Tactical, Operational & Strategic Analysis of Markets, Competitors & Industries
“Tiny IoT devices don’t have power to do really powerful security.”
Even early 1980s grade 8-bit, 8MHz chips with only 2k of RAM can do elliptic curve cryptography with a 256-bit key-length and are effectively as strong as RSA crypto with 2,048-bit key length, which is strong enough for U.S. “Secret” level national security information. That crypto is done using such little battery power that signing or verifying data on the hour every hour for twenty…
Added by Alex Ziaullah Mirza on July 27, 2020 at 9:12am — No Comments
Hey! thanks for coming to this page and article, It will increase my page optimization. :) Got it? Never mind we come to the topic. " #TechTourism " . A number of people from various line of business asked me what is #TechTourism? with facts, If I am defining it then i call it " Technologies for Tourism " just like "Technologies for Finance " which is also #finTech (Financial Technology).
More or less #TechTourism is derived from various industries' combination like Technology or…
ContinueAdded by Alex Ziaullah Mirza on July 27, 2020 at 8:55am — No Comments
State Level Scanning: (Brief): Island & Land area, good for shipping business, Tourism Business and Food Business as well construction business. Penang is less developed state as compared to the Selangor except electronic industries which is 80% equipped or ready for rev 4.0 [This is because Penang has been a hub for electric & electronic manufacturing industries and this provides strong basement for IOT industries toward 4.0] . Penang does have…
ContinueAdded by Alex Ziaullah Mirza on July 27, 2020 at 8:30am — No Comments
INTRODUCTION:
The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tool of Information Technology with respect to security concerns and risk management factors. Information technology is…
ContinueAdded by Alex Ziaullah Mirza on October 7, 2018 at 6:30am — No Comments
The CPTPP is a new free trade agreement between Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore and Vietnam. Once the CPTPP enters into force, it will be one of the largest free trade agreements in the world and will provide enhanced market access to key Asian markets. .....more see below
Some related topics for #CPTTP…
ContinueAdded by Alex Ziaullah Mirza on October 6, 2018 at 10:00am — No Comments
You will find more statistics at…
Added by Alex Ziaullah Mirza on June 20, 2016 at 2:30am — No Comments
Two different articles those may have connection or relevancy :
1- #Pakistan, The United States & #Afghanistan
ContinuePakistan has played an important role in war on terror, and its military has destroyed infrastructure and networks of militant groups in North Waziristan, South Waziristan and other agencies in…
Added by Alex Ziaullah Mirza on June 14, 2016 at 9:22pm — No Comments
Added by Alex Ziaullah Mirza on May 31, 2016 at 4:00pm — No Comments
Alexander-The Great was the disciple of Aristotle and a conqueror of vast territories of land that stretched from West to East that entailed millions of subjects. The success and glory that he was able to attain at such a young age was truly awe-inspiring. He was the commander of a massive army which involved multiple extremely talented and experienced generals – all of whom served and obeyed their leader to the greatest extent.
His death occurred at the age of 32 and there are…
ContinueAdded by Alex Ziaullah Mirza on May 31, 2016 at 3:06pm — No Comments
Cyberwarfare which is known-ed to be the actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.
Cyber warfare is a relatively new concept whereby politically motivated hackers and Computer scientists develop means of causing disruption or damage to a government’s IT system and network infrastructure. There are various techniques that fall under cyber-warfare such as a virus or …
ContinueAdded by Alex Ziaullah Mirza on March 6, 2014 at 12:39pm — No Comments
Added by Alex Ziaullah Mirza on October 19, 2013 at 12:48am — No Comments
Mr. James who was just graduated from an reputed engineering institute in telecommunication sector. He was celebrating his graduation with his family, Friends and other relatives with great gathering at near by Hotel sponsored by his father. James was excited & starting thinking to work for an IT company soon.
After few days, he visited a number of companies, organization and institutions to drop his CVs or walk in interviews. He almost attended more than six walk in interviews…
ContinueAdded by Alex Ziaullah Mirza on July 24, 2013 at 4:30am — 2 Comments
Added by Alex Ziaullah Mirza on October 12, 2012 at 11:59am — No Comments
Added by Alex Ziaullah Mirza on August 29, 2011 at 3:24am — No Comments
Ethics
of
Competitive Intelligence
by
Ziaullah Mirza
Online Publication 2011 (Part 1)
Basics of Competitive Intelligence
Competitive intelligence is the art of defining, gathering, analyzing, and distributing intelligence…
ContinueAdded by Alex Ziaullah Mirza on August 17, 2011 at 8:44am — No Comments
You might be interested in the next few IntelCollab webinars:
© 2021 Created by Arik Johnson.
Powered by