SEARCH RESULTS

30 results found

Services (4)

  • Risk Awareness Workshop

    Learn to identify the residual risk of a project or the company as a part of planning the project or service​ We learn the basics of risk management: SWOT, PESTLE, DPIA and ISO31000 through pragmatic stories in groups​ Attendees can be project managers, quality managers or data protection managers that need risk awareness in their daily working​. End result of this workshop is risk oriented thinking, counting the residual risk and materials of the course: attendees will get the risk management toolbox used in the workshop (as long as the elements aren't behind a license)​ Workshop is suitable for HR, communications, risk managers (finance), directors, project managers and service managers​.

View All

Events (3)

View All

Blog Posts (8)

  • Meet our new Data Economy Advisor Jarkko Moilanen Ph.D

    Jarkko defended his doctoral dissertation on 3D printing focused Peer Production: Revolution in design, development and manufacturing, and the related dissertation is one of the few works describing the 3D printing ecosystem. The dissertation consists of articles, all of which have been co-written with other researchers. Jarkko's way of working as a writer is to collaborate with others instead of writing everything himself. In October 2017, Jarkko got the idea to write an API Economics book and came up with the name "API Economy 101". The title reflects the purpose of the book, which is to provide a basic package of API economics information to people in charge of business, rather than addressing the issue from a technology perspective. Jarkko invited 3 other experts in the field he knew to participate in the writing process. The book was published under an ideological name in August 2018 by Alma Talent. The book was translated into 2019 in English as "API Economy 101". In the autumn of 2018, Jarkko began working on a new book in English on "Build for Developers - Application Developers as Customers in API Economy". Jarkko also invited other experts in the field to this work, but this time in the role of advisors. The invitees mainly represent application developers, i.e. typical API economy customers and interface consumers. As the writing work progressed slowly, Jarkko decided to try a new approach from July 2019 onwards. He started writing one developer-related writing a day for his own writing series called 100 Days DX. The last summary article in the series was completed on November 6, 2019. Editing the material for the book is in progress. At the same time as 100 Days DX was completed, Jarkko began the video production developer experience of business significance. Doctor of Developer eXperience includes approximately 10-15 minutes of informative videos, often based on scientific articles. In November 2019 Jarkko started to develop Data Product Toolkit, which is a set of canvases to design data products which are the building blocks of the data economy. Data productizement process and tools are part of the research aimed at Jarkko's second dissertation.

  • Do you already have Identity Governance in place?

    Everyone in IT knows an acronym called IAM, Identity and Access Management which means, how the company process is designed for proofing that you are who you claim to be and then, giving you permission to access something. IAM process is very technical. However, the landscape has changed since the cloud services came part of the picture. The simple IAM process is just not enough to manage every identity for companies. Therefore designing Identity Governance will structure and help you to understand, what identities your organisation currently has and how they should be protected. It is like an umbrella with standardised procedures that are easier to budget for the new solution implementation. FIDO 2 brings a great technology neutral way to secure your cloud accounts and identities and you have also possibility to use it in your internal identity process as well. When considering phishing, it can also precent your cloud accounts being impersonated. When it comes to accesses the Governance is important, because seldom we work with one provider only. When you have cross cloud solution, where for instance your CRM is running in different cloud than your other services, you have more options to select technology neutral best fit solution for your organisation. Your organisation have also customers and external consultants, who are working with your provided tools. That is why it is very important to have standardised way to process each request and automated some of the process parts, so that the onboarding process after vetting is shorter. Each identity and access should be reviewed every now and then. Therefore it is good to design lifecycle what and when will happen. Lifecycle management can be easy for newer systems that already supports time-based lifecycles. Time-based lifecycle helps your organisation to manage situations when the access is not removed by your sub-contractor, even the employee has left, leaving your organisation into a not that nice situation as the identity and accesses are still open. This also helps your organisation to manage the accounts, that are there, but you don't know why and for what they are used for. In case you wish to know more about the Identity Governance, please do not hesitate to contact! info@techiestories.com (we do have spam and safe links in use in more sophisticated level, than filtering, so our post is going thru a separate sandbox check, before reaching our email .

  • Techie Stories service updates!

    Due to many years in tech, there was no reason to only bind our capabilities to one technology and a cloud provider only. In the current market we are more and more going towards cross cloud services. Hence, in our design services we will look into different options in order to find best fit solution for your business! We are also adding more partners to our solution portfolio in the future.

View All

Pages (15)

  • Services | Techie Stories

    Meet Jukka-Pekka Joensuu, Senior Executive Adviser and Chairman at Techie Stories, Launch! event Play Video Meet Techies! at Techie Stories Launch! and how the company was built! Play Video Meet Jarkko Moilanen Ph.D. Techie Stories Data Economy Adviser at Launch! event! Play Video Meet Marjukka Niinioja, Techie Stories Business Adviser and Founder of Osaango at Launch! Play Video Presenting Softability XR partner at Techie Stories Ltd. Launch 2021 event! Play Video Presenting Hypertrace Observability at Techie Stories Ltd. February 1st Launch 2021 Play Video Presenting Traceable new era of Security at Techie Stories Launch! Play Video Techie Stories Ltd. Vortex! Trailer Play Video Launch! Watch Now Meet Techies! at Techie Stories Launch! and how the company was built! Play Video Share Whole Channel This Video Facebook Twitter Pinterest Tumblr Copy Link Link Copied Share Channel Info Close

  • Courses | Techie Stories

    Added value in our courses is our special tailoring into company needs, we deliver courses hands-on with business aspects and add a little bit of fun using gamification. Full Stack Cloud Security How to become the best in cloud security? Did you know that the better you understand cloud security, the better experience you can also provide for your end-users? When your specialists understand the full stack of cloud security services including hybrid environments, they know how to build your company a solid foundation for your services! ​ What does your company gain by ordering the course? - You will learn to identify risks and causality - How the security cost structure is formed in the cloud - How to manage security costs - Which cloud service would be suitable among several and how the evaluation is done - Configure security and protection - How to hunt in the bit jungle - How the organization's ability can be tested and staff automatically directed to appropriate training ​ Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The number of signs depends on the extent of the topics covered. Ask for quota Full Stack Cloud Power How to become the best Cloud Service, Cloud Compliance, or a Cloud Bid or Business manager? Did you know that the better you understand cloud possibilities, the better experience you can also provide for your end-users? ​ When you understand the full stack of cloud services from a business perspective including hybrid environments, you know how to manage services in Cloud! ​ What does your company gain by ordering the course? - You will learn to identify risks and causality - Cloud TCO - Service Levels - GDPR and other compliance in the cloud - Calculating the costs - Benefits and pitfalls - Vendor Exit ​ Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The number of flashes depends on the extent of the topics covered. Ask for quota Full Stack Cloud Buyer How to become the best buyer of cloud services Did you know that all the successful cloud implementations start from successful buy? Each failed project is a failure already when the contract has been signed. In this course, you will learn the vital skills that the buyer needs to have before buying the cloud or outsource the services. The knowledge also will help your organization to reduce the costs of operations. ​ What does your company gain, for example? - The buyer learns to identify the risks and the causality - Costs structures ane TCO in the cloud - How cloud implementation can affect the current state - How to reduce implementation risks - What cloud services is worth outsourcing and what is not - Regulations and ensuring compliance - What the buyer needs to know about organizational cloud feasibility - How to evaluate the supplier's ability Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The amount of euros on the shield depends on the extent of the topics covered. Ask for quota Cryptocurrency investigator How to tackle the risks in cryptocurrency world? Did you know that cryptocurrency transaction flows can be easily traced and identified using artificial intelligence? Join our course to learn what, for example, your company CISO can do in concrete! Hands-on! What does your company gain, for example? - You will learn to identify the risks and causality - You will learn to identify the risks associated with money laundering (We e.g. investigate the WannaCry chain in the course) - You will learn how transaction flows are formed - You will learn to trace the complete flow of the transactions between addresses that linked to the real world - You will learn to trace and monitor the flows through many nodes automatically - You will learn to build an authority research package quickly Participants will receive a LinkedIn shareable badge with the learned skills and a certificate of completion from us. The amount of bitcoins on the badge shield depends on the extent of the topics covered. Ask for quota

  • Privacy Policy | Techie Stories

    Privacy Policy This Privacy Policy governs the manner in which Techie Stories collects, uses, maintains, and discloses information collected from users (each, a "User") of the website ("Site"). This privacy policy applies to the Site and all products and services offered by Techie Stories. https://www.techiestories.com Personal identification information ​ We may collect personal identification information from Users in a variety of ways, including, but not limited to, when Users visit our site, register on the site place an order fill out a form response to a survey subscribe to the newsletter and in connection with other activities, services, features or resources we make available on our Site. Users may be asked for, as appropriate, name, email address, phone number, Users may, however, visit our Site anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities. ​ Non-personal identification information ​ We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Sites, such as the operating system and the Internet service providers utilized and other similar information. ​ Web browser cookies ​ Our Site may use "cookies" to enhance User experience. User's web browser places cookies on their hard drive for record-keeping purposes and sometimes to track information about them. Users may choose to set their web browser to refuse cookies or to alert you when cookies are being sent. If they do so, note that some parts of the Site may not function properly. You can change your consent anytime based on categories from the cookie settings located in the lower-left corner cookie icon and also see what cookies are delivered and in which category. ​ ​ How we use collected information ​ Techie Stories collects and uses Users personal information for the following purposes: To improve customer service Your information helps us to more effectively respond to your customer service requests and support needs. To personalize user experience We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Site. To improve our Site We continually strive to improve our website offerings based on the information and feedback we receive from you. To process transactions We may use the information Users provide about themselves when placing an order only to provide service to that order. We do not share this information with outside parties except to the extent necessary to provide the service. To send periodic emails The email address Users provide for order processing, will only be used to send them information and updates pertaining to their order. It may also be used to respond to their inquiries, and/or other requests or questions. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or the User may contact us via our Site. ​ ​ How we protect your information ​ We adopt appropriate data collection, storage, and processing practices and security measures to protect against unauthorized access, alteration, disclosure, or destruction of your personal information, username, password, transaction information, and data stored on our Site. Sensitive and private data exchange between the Site and its Users happens over an SSL secured communication channel and is encrypted and protected with digital signatures. Our Site is also in compliance with PCI vulnerability standards in order to create as secure of an environment as possible for Users. ​ Third-party websites ​ Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors, and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites that have a link to our Site, are subject to that website\'s own terms and policies. ​ Compliance with children\'s online privacy protection act ​ Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our Site from those we actually know are under 13, and no part of our website is structured to attract anyone under 13. Changes to this privacy policy ​ Techie Stories has the discretion to update this privacy policy at any time. When we do, revise the updated date at the bottom of this page, send you an email. We encourage Users to frequently check this page for any changes to stay informed about how we are helping to protect the personal information we collect. You acknowledge and agree that it is your responsibility to review this privacy policy periodically and become aware of modifications. Your acceptance of these terms ​ By using this Site, you signify your acceptance of this policy and terms of service. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes. ​ Contacting us ​ If you have any questions about this Privacy Policy, the practices of this site, or your dealings with this site, please contact us at: Techie Stories https://www.techiestories.com DPO (at) techiestories.com

View All

© 2021 Techie Stories Ltd. - ALL RIGHTS RESERVED

  • RSS
  • LinkedIn
  • Facebook
  • Twitter
  • YouTube