10 x price increase in six months – Broken Supply Chain
Business spiral of death We have seen it all – after many experiments, countless hours and sleepless nights and setup hassles you find right combination...
Discover top trending posts from our blog.
Business spiral of death We have seen it all – after many experiments, countless hours and sleepless nights and setup hassles you find right combination...
After the generator, the second most important part of the power station is the tariff...
This comment is based on “Nassim Taleb” book “The Black Swan” which must read for...
Should critical infrastructure be running on the cloud? Definitely not! This isn’t even a black...
Handpicked posts by our editorial team.
Why Trust, Context, and Meaning Form the Cornerstone of Resilient Operations The flood in Abu Dhabi was a Black Swan...
Business spiral of death We have seen it all – after many experiments, countless hours and sleepless nights and setup hassles you find right combination of the software(s) which fulfils all contradictory requirements. The following report analyzes the trajectories of Docker and VMware through “Business Spiral of Death” framework. It…
After the generator, the second most important part of the power station is the tariff metering system, because it converts produced energy into money, allowing the plant to invoice and get paid. Once the turbine has burned the gas and the generator has produced electricity, everything that follows depends on…
This comment is based on “Nassim Taleb” book “The Black Swan” which must read for everyone working with data, statistics and digital twins. Creating information where is none Author of the book argues that one of the most useless comments he hears is that some solutions can come from “Robust…
Should critical infrastructure be running on the cloud? Definitely not! This isn’t even a black swan event. It’s just a fragile solution. We’ve seen it again: a single configuration change in a third-party provider took down 28% of global internet traffic. Not an attack, just a bug in a protection…
Two magic words that explain nothing—so let’s start with a simple thought experiment. Just imagine you are in a small boat on a river. If you stop paddling, where will it float? Obviously, it will follow the stream downhill, and in one direction only. Can we agree on that? Now…
It is modern to start an article with the statement that it was written by a human, so this one is written by myself on the Remarkable by my hand. Interestingly, it’s about AI without AI. Testing automation tool N8N, I had to enter an API key for ChatGPT, the…
Imagine this: you buy a car, and five years later the manufacturer sends you a letter saying, “We’ve changed the deal—if you want to keep the radio or turn the steering wheel, you now need to pay a yearly subscription.” Absurd? Yes. But that is exactly how many software “maintenance”…
“Agents are only as good as their context.” – Yashwanth Sai That sentence struck me because it applies far beyond AI agents. It is just as true in industrial operations. Why Context Matters Imagine a cow wandering on the moon, or a Tesla driving in circles around Earth. The data…
The modern state of cybersecurity in industrial environments is plagued by bureaucracy and compliance theater. The real frustration comes not from the complexity of technical solutions, but from an environment where the goal is not security, but simply satisfying auditors’ paperwork. This results in endless forms, checklists, and superficial patching,…
People keep saying today’s AI models will one day match human intelligence. All they need is more data, more compute, more time. That belief is absolutely wrong. These tools — language models, image generators, whatever — don’t understand anything. They guess. They stitch together sequences based on statistics. That’s it. No…