Skip to the main content.
FAI Login
FAI Login

Ayyeka Blog

Read the latest and greatest from Ayyeka

2 min read

Without Data, You're Just a Person with an Opinion

Digitalization of data is a process involving several steps. Executives who want to achieve the maximum benefit from their data collection processes need to learn, embrace, and implement digitalization in all its stages. (Part 1--Data Creation)

...
Read More

1 min read

Why Should I Care About Digitalization of Infrastructure?

Hard infrastructure is a fundamental component in the delivery of public services, and it is in the process of a digital revolution.

It's hard enough to say the word digitalization, and some may find it complicated to understand, but it is an essential...

Read More

2 min read

Edge vs Cloud Computing: What Are the Differences?

Modern development requires running advanced calculations and processing large amounts of data. But because of the amount of resources this requires, these processes cannot be run on local servers. Instead, they often run either in the cloud or on...

Read More

1 min read

$1.2 Trillion Earmarked For US Infrastructure: Digitization Overlooked

While populist slogans chant to "Build Back Better," infrastructure professionals wonder if bigger is necessarily better. The IIJA pays scant attention to digitization of infrastructure, the administration of artificial intelligence, and the tremendous...

Read More

3 min read

Twenty Years Since 9/11: Al Qaeda is Hiding in Your Computer Files

From physical security to digital security, our world has undergone a total digital transformation in the two decades since September 11, 2001, forcing us to redefine what resilience means for critical infrastructure. No longer just an equation of how...

Read More

3 min read

Blocking Monkey-in-the-Middle Hacker Cyber Attacks - Part 2

Cyber attacks on water, energy, and other critical utilities are on the rise. With the rising trend of embedding digital solutions across the utility assets and so many moving parts needed to manage utilities effectively, hackers easily find...

Read More

2 min read

Cyber attacks on Critical Infrastructure: No Surprise There - Part 1

Utilities have been vulnerable for years. The only surprise is how long it took hackers to discover its lucrative value.

The Colonial Pipeline cyber attacks on critical infrastructure revealed to the world just how vulnerable we are to hackers. One...

Read More