Posts

Showing posts from October, 2021

Tools for publishing and sharing training resources on the Web

Image
Podcasting. The podcasting consists of creating sound files and its distribution through a syndication system that allows to subscribe and use a program that you download the Internet so that the user can listen whenever you want, usually on a portable player. These sound files can be cataloged and stored on the web so that users can download them lifebloombeauty . The podcasts can range from read excerpts from works that we recommend, lectures on topics related oral traditions of the area where the school is located ... the possibilities are enormou futuretechexpert . In web 2.0 we have simple services that allow us to record our podcast such as: 1.             Vocaroo 2.             AudioPal Similarly, we also have options to create our own podcast repositories: 1.             Chirbit . It allows you to recor...

Computer security and data protection

Image
Information security management. The author Álvaro Gómez, in his work Enciclopedia de la Seguridad Informatica , defines the Information Security Management System (ISMS) as: “that part of the general management system that includes the policy, the organizational structure, the necessary resources , the procedures and processes necessary to implement information security management in an organization.  It should be noted that, in practice, information security cannot be fully guaranteed , that is, it is impossible to eliminate all the risks that may exist. However, what we can do is manage them. In order to reduce risks to a minimum , we have to implement a series of tasks, procedures, programs and policies that allow us to guarantee a certain level of information security in the organization. In this process, the following aspects of the organization should be considered: 1.             Persons 2.    ...

What is Business Intelligence

Image
Accessing these applications also allows obtaining data from all areas of the business. So many that it is often difficult to work efficiently with such data. "Business Intelligence is the set of strategies and tools focused on the administration and creation of knowledge through the analysis of existing data in an organization or company." Specifically, the key points of these systems are: 1.             Availability of management data : it is necessary to have business data in all relevant areas, in order to build a business intelligence system on them. 2.             Integration and coordination of data : in the company there are different areas and systems that generate data, so the process by which said data is converted into useful information implies that its access is coordinated, sources are appropriately integrated, and are added correctly. 3.   ...

New technologies in neuroscience

Image
What if, by spending a couple of hours a week in front of a computer, the neural pathways and synapses of the brain were strengthened so that students could advance subjects and knowledge both cognitively and academically? If we explained to you that the training that the child can do alone would be equivalent to reducing the academic courses from ten months to five? What would you think if we explained to you that these neural pathways modify our brains in the essentials, allowing us to reset with greater capacity? It may seem to you that we are speaking from the time warp, but in reality, we are only speaking from New York (six hours of time difference). Here, many schools have taken up the academic challenge posed by the implementation of technologies in academic life. An expert consultant tells us that the National Institute of Health of the US Government has developed a brain training program, called C8 Sciences , that improves executive function in children between 5 and 9 ye...

The strategic planning of information systems

Image
The strategic planning of information systems , or equivalently the drafting of the information systems master plan , has as its purpose the review of the current state of the organization, the identification of the desired strategic situation and the planning of projects and changes in the organization needed to achieve that desired state, typically over a 3-5 year period. Although the process of creating the systems plan is not trivial, nor is its subsequent deployment, the objective can be defined in a simple way: it is about analyzing the current state of the three basic dimensions of information systems , identify your desired future situation and determine the actions necessary to achieve that future situation. The proposed phases for the drafting of a strategic systems plan are: 1.             Determine the strategy and current context of the organization 2.           ...

KPIs: Incident control

Image
Introduction to the decision of KPIs. Achieving excellence in service management involves defining, measuring and analyzing the different processes that support the IT services of a company. In order to measure and analyze, within the best practices in the management of services published under ITIL , different performance indicators (key performance indicators, KPIs) are used. These indicators are metrics that, defined according to the objectives set by the strategic plan of the company or the IT department, qualify and quantify how their services are being developed. For KPIs to make sense and can be used for this purpose, they must meet the so-called SMART requirements: 1.             Specific : must be defined specifically. 2.             Measurable : they must be measurable. 3.             Achievable : Reali...

Security in electronic business transactions

Image
As in all transactions, whether using traditional postal mail, the telephone system, and even if they are carried out face to face, in Internet transactions, precautions must be taken to reduce risks to an acceptable level. From the buyer's point of view, whether this is an individual, or a company acquiring goods from an Internet provider, it is necessary to have certainty about who is really behind the web pages   that they see, if they are really who they say they are and are not an identity theft. As the Internet is a public network, not a private one, shoppers are still fearful and reluctant to send their credit card number through it. Threats to the security of payments. In face-to-face transactions , in person, the seller and the buyer use physical signs to ensure that they are negotiating with a reliable counterpart: The seller can verify the signature, photo and identity documents of the client, and for his part the client You can verify the use of rosettes on employ...

Control of activities in systems management

Image
Any technological tool that supports ITSM ( IT Service Management ) must have at least the following requirements, regardless of the management process or processes that include: 1.             Self help . The different options must be clearly locatable through menus. Getting the user to generate a ticket with the appropriate characteristics and the necessary information so that it can be attended to correctly is essential. Self-help must allow the customer of the service to provide all this information in the most efficient way for the development of the life cycle of the ticket. A web page approach is usually used that are easily accessible through a very intuitive menu, always prioritizing the usability of the software. 2.             Process engine . The flows must be predefined, including a series of controls defined for the life cycle of each of them. The process engin...

Risk control in systems management

Image
Introduction to risk control. All organizations face a series of risks when carrying out their activity and, therefore, when using their services. The regulator and rating agencies are beginning to take into account the analysis of companies' risk management processes when evaluating their health. Today, there is no doubt that proper risk management is a competitive advantage over the competition, especially in the current economic situation where trust is one of the most valued aspects among the clients of an entity. Having processes to mitigate risks only increases this confidence. In the field of IT service management , risks have to be managed to ensure the availability of systems and avoid the loss of confidential data among other setbacks. Having a strategy for risk management becomes essential in the development of the service management strategy. In fact, ITIL includes it as part of the design of the service, since, from the moment it is conceived, it is necessary to ...

ICT security measures

Image
Aspects of data security. When talking about the security of personal data implicitly alludes to various facts and aspects of a different nature that are complementary to each other. These elements, considered as the three aspects of data security, are: 1.             Confidentiality : personal data are recorded and saved in order to fulfill the function specified in the declaration of the file. For this, it is necessary that certain people, expressly authorized based on their work, access these data to proceed with their treatment. No other unauthorized person may have access to the protected personal data. 2.             Integrity : means that no unauthorized person may manipulate or change the data for fraudulent purposes. 3.             Availability : means that an incident must be prevented from causing the un...

What are the most suitable tools on the market that meet ITIL requirements

Image
ITILv3 compliance tools The following is a list of tools evaluated and certified by PinkElephant as Compliance with the main ITILv3 processes: 1.             Marval: 1.             Msm v12 gold 2.             Msm v12 silver 2.             Hp: 1.             Gold service manager 3.             Omninet: 1.             Omnitracker itsm center v3 gold 2.             Omnitracker itsm center v3 silver 4.             Easit: 1.           ...

Infractions and sanctions of the LOPD

Image
Infractions in the LOPD Article 43 of the LOPD establishes as those responsible subject to the sanctioning regime: 1.             Those responsible and those in charge of the treatment of private files. 2.             Those responsible for public files, which, as will be seen later, are governed by their own procedure. Article 44.2 of the LOPD establishes which are minor offenses: 1.             Do not send the notifications provided for in this Law or in its development provisions to the Spanish Agency for Data Protection. 2.             Do not request the registration of the personal data file in the General Data Protection Registry. 3.             The breach of the duty of information to the affected...

How to prepare training materials with e-learning

Image
The most important thing and that we must never forget is that the contents have to cover the training needs of our workers and provide them with the skills and abilities necessary to perform their work in a more optimal or efficient way. In the same way, the acquisition of new knowledge through consultation and work on the contents can also serve to promote and carry out new positions and functions. Methodology for preparing training content There are multiple methodologies for the design and development of training materials and we could write several manuals to explain some of them, but this is not our case. For this reason, and in a direct way, we will try to list the most important aspects to take into account when tackling the arduous task of preparing training materials: 1.             Analysis of the needs of the group to be trained : This analysis will determine the topic to be addressed and will serve as a starting...