Contact

Archives

Corrego do Feijao near Brumadinho Dam Failure

Our hearts are saddened to comment on the trajedy around Corrego do Feijao near Brumadinho Dam Failure. (Image: Portal R7.com | Twitter.) At this time we only have fragmentary data from the media. Thus we will focus on “peripheral” but very important concepts that seem to get lost in the aftermath of each new tragedy. These concepts emerged in the paper entitled A systemic look at tailings dams failure process, presented at Tailings and Mine Waste 2016, Keystone, Colorado, USA, October 2-5,…

Read More

One of the Best Online Business Analyst Courses uses Riskope definitions.

We are happy to see One of the Best Online Business Analyst Courses uses Riskope definitions. The course entitled Three Emerging Careers for Business Analysts from udemy teaches to define strategic, tactical and operational business planning techniques, audiences, and results. One of the Best Online Business Analyst Courses uses Riskope definitions. The course by Tom and Angela Hathaway ranks among the seven best business analyst courses following Webcourse World. Business analysis aims to define a future that will allow an organization to achieve…

Read More

Improving Sustainability through Reasonable Risk and Crisis Management

Improving Sustainability through Reasonable Risk and Crisis Management is the title of our 2007 book. The book has sold through our website in 34 countries to individuals and CxOs eager to get a look into quantitative and rational risk management. Today, one can easily state that sustainability is a big topic in the Western chemical and mining, oil & gas industries. Companies want to be sustainability leaders although in some cases their claim sound more like PR campaigns. A recent…

Read More

Information systems and risk management

Information systems and risk management discusses the necessity to create a structured and holistic view on all corporate information. Therefore we look at and how the holistic view should relate to upside and downside risks. Information systems are the set of analytical applications geared toward preparing corporate or project system’s data for business analyses and support to risk informed decision making. Downside risk is the product of the probability of occurrence of a hazard by the cost of the undesirable…

Read More

Cryptominers exploit miners vulnerabilities

Miners are under a new attack as Cryptominers exploit miners vulnerabilities. Programs that hijack computer resources to mine cryptocurrencies without permission are indeed a new threat in the list. In summary, the “old list” for miners reportedly encompassed for example: Ransomware, which holds a company’s data hostage until a ransom is paid. data leaks. worms that could break down equipement “a la” stuxnet focussing on the SCADA system. However, the real-life general list is way longer, as witnessed by a…

Read More

Archive

Vancouver Digital Creative Agency Ballistic Arts Media Studios.