Author Archives: Lucian Systems

Data security: Why a proactive stance is best

Threats to your data are virtually everywhere these days, and too often, data compromises seem almost inevitable. But with a proactive approach to data security, organizations can fight back against the seemingly endless waves of threats. IBM Security X-Force found the most common threat on organizations is extortion, which comprised more than a quarter (27%) […]

Sustainability in the age of AI

To achieve a step-change in business performance, organizations are combining technology modernization and sustainability into their core business processes. To do this requires improving user support tools that can help business leaders with the increasingly complex decisions needed to optimize across cost, service level, working capital and sustainability. Generative AI is a catalyst for transforming […]

AWS Application Migration Service Major Updates: Global View, Import and Export from Local Disk, and Additional Post-launch Actions

AWS Application Migration Service simplifies, expedites, and reduces the cost of migrating your applications to AWS. It allows you to lift and shift many physical, virtual, or cloud servers without compatibility issues, performance disruption, or long cutover windows. You can minimize time-intensive, error-prone manual processes by automating replication and conversion of your source servers from physical, […]

Why healthcare in the cloud must move to zero trust cybersecurity

Healthcare providers must look beyond the cloud and adopt zero-trust security to succeed in fighting back against the onslaught of breaches their industry is experiencing. Attackers often prey on gaps in network servers, incorrectly configured cloud configurations, unprotected endpoints, and weak to non-existent identity management and privileged access security. Stealing medical records, identities and privileged access credentials is a […]

Tips For Establishing an Authentic Online Presence With Customers

In today’s digital age, online presence is essential for businesses to reach their target audience and interact with customers efficiently. The Internet has opened up new channels for businesses to connect with potential customers and establish long-lasting relationships with existing ones. However, establishing a genuine online presence that connects with customers is often tricky, especially […]

AWS Week in Review – Generative AI with LLM Hands-on Course, Amazon SageMaker Data Wrangler Updates, and More – July 3, 2023

In last week’s AWS Week in Review post, Danilo mentioned that it’s summer in London. Well, I’m based in Singapore, and it’s mostly summer here. But, June is a special month here as it marks the start of durian season. Starting next week, I’ll be travelling to Thailand, Malaysia, and the Philippines. But before I […]

AI in recruitment

Building an efficient and effective recruitment process is especially relevant in tight or competitive job markets. According to the U.S. Chamber of Commerce, there were more than 10 million job openings in the spring of 2023, but only 5.7 million unemployed workers in the U.S. That puts workers at an advantage, allowing them to negotiate […]

CMMS vs. EAM: Two asset management tools that work great together

Most organizations can’t run without physical assets. Machinery, equipment, facilities and vehicles provide economic value or benefit operations. In most cases, they are fundamental to the performance of the organization, regardless of whether they are small-scale laptop portfolios or vast transportation networks. Energy companies rely on uninterrupted power supplies, airlines aim to ensure passenger safety, […]

Regulated workloads with Citrix-DaaS: Configuration for stricter security and compliance standards

In a world of increasing security threats, IBM Cloud offers a variety of solutions to assist you in security and compliance. We have incorporated several IBM Cloud services into our Citrix-DaaS solution, enabling you to easily stand up a secure deployment out of the box. In managing your threat vectors, it is a good idea […]