Friday, May 8, 2026

Enterprise Resource Planning (ERP) = Business Software

Enterprises (aka large businesses) use software to run their business. This software is called "Enterprise Resource Planning", or ERP. Sounds fancier than "business software", no? So what is ERP, and how does it work? Let's create an imaginary company "ACME" that designs, manufactures, and sells its AeroGadget.



ACME, an Apple Wannabe 

ACME wants to be the next Apple. So like Apple, it wants to control the entire life cycle of its products. From design to manufacturing to marketing to sales. Meaning ACME owns the entire lifecycle of AeroGadget. ACME will 1) Design 2) Procure 3) Supply Chain Management 4) Manufacture 5) Market 6) Sell 7) Service to keep customers happy. 






ERP used in ACME 

The creation of the mechanical AeroWidget—a complex assembly of brass gears, engraved plates, and precision-tuned springs—requires more than just skilled craftsmanship. For ACME to successfully bring this gadget to market, it must employ a comprehensive Enterprise Resource Planning (ERP) system that unifies every department, from the workshop floor to the executive back office.



Engineering, Manufacturing, and Quality Control

The "soul" of the AeroWidget lies in its mechanical intricacy. The ERP system serves as the central nervous system for these physical processes:


Design & PLM: Product Lifecycle Management (PLM) modules manage the technical blueprints and gear-ratio schematics, ensuring that every design iteration is tracked.


BOM & Procurement: The system automates the Bill of Materials (BOM), coordinating the sourcing of raw brass, wood, and specialized gears from global suppliers.


Manufacturing & Quality: As units move through production, the ERP tracks real-time assembly progress and triggers "Engraving Tests" to ensure the high-fidelity aesthetic of the gadget meets ACME's standards.


Marketing, Sales, and Logistics

Turning a masterpiece into a product requires seamless market integration:


CRM & Sales: Customer Relationship Management (CRM) tools allow ACME to target collectors of luxury mechanical goods while managing incoming orders to prevent over-promising on stock.


Warehouse & Shipping: The ERP manages the delicate inventory and optimizes "Track & Trace" logistics, ensuring that the fragile glass-and-brass units are delivered safely via specialized transport.


The Back-Office Foundation: HR, Finance, and Accounting

While the gears turn in the widget, the ERP ensures the business gears turn behind the scenes:


Human Resource Management: The "Talent Pipeline" and "Workforce Management" modules ensure that ACME recruits and retains the specialized master horologists and engineers required for such a unique product.


Finance & Accounting: These modules provide "Capital Management" and "Ledger Control," balancing the high cost of raw materials against revenue. This ensures that every brass screw is accounted for in the company’s financial plans.


Service & Analytics: Finally, the system manages "Calibration Schedules" for field service and uses cross-functional data analytics to refine future production runs based on customer feedback.


Conclusion:

ERP is business software used by enterprises to run their business. ERP encompasses all business software - such as design, planning, supply chain, marketing, sales, human resource, finance, accounting.  By integrating these disparate functions into a single "ERP Flow," ACME can transform a complex mechanical challenge into a sustainable, scalable, and highly efficient luxury brand.

Tuesday, May 5, 2026

Why Do We Need SASE In Modern IT?

 Secure Access Service Edge (SASE)


  • Before I begin, let’s start with the basic definitions. Zero Trust is a concept of never trusting anyone, always verify, even if they are in the house. SASE is architecture. So all devices that need to access the corporate network will go to the cloud first to have the user verified. SD-WAN is an implementation of SD-WAN.

  • Ok on to SASE Secure Access Service Edge!




  • SASE in a nutshell : SASE is short for Secure Access Service Edge. In the olden days, to secure access to a company network, you had to go into the office to connect to the company network. But modern digital life means you can be anywhere, using any device, at any time. So a new, safe environment that is beyond the office walls is needed. Introducing SASE. With SASE, the office network reach is now global. The security guard now follows the worker - instead of the workers going to the office guarded by a security guard.







Sunday, May 3, 2026

Amazon One Palm Reader Discontinued In Amazon Grocery Stores (Whole Foods) Starting June 2026


Amazon One is a contactless, palm-based biometric identity service. It announced in September 29, 2020 in this news release as being  available in Amazon Go mini-market stores. Later on March 28th, 2024 with this news release. Amazon One palm reader payment is used at Whole Foods grocery markets (owned by Amazon). During check out, a shopper just puts their palm on a palm reader to pay. No app. No card. No cash.

Roughly over just 2 years later, Amazon announced earlier in 2026 that Amazon One biometric authentication will be fully discontinued for retail customers on June 3, 2026. It’s officially the end of an era for the "palm wave" at checkout.   The decision to pull the plug on the technology—which uses a combination of surface-area imaging and subcutaneous vein patterns—comes down to a few key factors:




1. The "Adoption Gap"

Despite the initial hype, Amazon reported that customer adoption simply never reached the critical mass needed to justify the overhead. Most shoppers remained more comfortable with the muscle memory of tapping a credit card or using a digital wallet (Apple/Google Pay), which offered similar speed without the perceived "creep factor" of biometric scanning.  


2. Privacy and Trust Hurdles

Biometrics are a tough sell in the current privacy climate. While Amazon emphasized that the data was encrypted and stored in a specialized "One" cloud rather than on-device, privacy advocates and even some members of Congress voiced concerns about surveillance and data security. For many users, the convenience wasn't worth the perceived risk of handing over a "palm signature" to a retail giant.  


3. A Massive Retail Pivot

The discontinuation of Amazon One is part of a much larger strategic retreat. Amazon is simultaneously shuttering its Amazon Fresh and Amazon Go physical locations to refocus its grocery efforts on Whole Foods Market and same-day delivery. Since those experimental stores were the primary "homes" for palm readers, the infrastructure no longer fit the new business model.  


4. High Operational Costs

Maintaining the hardware and the complex backend (which required real-time cloud authentication and seamless integration with various payment processors) is expensive. Without the volume of users to offset these costs, the ROI wasn't there—especially compared to standard NFC payments.  


What Happens Now?

Data Deletion: Amazon has stated that all user data, including palm signatures and associated payment info, will be automatically deleted once the service is fully decommissioned in June.  


The Healthcare Exception: Interestingly, the technology isn't dying everywhere. It will reportedly remain active for patient check-ins at specific healthcare facilities (like NYU Langone) for the time being, where the "identity verification" use case still holds some value.  


Alternative Tech: Amazon is shifting its focus to Dash Carts (the smart shopping carts that track items as you go) and its broader Just Walk Out licensing for third-party venues like stadiums.


It seems the world wasn't quite ready to pay with a high-five. Given the current trend toward Zero Trust and enhanced data sovereignty, a centralized biometric database for snacks was always going to be a steep hill to climb.


Are you looking for a more secure alternative for your own workflows, or were you mostly concerned about the data privacy aspect of the shutdown?

Thursday, April 23, 2026

Introduction to Microsoft Defender XDR

Windows Defender was originally a basic built-in antivirus that protected endpoints (namely PCs) running the Windows operating system. As endpoint attack vectors became more sophisticated, antivirus passively protecting an endpoint no longer sufficed. A holistic protection - including identities, emails, and infrastructure - was needed. This was when Windows Defender was rebranded to  Microsoft Defender.

 




Fast forward to today, Microsoft Defender is now the overarching brand that covers a series of related products that provide integrated threat protection across the entire digital estate, including endpoints, identities, email, applications, and multi-cloud infrastructure. Here are the products under the Microsoft Defender brand:


  • Microsoft Defender XDR: This is the unified dashboard/suite that includes:
    • Microsoft Defender for Endpoint 
    • Microsoft Defender for Office 365
    • Microsoft Defender for Identity
    • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Cloud
  • Microsoft Defender Vulnerability Management
  • Microsoft Defender for IoT




What Is Microsoft Defender XDR

Microsoft Defender XDR (Extended Detection and Response) is an integrated suite of four security products, each providing a unique and needed defense against sophisticated attacks. Powered by AI, Microsoft Defender XDR  provides an always learning, adapting, and automated unified defense across your digital estate. The four included products in XDR are:


  • Microsoft Defender for Endpoint: Protects physical devices (Windows, macOS, Linux, Android, iOS). It provides both preventative antivirus and EDR (Endpoint Detection and Response) for hunting advanced persistent threats. 
  • Microsoft Defender for Identity: Uses your on-premises Active Directory or Entra ID (formerly Azure AD) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions.
  • Microsoft Defender for Office 365: Safeguards your "collaboration" layer—protecting against malicious links (Safe Links) and attachments (Safe Attachments) in Outlook, Teams, SharePoint, and OneDrive.
  • Microsoft Defender for Cloud Apps: A Cloud Access Security Broker (CASB) that gives you visibility into your SaaS apps, helping to identify "Shadow IT" and protect sensitive data moving in and out of the cloud.



What Makes Microsoft Defender XDR Unique?

Microsoft Defender differentiates itself by moving beyond simple signature-based detection to behavioral AI and automation.

  • AI : Uses machine learning and cloud-delivered intelligence to block malware in real-time, even if the threat has never been seen before (Zero-day).
  • Attack Surface Reduction (ASR): A set of controls that prevent actions typically used by malware, such as launching executable files from email or blocking Office apps from creating child processes.
  • Self-Healing (AIR): Short for Automated Investigation and Response. When an alert is triggered, Defender can automatically launch an investigation, determine if a file is malicious, and remediate it (e.g., quarantine a file or stop a process) without human intervention.
  • Advanced Hunting: For security pros, this provides a powerful query language (Kusto Query Language or KQL) to search through 30 days of raw telemetry data to find hidden indicators of compromise.
  • The "Agentless" Advantage: Because the sensors for Defender are built directly into the Windows operating system, there is no third-party agent to install or update. This reduces "agent sprawl," lowers CPU overhead, and prevents the common "security vs. performance" conflict.


Conclusion

Microsoft Defender XDR represents a paradigm shift from traditional, siloed security to a unified, AI-native ecosystem.  Unlike third-party solutions, it requires no additional software installation, which eliminates compatibility issues and ensures peak system performance by minimizing CPU overhead  By integrating defense across endpoints, identities, email, and cloud apps, Microsoft Defender XDR seamlessly correlates telemetry across endpoints, identities, and cloud applications to eliminate the silos that attackers exploit.