Posts

Showing posts from April, 2025

Building Resilience via Leadership in Crisis After the Breach: Analysing the Response from NS Power

Cyberattacks on utilities like Nova Scotia Power (NS Power) are not just corporate events—they are matters of public interest and, increasingly, national security. The breach that recently impacted NS Power is a stark reminder that the stakes are far higher than just operational disruption. The decision of how much to say, when to say it, and how to restore public confidence are not just communications challenges; they are strategic decisions with long-term consequences. In today’s cybersecurity landscape, no defense is impenetrable. What distinguishes resilient organizations isn’t immunity to attack, but the integrity and transparency of their response. As NS Power works to recover from this breach, it stands at a critical crossroads—one that’s all too familiar in the energy and infrastructure sector: treat cybersecurity as a technical fix, or recognize it as a matter of public trust. If NS Power chooses the latter, and commits to meaningful transparency, it can emerge stronger th...

Not Forgotten, Just Fulfilled: Wi-Fi’s Exit from the Emerging Tech Stage

 In the rapidly shifting world of computer networking, the landscape of “emerging technologies” is constantly being redefined. In recent years, if you scan lists from leading analysts and tech thought leaders, you'll notice an intriguing shift—technologies like AI-driven networking, SD-WAN, Zero Trust, SASE, network automation, and even 6G now dominate the spotlight. Once a headline act, Wi-Fi seems to have quietly stepped out of the emerging tech conversation. So, what’s happening here? The New Networking Frontier Networking technologies are evolving with a sharper focus on security, automation, intelligence, and edge performance. The current key players in the “emerging” category include: AI/ML for Network Operations (AIOps): These tools are revolutionizing how networks are managed—predicting outages, optimizing performance, and automating fault detection with minimal human intervention. SD-WAN (Software-Defined Wide Area Networking): Essential for deliv...

Cybersecurity: A Functional and Disciplinary Perspective

In today’s highly interconnected digital ecosystem, the term cybersecurity is often used as an umbrella concept. However, within this umbrella exist specialized domains like network security, cloud security, application security, and information security—each with distinct focus areas, stakeholders, and technical scopes. Understanding these differences is crucial for defining the roles and responsibilities of professionals across fields such as networking and computer science.   Especially in education and professional training, having a clear perspective and well-defined objectives is as critical as selecting the right seed for the right soil. This principle is particularly relevant in the domain of cybersecurity education for network engineers. To ensure meaningful and effective skill development, training programs should be designed to build upon the foundational strengths of network engineering, rather than forcing practitioners into direct competition with professionals from ...

AI-Powered Networks in a Post-Smartphone World

 Imagine placing a call just by thinking about the person. No phone. No screen. Just your thoughts, translated into action by a chip implanted in your brain. This isn’t science fiction anymore—it’s the future that leading tech visionaries are preparing for. And at the core of this transformation lies a deeper revolution not just in how we communicate, but in how networks operate. From Smartphones to Mind-phones: The BCI Leap Brain-Computer Interfaces (BCIs) are poised to replace our reliance on handheld devices. With Neuralink’s recent successful human implant, the idea of sending texts, controlling devices, or even making calls through thought alone has moved from theoretical to tangible. But the progress isn’t driven by industry alone. At MIT, researchers at the Media Lab have built a non-invasive neural interface called AlterEgo—a wearable device that translates internal speech (the words you say in your mind) into digital commands. Elsewhere in MIT’s Computer Science an...

Endure and Evolve: Thriving Where Others Quit

  You don’t lose people when they quit—you lose them when they check out. In his post on LinkedIn, Dan Mian writes that people don’t just hand in a resignation out of nowhere; they’ve often been emotionally disengaged for weeks, months, or even years. He highlights reasons such as their ideas being ignored, their achievements going unrecognized, unsustainable workloads, and no longer feeling valued or seen. He encourages employers to build a workplace worth staying in by paying fairly, recognizing effort, creating growth opportunities, respecting work-life balance, training empathetic leaders, prioritizing inclusion, and fostering trust and psychological safety. I’d like to offer a few additional perspectives. Sometimes, even in workplaces that use structured performance feedback systems, strong performance can be overlooked or dismissed due to untimely, irrelevant, or unfair criticism—such as labeling evaluators as “too generous.” Genuine contributions may be undermined by tox...