en mente, es vital que la seguridad de las aplicaciones móviles tome prioridadconforme los bancos, proveedores de pago y los clientes busquen hacer más en los dispositivos móviles", dijo.

Una investigación de Arxan reveló que 95% de las 100 mejores aplicaciones financieras de Android y 70% de las aplicaciones de iOS han sido hackeadas el año pasado.

La compañía dijo: "Nos gustaría recomendar a los clientes bancarios y de pago que están considerando el uso de una aplicación financiera móvil que tomen las siguientes medidas para aumentar la seguridad:

  • Descargue aplicaciones bancarias y de pago solo de las tiendas de aplicaciones certificadas;

  • Pregunte a su institución financiera o proveedor de pago si su aplicación está protegida contra la ingeniería inversa;

  • No se conecte a un correo electrónico, banco u otra cuenta sensible a través de WiFi público. Si eso es inevitable –porque usted pasa mucho tiempo en cafés, hoteles o aeropuertos, por ejemplo– pague por el acceso a una red privada virtual, que mejorará considerablemente su privacidad en las redes públicas;

  • Pregunte en su banco o proveedor de pago móvil si han desplegado protecciones automáticas para las aplicaciones que han lanzado en las tiendas de aplicaciones. No confíe solo en antivirus móviles, antispam o sus soluciones de seguridad de dispositivos para toda la empresa para proteger aplicaciones que residen en su dispositivo móvil contra los hackeos o ataques de malware”.

Más noticias y tutoriales


Picture of System Administrator


by System Administrator - Saturday, 30 August 2014, 12:31 AM


 Por Dr. Mario Cabrera Avivar

¿Qué es AUACoDe y en qué se inspiró?

AUACoDe, Asociación Uruguayo Andaluza para la Cooperación y el Desarrollo, es una Asociación Civil sin fines de lucro; que se inspiró en un ser nacional con identidad y autoestima, respetuoso y orgulloso de su pasado, comprometido con su presente y proyectado hacia el futuro con una visión de un porvenir enmarcado en la ética de la vida.

¿Cuándo y quienes la gestaron y constituyeron?

Se   gestó en 1999, a iniciativa de su actual Presidente, Dr. Mario Cabrera Avivar, junto a un grupo de personas, provenientes de diversas actividades de vida, vinculadas a la cultura, el arte, las ciencias sociales y exactas, la educación y la tecnología; se constituyó formalmente en abril del 2000 y obtuvo su Personería Jurídica, por resolución del Sr. Ministro de Educación y Cultura, el 16 de enero del 2001, siendo registrada con el número 8593, en el folio 70 del libro 17.

¿Por qué y para qué la constituyeron?

Por nuestra condición de descendientes de españoles-andaluces, con orgullo y por mandato de sangre, con la conciencia y la convicción de la necesidad de trascender nuestros tiempos, desde el ámbito del estado uruguayo, caracterizado por tener una población, crisol de inmigrantes predominantemente españoles, en un contexto como el actual, en el que el fenómeno inmigratorio se ha revertido, por diversos motivos.

Para :

  • Reafirmar la contribución, de carácter abierta y universal, de los valores y el legado cultural andaluz a estas tierras, como parte del rico legado español, en base a los valores esenciales de España y sus Regiones, como los principales sustentos de nuestra Identidad, aún compartidos con otras corrientes migratorias (incluídas las autóctonas), como lo expresa el escudo de una de sus comunidades autónomas : "Andalucía por sí, para España y la Humanidad"
  • Potenciar nuestra Autoestima en base a actividades vinculantes intergeneracionales, interterritoriales interdisciplinarias e interorganizacionales.

¿Cuál es su Objeto Social?

"Fomentar, promover, realizar y apoyar, con independencia de cualquier corriente de pensamiento político, religioso o filosófico, actividades de cooperación y desarrollo, social, cultural, educativo, científico y tecnológico, a nivel nacional, regional e internacional...", entre Uruguay y España, prioritariamente con la Comunidad Andaluza y " fomentar la  inserción  de  jóvenes en las actividades proyectadas, como factor de cambio futuro, que promueva el desarrollo ambiental y humano saludables y reconozca a la cooperación, como prioridad estratégica para el fortalecimiento de las capacidades locales, nacionales, regionales e internacionales de Iberoamérica, a fin de poder contribuir con su desarrollo integral".

¿Cuándo y para qué se integró a la Federación de Instituciones Españolas o FIE?

Se integró, como miembro pleno de la FIE desde Junio/2001, para:

  • Compartir igualitaria y fraternalmente con todos sus miembros, el deseo y  la acción de pertenencia, desarrollo y grandeza para Uruguay y España. 
  • Complementar e interactuar sinérgicamente con todos los miembros y allegados afines a las instituciones de la FIE, sus actividades  principalmente culturales lúdicas.

¿Qué actividades ha desarrollado e impulsado, desde el año 2000?

  • Festejo del Día de Andalucía, el 28 de febrero.
  • Reuniones Ordinarias de Comisión Directiva(mensuales) y de Asamblea Ordinaria.
  • Actividades Profesionales de Proyectos, vinculado al quehacer de sus miembros socios, acordes con las siguientes  Áreas de Actividad.

¿Qué vínculos nacionales e internacionales ha generado?

Con personas e Instituciones Públicas y Privadas en Uruguay, la Región Iberoamericana, España, Italia, Alemania y con Organismos Transnacionales como OPS/OMS, Federación de Cruz Roja y Unión Europea.

¿Qué siente necesario apoyar?

La necesidad de información a la población general, en particular a los niños, jóvenes, madres y ancianos, para fortalecer su identidad, su autoestima y sus potencialidades para el desarrollo social sustentable, en base a una economía genuina, en pro de un bienestar general viviendo la vida con salud y alegría.

¿Cuál es la Sede Oficial, con quién y a dónde comunicarse ?

Su sede oficial está en el Ateneo de Montevideo, Plaza Cagancha 1157, donde se reune la Comisión Directiva,; pudiendo comunicarse también, con su Presidente, Dr. Mario Cabrera Avivar en la Dirección Postal: Cap.Videla 2891,CP 11600, Montevideo, Tel.709 4970, Cel.(096) 100 000 o al

¿Cómo y para qué asociarse?

Se puede asociar telefónicamente o por e-mail, brindando :Nombre completo, Nacionalidad, Tipo y Nº de Documento de Identidad, SIN MÁS COSTO, que aportar sus ideas y su tiempo, para hacer y desarrollar con nuestra Institución un punto de encuentro y proyección de nuestras ideas solidarias y de futuro, respetuosas de nuestro pasado y responsables con nuestro presente y futuro. 


Director de AUACODE: Dr. Mario Cabrera Avivar

Sitio Web/Campus Virtual:

Picture of System Administrator

Auditoría (CALIDAD)

by System Administrator - Thursday, 9 May 2013, 1:10 AM


Cliente de la auditoría: Organización o persona que solicita una auditoría.

Programa de la auditoría: Conjunto de una o más auditorías planificadas para un periodo de tiempo determinado y dirigidas hacia un propósito específico.

Auditado: Organización que es auditada.

Auditoría: Proceso sistemático, independiente y documentado para obtener evidencias de la auditoría y evaluarlas de manera objetiva con el fin de determinar la extensión en que se cumplen los criterios de auditoría.

Hallazgos de la auditoría: Resultados de la evaluación de la evidencia de la auditoría recopilada frente a los criterios de auditoría.

Criterios de auditoría: Conjunto de políticas, procedimientos o requisitos utilizados como referencia.

Equipo auditor: Uno o más auditores que llevan a cabo una auditoría.

Evidencia de la auditoría: Registros, declaraciones de hechos o cualquier otra información que son pertinentes para los criterios de auditoría y que son verificables.

Experto técnico: (Auditoría) persona que aporta experiencia o conocimientos específicos con respecto a la materia que se vaya a auditar.

Auditor: Persona con la competencia para llevar a cabo la auditoría.

Conclusiones de la auditoría: Resultado de una auditoría que proporciona el equipo auditor tras considerar los hallazgos de la auditoría.

Picture of System Administrator

Autenticación Multifactor de Usuarios

by System Administrator - Friday, 26 June 2015, 6:21 PM

Consejos para la Autenticación Multifactor de Usuarios

Más vieja que la propia web, la autenticación de múltiples factores es un método de tecnología de seguridad de TI que requiere que la gente proporcione múltiples formas de identificación o de información para confirmar la legitimidad de su identidad para una transacción en línea o con el fin de tener acceso a una aplicación corporativa. El objetivo de los métodos de autenticación multifactorial es aumentar la dificultad con la que un adversario puede explotar el proceso de inicio de sesión para vagar libremente por las redes personales o corporativas y así comprometer equipos de cómputo con el fin de robar información confidencial, o algo peor.

Please read the attached whitepaper.

Picture of System Administrator

Automated tests and continuous delivery

by System Administrator - Friday, 23 January 2015, 2:23 PM

CTO advocates automated tests and continuous delivery

by: James Denman

Automated testing and continuous development have become the driving force for CTO Andy Piper as Push Technologies evolves its middleware platform.

Andy Piper is CTO at London-based Push Technologies, which provides a Java-based middleware platform that helps U.K. developers working on applications that require a lot of messaging to a lot of users. Most of their clients publish statistical information for either financial entities (like stocks and bonds) or for online gambling. Piper has pushed his development team forward by espousing continuous delivery and automated testing.


When it comes to functional testing, Piper says everything has to be automated. "Manual tests are almost valueless," he said. Manual tests take too much time, and he said he needs tests that are quick, clear and repeatable. Those requirements naturally lead to automated tests. He also pointed out that there's practically zero user interface to a middleware platform, which removes a lot of the need for user experience testing.

Conducting performance tests is one area where Piper sees benefits to manual testing. He pointed to Gil Tene's research on latency at Azul and explained that for performance testing, he's not looking for average behavior; he's analyzing the effect of the outliers. He said that using tools like HdrHistogram and jHiccup and analyzing the results intuitively works better for his team than trying to set up reliable automated performance tests.

Piper said the important aspects of functional testing are maintaining quality and moving quickly. "It's about enabling the developers to make changes more confidently," he said, "so they work more efficiently." Automation is an important part of keeping up with the pace at which his developers are able to make changes and making sure they get the feedback they need as soon as possible. But managing a large battery of automated tests can be challenging. 

Some tests break bad

Most of the tests are very straightforward, according to Piper; they either pass or fail and the results are very accurate. However, some tests have a tendency to fail when they should pass -- or they fail for the wrong reason. He calls these tests Heisentests, after the Heisenberg uncertainty principle. These tests are "a bit of a bugbear" for Piper right now.

The Heisentests are tricky because they can't be trusted. A failed result may be accurate and require a developer to recheck the work and fix something. Or a failed result might mean that some detail is slightly different than expected and everything is actually working as it should. Developers don't appreciate being sent on a wild goose chase, especially when the supposed target is an imaginary flaw in their code.

The Heisentests are a problem that persists at Push Technologies for the same reason that technical debt persists at many organizations: There aren't enough staff hours to fix the misfiring tests and meet project deadlines. However, the problem has reached a point where it must be addressed, and Piper is starting by having his team sort out the good tests from the bad. He said he has some testers working to sort the tests using JUnit categories. This way his developers will know which tests to question right away, and the team will know which tests to overhaul when they have time to pay down the technical debt.

Continuously delivering value

The search for efficiency has led Push Technologies to adopt continuous delivery practices. Piper said they use Maven for source code and Jenkinsfor automation, which seems to be a popular combination. Right now, every change that his team commits is automatically merged into a new shippable version of the platform as soon as it passes the battery of automated tests.

Piper deliberately chose continuous delivery over continuous deploymentbecause "enterprise clients want to peg everything to particular releases." It's important for enterprise developers to update middleware at their own pace and to be able to rely on the platform to remain stable.

Push Technologies is working on a cloud release that will likely be aimed at midsize businesses. That version "will probably be more of a continuous deployment model," Piper said. He said that one of the challenges of moving to continuous development will be making sure all the code that goes into production is as hardened as it should be. "I love all my developers to death," he said, "But I'd still feel like I was being irresponsible if I don't keep a close eye on them."


Picture of System Administrator

Automating the accounts payable process

by System Administrator - Thursday, 4 September 2014, 1:09 PM

Automating the accounts payable process

The challenges of a paper-intensive AP process

A study carried out among people working in NHS Trusts to explore attitudes to the challenge to go paperless by 2018 shows very high awareness of the initiative. This awareness permeates all the groups surveyed—heads of Trust, healthcare professionals and IT decision-makers—all of whom are generally enthusiastic about it and recognise the broad range of benefits for their Trusts of going paperless, or at least paper light.

Please read the attached whitepaper

Picture of System Administrator


by System Administrator - Thursday, 2 May 2013, 9:35 PM
Picture of System Administrator

B Corporation (Benefit Corporation)

by System Administrator - Wednesday, 10 September 2014, 8:54 PM

B Corporation (Benefit Corporation)


Posted by Margaret Rouse

A B Corporation (or Benefit Corporation) is a voluntary corporate form for for-profit companies that, in addition to wanting the tax benefits and legal protections that come in incorporating, also wish to take into consideration the best interests of society as well as the environment.

Benefit corporation (B corps) is a type of corporate structure recognized by some state governments in the United States. 

In addition to being profitable, a benefit corporation assumes the legal responsibility of considering its impact on society and the environment.  The goal of the corporate structure is to encourage for-profit companies to identify social missions and demonstrate corporate sustainability efforts. In exchange, the corporation may be eligible for certain types of legal protection, bidding protection or tax benefits.


As of this writing, almost half the state governments in the United States allow a business to incorporate or re-incorporate as a benefit corporation. Although each state provides its own specific guidelines for incorporation, the general intent of the B corporation form is to allow a business to define non-financial goals in its founding documents. Such goals may include quantifiable levels of acceptable community involvement, sustainability efforts or charitable donations.

Benefit corporation as a corporate structure in the United States has been promoted by B Lab, a not-for-profit company that promotes the use of business to solve social and environmental problems internationally.  B Lab promotes the triple-bottom-line approach to business, placing equal emphasis on people, planet and profit. B Lab also offers a certification for companies that wish to be identified as being a benefit corporation; while the certification can provide public relations benefits, it does not affect the organization’s legal status.

Continue reading:


Picture of System Administrator

Balanced Scorecards (BUSINESS)

by System Administrator - Wednesday, 25 June 2014, 4:12 PM

Use balanced scorecards to follow through on business strategy

by Barry Wilderman

In a recent article on this site, I explained the concept of strategy maps and how they can be effective in creating a business strategy and monitoring performance. Strategy maps show how an organization’s learning and growth initiatives impact the internal business processes that serve customers and determine financial results.

Balanced scorecards, another concept developed by Robert Kaplan and David Norton of Harvard University,  are the mechanism you use to fill in the details of the objectives that the organization has determined are essential to each of the four levels of the strategy map.

In the sample strategy map from the previous article, "Create High Quality Products" was listed as an internal business process. 


But what is the objective for creating high quality and what is the target? These are the kinds of questions an organization attempts to answer and enter into a balanced scorecard template like the one in Figure 1, from the Balance Scorecard Institute, a consultancy based in Cary, North Carolina.

For example, the internal business processes scorecard for "Create High Quality Products" might have the following elements:

  • Objective: Improve the quality of all manufactured products.
  • Measure: The number of products returned due to manufacturing defects
  • Target: For the one-year warranty period, fewer than three returns per 1,000 products shipped
  • Initiatives: Hire three new high-quality engineers. Implement a new supplier relationship management program.



Figure 1. Balanced scorecard template.

Objectives, measures, targets and initiatives can be set at any level of the organization, starting with the individual. For example, a programmer in IT might want to increase his effectiveness in delivering subsystems. The measure could be the number of subsystems delivered, with a target of three in a given year. Initiatives would define each subsystem by title.

This would lead naturally to a set of initiatives by the head of programming, and then, in turn by the CIO.

The balanced scorecard defines the terms of engagement. Poor performance becomes visible, as does superior performance.

Take a look at the example in Figure 2, which comes from Kaplan and Norton’s book about balanced scorecards. There is a full set of definitions for each of the four major areas of balanced scorecards and strategy.  Even though this example is relatively simple, care must be exercised.



Figure 2. Expanded view of one company’s balanced scorecard.

Consider the information under Financial. The objective, "Increase Market Share," is a noble one. However, in balanced scorecards, objectives do not specify measures or targets, but overall concepts that are subject to interpretation. For example, one might think that this objective is all about revenue, but the stated measure is actually "Increase in Number of Clients." Market share in this case refers to the share of clients, not the share of revenue.

Furthermore, the target listed for this objective is 25% revenue, which somewhat contradicts the measure of the number of clients. So, is the market share goal about percentage of revenue or percentage of clients? You can have a large number of very small clients and only a modest increase in revenue.

The bottom line is to exercise care in how the components are put together.

Aligning strategy maps and balanced scorecards

Figure 3 is an example of a balanced scorecard and strategy map that line up well. It represents a powerful combination for showing strategy hierarchically, with significant detail around each objective.



Figure 3. Example of strategy map and balanced scorecard that are aligned well.

Analyzing the diagram a bit further suggests certain implications of the regional airline’s strategies and balanced scorecard objectives, along with their relationship to each other:

  • Reducing the number of planes and optimizing routes are complex projects that might require project management software to execute effectively. Moreover, there is a need to understand risks and contingencies.
  • Multiple strategies may be under consideration, and not all of them can be done at the same time. A working committee must analyze when and if certain strategies can be included in the overall strategic plan.
  • Certain initiatives may contradict others. For example, on its face, reducing the number of planes might lower customer satisfaction because fewer choices will be on the schedule.

Balanced scorecards provide the necessary level of detail to implement the strategies defined in strategy maps. Leaving aside their relationship to strategy maps for a moment, using balanced scorecards is just good technique. All project steps should be subject to an analysis of goals, measures, targets and initiatives.

About the author:

Barry Wilderman has more than 30 years of experience as an industry analyst, researcher and consultant at such companies as Meta Group, Lawson Software, SalesOps Analytics and McKinsey and Co. He is currently president of Wilderman Associates. Contact him at and on Twitter @BarryWilderman.



Fuente: SearchFinancialApplications

Picture of System Administrator

Best Practices in BPM & Case Management

by System Administrator - Monday, 13 February 2017, 10:21 PM

Best Practices in BPM & Case Management

Choosing a case management software solution or deciding to switch to another vendor is nerve-wracking. As with any relationship, whether it's a personal or a business one, the elements that go into the decision require a great deal of thought.

But thanks to the advice in this white paper, you don't need to reinvent the wheel. It provides you with four important questions to ask potential relationship partners. Getting good answers will lead you to the best case management software for your individual situation.

Please read the attached whitepaper.

Picture of System Administrator

Best Practices in Cognitive Computing

by System Administrator - Monday, 13 February 2017, 10:08 PM

Best Practices in Cognitive Computing

Don't mistake cognitive computing for a science fiction artifact. Combining elements of machine learning, natural language processing, and artificial intelligence, cognitive computing holds much promise for the future of managing knowledge.

Applying computing power that learns from human behavior leads to better product and services design, which in turn promotes profitability. Learn how cognitive computing can help your business endeavors from this insightful white paper.

Please read the attached whitepaper.


Picture of System Administrator

Best Practices in Information Governance

by System Administrator - Thursday, 6 October 2016, 1:16 AM

Best Practices in Information Governance

Information Governance Grabs Center Stage

By Marydee Ojala

The old saying about any publicity being good publicity as long as your name is spelled correctly doesn't apply when the publicity is about a data breach. Bad guys breaking into your systems and stealing confidential information about customers and employees is never good publicity. No organization wants to incur the wrath of affected individuals or run afoul of government laws and regulations.

Good information governance policies and procedures help companies avoid data breaches.
They also have the beneficial effect of increasing productivity, streamlining workflows, and efficiently managing data lifecycles.

They facilitate the knowledge management practice of information sharing—safely and legally.
These white papers will provide guidance about putting information governance center stage at
your organization.

Please read the attached whitepaper.

Picture of System Administrator

Better Business Bureau (BBB)

by System Administrator - Friday, 26 May 2017, 1:50 PM

Better Business Bureau (BBB)

The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses. The BBB also acts as a consumer watchdog for questionable sales tactics and scams.

Accreditation allows companies to be certified as legitimate and reputable businesses. For consumers, BBB offers free business reviews of over four million businesses and investigates complaints.

As an avenue for voluntary industry self-regulation, the BBB offers a business code that organizations can pledge to adhere to, paying a fee and receiving a BBB logo to display as a sign of reputability. The BBB also intermediates customer complaints in an official capacity. The organization resolves about 75 percent of more than 885,000 consumer complaints per year.

Fraudulent activities the BBB has dealt with, and raised awareness of, include telephone cruise contest frauds, “Can you hear me?” scams and various tech support scams

Although the BBB is not affiliated with any government department and endorses no particular business, the organization itself isn't without controversy. The non-profit has been alleged to give higher ratings to businesses which pay a membership to the organization, a charge which they deny.

Picture of System Administrator


by System Administrator - Friday, 28 April 2017, 3:48 PM

Cómo funciona blockchain: Una explicación infográfica

por Emily McLaughlin


Entender cómo funciona una cadena de bloques es el primer paso para aprovechar la tecnología. Aprenda cómo una unidad de valor de blockchain se mueve de la parte A a la parte B.

Una cadena de bloques es un tipo de libro de caja distribuido que utiliza cifrado para almacenar registros permanentes y a prueba de manipulaciones de datos de transacciones. Los datos se almacenan a través de una red peer-to-peer utilizando un principio de "consenso" para validar cada transacción.

Uno de los principales beneficios de un sistema de cadena de bloques es que tiene la promesa de eliminar –o reducir enormemente– la fricción y los costos en una amplia variedad de aplicaciones, principalmente los servicios financieros, ya que elimina una autoridad central (por ejemplo, una cámara de compensación) al realizar y validar transacciones.

La tecnología de blockchain subyace en las criptomonedas, específicamente bitcoin y Ethereum, y está siendo explorada como tecnología fundamental para una serie de otros sistemas de registro como pagos móviles, registros de propiedad y contratos inteligentes.

Cómo funciona la cadena de bloques

Para obtener una sólida comprensión de cómo utilizar blockchain en una configuración empresarial, los CIOs deben comprender primero cómo una unidad de valor en una transacción se mueve de la parte A a la parte B. Esta infografía detalla cómo funciona la cadena de bloques desde el inicio de la transacción, a través de la verificación y hasta llegar a la entrega.

Cómo implementar blockchain

Si bien se espera que la cadena de bloques sea adoptada en primer lugar en los servicios financieros, tiene potencial para una amplia gama de industrias verticales; por ejemplo, la Oficina del Coordinador Nacional para las Tecnologías de Información de la Salud y el NIST examinaron recientemente propuestas para 70 casos de uso diferentes de blockchain para la asistencia sanitaria. Pero no importa la industria, para las empresas que ven los beneficios potenciales de la cadena de bloques –ya sea en ahorros de costos o mayor eficiencia en los procesos existentes, o en oportunidades de ingresos de una nueva línea de negocio– hay un riguroso proceso de implementación estándar a seguir. En nuestra guía paso a paso, Jeff Garzik, cofundador de la empresa de software y servicios de cadena de bloques Bloq, recomienda que los CIO planifiquen una implementación blockchain en cuatro etapas:

  • Etapa 1: Identificar un caso de uso y asignar un plan tecnológico. La elección de casos de uso adecuados es fundamental.
  • Etapa 2: Crear una prueba de concepto.
  • Etapa 3: Realizar una prueba de campo que implique un ciclo de producción limitado con datos orientados al cliente y, a continuación, realizar pruebas adicionales con productos y volúmenes de datos más orientados al cliente.
  • Etapa 4: Realizar un despliegue de volumen completo en la producción.

Impacto social de la tecnología blockchain

Los expertos predicen que la lista de casos de uso de la cadena de bloques, y el impacto de la tecnología en la sociedad, seguirán creciendo. Según Don Tapscott, autor, consultor y CEO de The Tapscott Group, la promesa de blockchain de cambiar cómo se crea la riqueza en todo el mundo es uno de los impactos sociales más significativos a tener en cuenta.

En la Cumbre DC Blockchain en Washington, DC, Tapscott también sugirió que blockchain:

  • Permitirá que las personas que viven en el mundo en desarrollo, que actualmente no tienen cuentas bancarias, participen en la economía digital.
  • Protegerá los derechos a los registros de propiedad.
  • Ayudará a crear una economía compartida basada en el intercambio real.
  • Mejorará el proceso de envío de dinero a miembros de la familia en países extranjeros a través de remesas electrónicas.
  • Ayudará a los consumidores a monetizar los datos, incluidos sus propios datos.
  • Reducirá los costos de hacer negocios.
  • Responsabilizará a los funcionarios gubernamentales con contratos inteligentes.

En el gráfico de abajo, el representante estadounidense David Schweikert (de Arizona); Bart Chilton, ex presidente de la Comisión de Comercio de Bienes Futuros de los Estados Unidos; Carl Lehmann, director de investigación en 451 Research; y David Furlonger, analista de Gartner, son citados este año hablando sobre el impacto de blockchain.


Excavando aún más profundamente

Si usted se está poniendo al día en blockchain, aquí está un glosario de términos:

  • Bitcoin: Una moneda digital que no está respaldada por el banco central o gobierno de ningún país; negociados por bienes o servicios con proveedores que aceptan bitcoins como pago
  • Minería bitcoin: El acto de procesar transacciones en el sistema de moneda digital; los registros de transacciones bitcoin actuales –identificados como bloques– se añaden al registro de transacciones pasadas, conocido como la cadena de bloques.
  • Criptomoneda: Un subconjunto de monedas digitales; no tienen representación física y utilizan cifrado para asegurar los procesos involucrados en la realización de transacciones.
  • Billetera digital: Una aplicación de software, normalmente para un teléfono inteligente, que sirve como una versión electrónica de una cartera física.
  • Libro de caja distribuido: Una base de datos en la que partes de la base de datos se almacenan en múltiples ubicaciones físicas y el procesamiento se distribuye entre varios nodos de base de datos; los sistemas de cadena de bloques se denominan libros de caja (ledgers) distribuidos.
  • Ethereum: Una plataforma de computación distribuida pública basada en cadena de bloques con funcionalidad de contrato inteligente; ayuda a ejecutar contratos peer-to-peer usando una criptomoneda llamada éter.
  • Hash/hashing: La transformación de una cadena de caracteres en un valor normalmente más corto, de longitud fija, o una clave que representa la cadena original (similar a la creación de un enlace bitly).
  • Remesas: Una suma de dinero enviado, especialmente por correo o transferencia electrónica, en pago por bienes o servicios, o como regalo.
  • Contrato inteligente: Programa de computadora que controla directamente la transferencia de monedas o activos digitales entre partes bajo ciertas condiciones; almacenados en la tecnología blockchain. .

Profundice más

Picture of System Administrator

Blockchain Technology

by System Administrator - Thursday, 23 March 2017, 12:39 PM

Why it's disruptive: Blockchain promises to make firms' back-end operations more efficient and cheaper. Eventually, it could replace companies altogether.

Executive's guide to implementing blockchain technology

By Laura Shin

The technology behind bitcoin is one of the internet's most promising new developments. Here's how businesses can use it to streamline operations and create new opportunities.

Blockchains are one of the most important technologies to emerge in recent years, with many experts believing they will change our world in the next two decades as much as the internet has over the last two.

Although it is early in its development, firms pursuing blockchain technology include IBMMicrosoftWalmart, JPMorgan Chase, Nasdaq, Foxconn, Visa, and shipping giant Maersk. Venture capitalists have so far poured $1.5 billion into the space, with storied firms such as Andreessen Horowitz, Kleiner Perkins Caufield and Byers, and Khosla Ventures making bets on startups.

A blockchain is a golden record of the truth that creates trust among multiple parties.


Page:  1  2  3  4  5  6  7  8  9  10  ...  61  (Next)