What is evidence-based management approach?

I haven’t seen “evidence based” term be used in management until recently.  Before, I thought it was mainly used for field of medicine or criminology.  According to the article “Evidence based approach” by Jeffrey Pfeffer, Dr. David Sackett defines evidence based approach as “the conscientious, explicit and judicious use of…

Data & Analytics Global Executive Study

I’ve just finished reading an article “Analytics as a Source of Business Innovation” by Sam Ransbotham and David Kiron from MIT Sloan Review.  It’s basically an article that says we are able to progressively access large pools of data and use analytics to inform decision making, improve day-to-day operations, and support the…

Implementing encryption protocols

WEP, which stands for wireless encryption protocol, provides encrypted communication between wireless clients and access points.  WEP uses key encryption algorithm to encrypt messages between devices.  Each client and access point on the wireless LAN must use the same encryption key.  The key has to be and is manually configured on each access…

Problem statement and its importance

I just read “The Most Underrated Skill in Management” written BY NELSON P. REPENNING, DON KIEFFER, and TODD ASTOR.  The article written by these MIT professors discuss how neglecting to formulate a clear problem statement often prevents innovation and leads to wasted time and money.  I believe that reading this article may improve your…

Types of asymmetric encryption algorithms

On my last post, I’ve talked about the types of symmetric encryption algorithms.  Today, I’ll be covering different types of asymmetric encryption algorithms. RSA is one of the most popular asymmetric public key algorithms because it was technically the first of its kind.  It stands for the names for those…