Knowledge Management …!!!

Knowledge Management

What is Knowlege Management?

It is the collection of methods relating to creating, sharing, using & managing the information & knowledge within an organization.

It refers to a multidisciplinary approach to achieving organisational objectives by making the best of knowledge.


Types of Knowlege Management

  1. Explicit Knowlege : Knowledge i.e eazy to write down & share
  2. Implicit Knowledge: Applied Knowledge
  3. Tacit Knowledge: Knowledge i.e. gained through personnal experience

Knowledge Management Process

  • Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
  • Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
  • Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.

Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.


If you want to more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

News coming from INDIA “No Ban on Crypto but will be regulated”

There are lot of buzz going around on the crypto market, here there is something that many crypto investors were waiting to hear & holding on to their breath.

The Indian panel court are NOT Banning Cryptocurrency, yes you heard it right there is “No Ban on Crypt” but it will be regulated by none other than the SEBI government body.

The Cryptocurrency and Regulation of Official Digital Currency Bill, 2021 brings regulation not ban, industry sources told the Indian Electronic Media.

These are the following 10 points which are the “The Big Story”:

It was learnt on Tuesday that the Centre could bring a Bill in the winter session of Parliament to bar all cryptocurrencies in India, barring a few exceptions, and create a framework to regulate digital currency issued by the Reserve Bank of India (RBI).

In response, all major digital currencies saw a fall of around 15 per cent and more, with Bitcoin down by around 18.53 per cent, Ethereum fell by 15.58 per cent, and Tether down by 18.29 per cent.

But as the news of regulation, not ban, came out, markets seem to be stabilising.

India’s has had a hot-cold relationship with crypto. The RBI had banned it in 2018 voicing “serious concerns” about private cryptocurrencies.

Then the Supreme Court of India had lifted the ban in 2020 and now in 2021 negotiations are on between industry stakeholders and the Centre to bring in a regulation that will put corrupt practices to check.

According to Blockchain and Crypto Assets Council, India holds about ₹ 6 lakh crore in crypto assets.

Last week, the Standing Committee on Finance, chaired by BJP member Jayant Sinha, met the representatives of crypto exchanges, blockchain and Crypto Assets Council (BACC), among others, and arrived at a conclusion that cryptocurrencies should not be banned, but it should be regulated.

Delivering a keynote address at the Sydney Dialogue on November 18, Prime Minister Narendra Modi had urged all countries to ensure that cryptocurrency does not “end up in the wrong hands”.

Private digital currencies have gained popularity in the past decade or so. However, regulators and governments have been sceptical about these currencies and are apprehensive about the associated risks.

Recently, there have been a rising number of advertisements promising easy and high returns on investments in cryptocurrencies, amid concerns over such currencies being allegedly used for luring investors with misleading claims.

Sources: NDTV News : click the link for more information.

If you want to know more about what’s happening in the world of Crypto, then stay connected with DocTooLss , or just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Cryptocurrency heard a lot but what is it ???


Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Cyber Strategies in the New Normal

We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write this blog many would be working from home and some who have joined their work task force are trying to adjust the new normal.

This year where not even the IT officials but the students or kids are attending their classes from home. Since everyone is working from home there has been an increase in bandwidth and data utilization around the globe.

The organization which has a business continuity plan ready had a smooth transformation to work from the environment without any hindrances it was proved that CS having a foresight had an efficient way for the organization. A new area of cyber is cyber innovation, risk is mitigated risk is all about taking a risk. Cyber innovation is an area to look at. 

As per Gartner, there are five principles:
  • Continuous adaptive risk and trust assessment based on agility.
  • Secure DevOps
  • Replace the one-time security gate
  • Put the continuous security pro-actively 
  • Build the architecture with security, not with silos 

The average knowledge about cyber-attack prevention is deficient. Yes, cybercriminals are getting better all the time. But if we become proactive in our approach instead of reactive, they can be pushed back continually and hopefully sit mostly on the drawing board!

There is some positive aspect of COVID 19, that it has helped companies to identify that employees to work from their living room, whereas lots of expenditure has been spent on companies infrastructure. Even our environment which has been polluted has been saved by not using the vehicles on a daily basis. 

So, things to keep in mind during this pandemic is to secure your computer systems and wear a mask to protect yourself and others around you.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Linkedin:

What are the emerging Technologies Road Map for the year 2019-21..?

With the emerging outbreaks of the pandemic COVID19 the world has come to a standstill. Due to this, there has been a disconnect between cybersecurity executive and their organization’s security analysts.

There was a study done by the research giants Gartner who in consultation with the leaders have come up with the Road Map for the year 2019-21.

If we see the road map and concentrate on Cloud and CyberSecurity technologies:


As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .

We at DocToolss have often talked about Endpoint Detection and Response (EDR) , Virtualized Firewalls. The terms which we will be further talking about in our future blogs would be Statis Application Security Testing (SAST), Threat Intelligence Services, Network Sandboxing, User and Entry Behaviour Analytics, Signature Endpoint Detection or Protection and Database Audit and Protection etc.

If we further drive deep in the Road map curves, we will find out about cloud technology though we haven’t talked about it much in our past blogs but will plan to do it in our future blogs.

Cloud Technology

As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .

The PaaS technology which has been categorized under “In Deployment” phase has already been talked about in our past blogs, you can click here to know more.

Further technologies terms would be explained in our future blogs, or if there is anything which you want us to explain or to drive in, we will always be happy to hear from you.

The inputs for this blogs has been taken from Gartner website, for more information on this, click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

Artificial Intelligence (AI) to combat with COVID19

Artificial Intelligence

AI technology to be applied during this epidemic time of COVID19 as it can be most effective by the brainstorming of IT leaders and Medical Superintendents.

Question which arises here is how?

As per a recent press release published by Gartner which was closely monitored by our DocTooLss technical content team where it said that  “CIOs and CDOs in governmental and healthcare organizations, should leverage AI in five core areas to improve decision making during the coronavirus pandemic, according to Gartner, Inc.

The five areas where the AI will combat with COVID19 are:

  • Early Detection and Epidemic Analysis
  • Containment    
  • Triage and Diagnosis
  • Healthcare Operations
  • Vaccine Research & Development (R&D)

Some pointers which we think we should know about:

Early Detection and Epidemic Analysis: AI technique is all about to understand, analyse, and predict where the virus is spreading or slowing down.

If by AI automatic tracking of citizens who are the carriers of this pandemic COVID19 can be tracked down via their mobile phone locations and public facial recognition and backtracking the movement of people to identify the source of the virus. Ex: India which has recently made it compulsory for its citizens to download Aarogya Setuapplication on their mobiles.

Containment  : With the news breaking in to apply Lockdowns around the world, with one message being spread as an anthem i.e. stay-at-home, be safe.

So here AI could act as behaviour analytics in reading the dynamics of human behaviour.

Law enforcement can predict where and when people may not adhere to stay-at-home orders or social distancing through predictive enforcement and dispatch enforcement units accordingly.” as quoted by Gartner .

Triage and Diagnosis: AI-enabled self-triage has helped patients including virtual health assistants, in identifying people if they possibly are infected and if they infected then what can be the next steps for its treatment.

Healthcare Operations: AI plays an important role in distributing evenly the healthcare operations and hospital resources by making the availability of qualified medical staff, materials and equipment as allocated by their healthcare CIOs and CDOs.

Vaccine Research & Development (R&D): AI graphs and Natural-Language Processing (NLP) which is used to identify findings, procedures, medications, allergies and participants. The test on humans such as the plasma therapy which is still not a treatment but going on trials on the patients of COVID19.

Healthcare CIOs and CDOs should explore every avenue of AI to fight COVID-19 using an ongoing and systematic process of AI application identification and prioritization as quoted by Gartner .

The intakes of this blog has been taken by Gartner News Room – Press Release section – Click here for more information.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website: | Facebook:

Kinds of Cyber Attacks

On a time when the world is getting locked down due to COVID19 which is a deadly virus and very contagious thanks to the Wuhan city located in Central China. This is also one of the kinds of attack which the world is battling with and is referred to as a World War – III. We hope that this pandemic comes to an end as early as possible and our world around doctors or scientists find its antidote . To get the latest counts on COVID19 check out the link

We took COVID19 as an example above as its also a kind of attack which the world is facing today so let’s check some of the basic CyberAttacks which are happening around us but we as a person are not aware of it, so let’s understand about it :

Catfishing: Process of creating a online profile in order to trick people into believing they are someone else for financial gains.

Zeroday Attack: It is a threat that is unknown to security specialist and has not been addressed.

Social Engineering: Asking the information over the meeting or talking to him or her to gain the sensitive information of any secured data.

Foot Printing: The process where a hacker takes passive steps to gather information about a potential target.

Phishing : The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.

Reconnaissance: A type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.

Vishing: The fraudulent practice of making phone calls or leaving voice messages purporting to be from a reputable companies in order to induce individuals to reveal personal information such as bank details or CC details etc.

Doxing: The attacker threatens to release sensitive information or an access to other unless victim says him .

Shoulder Surfing: It is a type of social engineering technique used to obtain information such as personal identification numbers, passwords and other confidential data .

Spoofing: Spoofing attack is a situation in which a person or program successfully masquerade as another by falsifying data to gain an illegitimate.

Pharming: It is a form of an online fraud that redirects users from legitimate. website’s traffic to another fake site.

Smishing: The use of text messages sent to a target in order to lure them to click on the links contained in the text.

Spear-Phishing: The fraudulent practice of sending emails from known or trusted sender in order to induce targeted individuals to reveal confidential information.

Whaling: The method used by the cybercriminals to target senior or other important individuals of an organization.

Dumpster Diving: It is an attack where the goal of an attacker is to reclaim important information by inspecting the contents of trash containers and dumpsters.

Watering Hole Attacks: it is a security exploit in which the attacker seeks to compromise a specific group of an end users by infecting websites that members of the group are known to visit such as social networking sites.

DoS (Denial-of-Service): An attack which is meant to shut down a machine or network, making it inaccessible to its intended users.

Brute Force Attack: It is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.

Dictionary Attack: It is a form of attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption or passphrase by trying hundreds or sometimes millions of likely possibilities such as words in a dictionary.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

Website Built with

Up ↑

Create your website with
Get started