E-time with Palestine Red Crescent Society
E-time emphasizes universal human values, such as solidarity, compassion, and justice for the innocent civilians who are victims of the ongoing Israeli-Palestinian conflict.
In such a delicate historical moment, we have been struck by some data extracted from the Amnesty International investigations into the ongoing conflict, including:
- As of October 7, 2024, over 42,000 Palestinians have died, including over 13,300 children, and more than 97,000 have been injured;
- 1.1 million people have been evacuated;
- Approximately 625,000 students have lost an entire academic year.
To lend a hand, no matter how small, we have decided to support Friends of the Palestinian Red Crescent Society, a humanitarian organization that provides medical, health, and social assistance to the Palestinian population, both in the Palestinian territories and in neighboring countries.
The organization is part of the International Red Cross Movement, and its main purpose is to support the population through healthcare assistance, emergency interventions in the field, health promotion, and social support.
E-time ISO 27001 certified.
The certifications acquired by E-time
We are proud to announce that E-time has achieved the UNI CEI EN ISO/IEC 27001:2024 certification. This international standard establishes the requirements for an Information Security Management System (ISMS), ensuring a structured approach to data protection.
Below is a list of all certifications E-time has obtained under ISO/IEC 27001:
- Cert. no. 84671 UNI CEI EN ISO/IEC 27001:2024 – Information security, cybersecurity, and privacy protection – Information security management systems – Requirements.
- Cert. no. 84673 ISO/IEC 27018:2019 – Information technology — Security techniques — Code of practice for the protection of personally identifiable information (PII) in public clouds acting as PII processors.
- Cert. no. 84674 ISO/IEC 27017:2015 – Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services.
E-time has always prioritized data security and, over the years, we have implemented internal procedures to protect it. By obtaining this certification, we have chosen to implement these processes in compliance with the standards set by ISO 27001, validated by an authorized third-party body.
What Changes After Obtaining Certification
Achieving this certification has several implications and entails specific operational responsibilities for the company, including:
- Risk identification and management: the organization must mitigate risks related to information security, preventing and monitoring them continuously.
- Implementation of an Information Security Management System: Introducing a set of procedures and controls to ensure the protection of confidentiality, integrity, and availability of information.
- Compliance with legal and regulatory requirements: Adhering to information security provisions and current regulations, primarily GDPR.
- Implementation of the PDCA (Plan-Do-Check-Act) cycle: ensuring continuous improvement of the ISMS, which involves periodic internal audits, management reviews, and updates to controls.
What This Means for Our Clients
Achieving certification guarantees the validity of ongoing processes for information security and data protection, reducing the likelihood of incidents related to data breaches or cyberattacks.
By reaching this milestone, E-time reinforces its tangible commitment to maintaining the highest standards of information security.
The certifications can be fully reviewed at this link.
Chatbot & AI: a new Partnership between E-Time and Botpress Is Born
We are pleased to announce the launch of a new strategic collaboration with Botpress one of the most advanced platforms for creating and managing chatbots on the market.
The partnership between E-Time and Botpress will lead to the integration of Botpress into our services (integration with Rexpondo is already available), allowing us to leverage the potential of artificial intelligence (AI) and natural language processing (NLP).
Botpress integrates AI into its chatbots through an advanced modular architecture that enables the use of NLP and machine learning to create smarter and more personalized interactions.
The partnership between E-Time and Botpress combines E-Time’s technological know-how with the capabilities of an innovative and constantly evolving platform.
This growth-oriented collaboration has the shared goal of providing companies with advanced tools to enhance user experience, automate customer service, and optimize internal processes.
E-time with Rete Dafne against every form of violence
It’s time to reveal our second “Useful Gift” for Christmas 2023.
The events of the last months of 2023 have received significant media attention, bringing the issue of gender-based violence back into the spotlight, which remains a real scourge in Italy and beyond.
Therefore, we have chosen to make our small contribution to Rete Dafne, which daily provides support and assistance to victims of gender-based violence, and not only because the work of Rete Dafne concerns all victims of any type of crime.
For further information about the valuable work carried out by this association, we refer you to their website: retedafne.it
E-time is participating in the Plastic Pull project.
This Christmas, we have focused on two themes that are very important to us, and one of them is the Environment.
E-Time has contributed to collecting 37 kg of waste abandoned on beaches, in parks, and on streets, requalifying degraded ecosystems in Italy located in areas where local administrations do not intervene. All of this has been made possible thanks to the Plastic Pull project by Piantando.
The project
Plastic Pull is one of Piantando’s social and environmental impact projects, with the goal of recovering tons of scattered waste throughout Italy, leveraging its network of associations and initiatives.
After identifying the areas of degradation to intervene, Piantando coordinates the intervention with field contacts. Each collected bag is certified, including photographs, location and date of collection, weight, disposal method, and the operational team.
Who is Piantando
Piantando is a Benefit company that initiates social and environmental impact projects worldwide by collaborating with companies of all sectors and sizes. The central focus of Piantando’s work is transparency and sustainability, which characterize each project and ensure its proper development.
Below is the link where you can find more information about the project supported by E-time and our contribution: E-time X Plastic Pull
IT Asset Management – the benefits of having your company’s assets under control
Efficiency and savings. This could be in extreme summary the answer to the question “What are the benefits of IT Asset Management?”, but let’s try to go by points.
Why we talk about IT Asset Management
IT asset management (ITAM) is the set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. Assets include all elements of software and hardware that are found in the business environment. (def. https://en.wikipedia.org/wiki/IT_asset_management)
With IT Asset Management we indicate all the activities aimed at a correct mapping and management of IT assets (both software and hardware), integrating the different solutions between the various departments with a single macro objective, that of creating value for the company.
Most companies perceive the need to renew technologically and “invest in IT”, but perhaps it is not yet perfectly clear how and perhaps not even why.
The enterprise market is still divided into two broad categories:
- Traditionalist: it’s always been done this way; it’s always worked; now that so many are changing to follow the trend, it frees up space and I’ll be even better off.
- Innovative: the market will always evolve and the only way to compete is to (r)innovate.
Ignoring, or worse, hindering innovation, is like ignoring life.
The world is inexorably accelerating toward valuing ideas.
3D printers, which were in the science fiction dreams of the children of the last century, are now an evolving reality. Always new ideas that require a Time To Market as close to the immediate as possible. The only way to shorten the Time To Market is to use technology, IT.
After the birth of the first portable phones, a phone that could be a computer, a camera, a radio, a TV, etc…, arrived on the market even before the masses could even imagine it. This is an effective Time To Market! We believe that this acceleration will continue and therefore believe in the need to ensure that the IT of all companies is not only adequate and performing, but that it is considered an integral part of the company’s business lines on a par with people; that is, that it is considered on a par with human capabilities.
Man-machine interaction is no longer even to be considered an “innovation”, but a fact.
Why should a manager be entitled to demand the best from his human staff without paying attention to IT resources?
Why are people assigned goals, while IT is asked what it can do to help achieve a goal?
And so why should a company be concerned about getting the most out of each of its Human Resources by seeking them out carefully, putting them in the best possible working conditions, incentivizing them, creating teams that know how to integrate in the best way, etc… and should not give the same attention to IT resources?
The answer is that perhaps you are still trying to put the famous “man with a red flag” in front of man/machine iteration innovation.
IT Asset Management, or rather, IT Governance more generally, shifts the role of IT from “IT Resource” to “Business Resource.” And as a business resource, like a human, it must be managed, valued and evaluated. If, for example, I am willing to spend a total of € for a designer, it is because I have had the opportunity to evaluate his work, through interviews, verification of the projects done, and whatever else, that his work will help to bring “adequate revenues” to the company.
IT Asset Management is the tool that allows me to understand what resources (IT) I need, how my resources (IT) work, how much my resources (IT) really cost, what criticalities/problems my resources (IT) have and whether they give the business the expected contribution in order to bring “adequate revenues”.
It is not uncommon, for example, for companies to set “standards” for IT purchases and for these to be defined by the average technology level in the market.
With adequate information, one could instead, for example, find that such a critical business line is served by certain IT assets for which we could consciously aim for TOP level purchases, while for other less critical business functions, aim for adequate levels saving money and satisfying my critical business much more.
The absence of these procedures sometimes leads to misguided investments that trigger vicious cycles that end up relegating IT to the sad role of “necessary cost” instead of “business investment”. Like human resources, IT investments must be carefully evaluated, measured and examined for the value they provide in terms of ROI.
From these observations, it is easy to see why all companies should incorporate an IT management strategy with a long-term view into their structure in order to strengthen competitiveness in response to market needs.
Who is in charge of it?
Continuing the parallelism between the contribution of HR and IT to the business, as there is an HR Manager who reports directly to top management, the ideal, as many companies have already done, is the establishment of the figure of the Asset Manager. A figure capable of identifying and implementing the strategies necessary to reconcile the needs of the business with those of the IT resources available.
Where this figure is still absent, the IT manager is the most suitable figure to fill the role, provided that he knows how to “raise his head and see the business” with which to work closely.
However, Asset Management should be of equal interest to senior management as other resources (HR) that contribute to the business. On the good health of the assets (HR and IT) depends the profitable administration and overall competitiveness of the whole company.
Benefits of IT Asset Management
As we’ve learned for decades now, a company made up of people who are capable, competent, know how to work as a team, and above all are motivated, brings great benefits. Likewise, an IT:
- capable (match needs/machines);
- competent (analysis of market availability/custom development);
- who works in a “team” (…interconnected to the business);
- motivated (…business objective defined for each IT process) also brings great benefits.
A sound and effective IT Asset Management system consistent with business objectives promises:
- Risk reduction (criticality control and proper calibration of systems).
- Reduction of costs (more efficient management of IT resources through proper management of maintenance or replacement of assets).
- Improved IT performance (load control, mapping of critical paths, etc.).
- Intervention traceability (knowledge of the interrelationships between assets allows the identification of the “criticality” of each planned/proposed intervention and to plan it correctly and without unexpected risks).
- Performance traceability (the effectiveness of the systems is verified as the business grows and possible evolutions are planned)
The addon that solves problems with OAuth2 protocol
The addon that solves problems with the OAuth2 protocol
Although there are no definite terms yet, Google and Microsoft will end the support for authentication through username and password for IMAP and POP3 services, making it mandatory to switch to the OAuth 2.0 protocol.
In order to adapt your ((OTRS)) Community edition installation to the new protocol, our Rexpondo team has implemented the REXOAuth2 plugin.
More information about the plugin is available on our website rexpondo.com
What is OAuth2
OAuth 2 is the second version of the OAuth framework, an authorization protocol that allows applications to gain limited access to user accounts on an HTTP service
It works by delegating user authentication to the service hosting the user account and authorizing third-party applications to access the user account. OAuth 2.0 provides authorization streams for web and desktop applications and mobile devices.