I agree Utilizamos cookies para mejorar la experiencia de navegación del usuario y para estudiar cómo se utiliza nuestro sitio web. Si navega por nuestro sitio web, estará aceptando el uso de las cookies en las condiciones establecidas en la presente política de cookies. Esta política puede ser actualizada, por lo que le invitamos a revisarla de forma regular.

¡HI! If you want to propose us a project, send a mail to info@albatian.com

maria - proponer proyecto

+34 91 433 30 99  

I HAVE READ AND ACCEPT THE TERMS AND CONDITIONS OF USE AS WELL AS ALBATIAN´S PRIVACY POLICY

 

ALL INFORMATION ABOUT
BPM, PROCESS, R & D, TECHNOLOGY

HOME / BLOG

Industry 4.0: the bpm challenge

By Juan Emilio Alvárez, Specialist in Digital transformation and BPM

 

"The Industrial Revolution 4.0 and / or Digital Transformation,”, is already a reality. This transformation implies a reinvention, but, unlike previous transformations, times are critical. Supply and demand vary at Vertiginous speed, and every company has to find its way to success. In this scenario, is it possible to bypass digital transformation 4.0?

The immersion in the "Digital Transformation" has to be a reality, but do not confuse Digital Transformation, with change of technology. Elements such as manufacturing and additive intelligence, robotics, artificial ...

(Keep reading)

Payback of management misinformed by excess - PCs in the industrial environment

By Bernardo Ramos, IT security expert

A few weeks ago media around the world alarmed citizens with a "Ransomware" attack which they called "Wannacry". It had blocked lots of computers of some major companies around the world

Shortly afterwards the same media again alarmed us with a new wave of even more sophisticated attacks of the same type. Now they explained that Russia had used a cyber weapon called "Petya" to attack Ukraine with possible unpredictable effects in other countries.

Enterprise executives are not usually concerned with issues such ...

(Keep reading)

Cybersecurity: Do not Protect Your PC

By Bernardo Ramos, IT security expert

Cybersecurity: Do not Protect Your PC

 

Why should you pay to protect your PC?
How much money are we wasting to protect our PC against computer viruses?

In a world where both the information and the programs used to process it are increasingly in the "cloud" is it still reasonable to spend effort and money on protecting the end point? (Either a PC, a tablet or a Smartphone)

Our computers are becoming more and more a simple tool, such us the pencil we used to use "in the old days", to process our information ...

(Keep reading)

The reporting on Cibersegurity is meant for management satisfation or to progress?

By Bernardo Ramos, IT security expert

Ciberseguridad: No protejas el PC

What is the use of reporting in general?

There are three possible answers:

  • To satisfy the boss's craving for information
  • To show that you do your job
  • To identify what needs to change to make progress.

Of course, everyone will say that the third option is the correct one

But in most cases the true answer is the first one without any further aim

If we want to know if we are doing well in terms of cybersecurity, if we really ...

(Keep reading)

CYBERSECURITY

By Bernardo Ramos, IT security expert

Cybersecurity

Protect only what is needed:

  • For its value
  • Replacement / repair cost

 

The current situation: The truth is painful. The starting point for cybersecurity in at least 90% of cases is summarized as follows:

  • You are spending too much money
  • You are not well protected

Being well protected does not mean being 100% It is impossible to protect everything 100% Protection is inversely proportional to the inconvenience it causes to your employees, collaborators and customers. Except for a few exceptions You do not have a clear idea of the actual level of protection of ...

(Keep reading)