Knowledge Management …!!!

Knowledge Management

What is Knowlege Management?

It is the collection of methods relating to creating, sharing, using & managing the information & knowledge within an organization.

It refers to a multidisciplinary approach to achieving organisational objectives by making the best of knowledge.


Types of Knowlege Management

  1. Explicit Knowlege : Knowledge i.e eazy to write down & share
  2. Implicit Knowledge: Applied Knowledge
  3. Tacit Knowledge: Knowledge i.e. gained through personnal experience

Knowledge Management Process

  • Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
  • Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
  • Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.

Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.


If you want to more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Cryptocurrency heard a lot but what is it ???


Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Azure vs AWS (Battle for the No.1 Spot)…!!

AWS vs Azure

Day in day out we talk about the cloud and the services provided by them. The market today is led by AWS followed by Azure and catching up are GCP (Google Cloud Platform).

There are around 160+ services provided by AWS and counts are adding up whereas in Azure the services are lesser than AWS but are also getting added up with time.

Let’s have a sneek peek at some of the important services by these market leaders:

AWS EC2 Vs Azure VM

AWS EC2 Instance Vs Azure VM Scale Sets

AWS S3 Vs Azure Blob Storage

AWS Lambda/Fargate Vs Azure Functions

AWS Beanstalk Vs Azure App Service

AWS SQS Vs Azure Queue Storage

AWS ELB (Elastic Load Balancer) Vs Azure Load Balancer

AWS VPN Vs Azure Virtual Network

AWS DynamoDB Vs Azure Cosmos DB

AWS Shield Vs Azure DDoS


AWS Red Shift Vs Azure Synapse Analytics

AWS Rekognition/Lex/Polly/Transcribe Vs Azure Cognitive Service

For more information on the above AWS services, click here

For more information on the above Azure services, click here

We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.

We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to or contact the undersigned .


About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

What is CASB?

CASB stands for Cloud Access Security Breaker, which is a software tool that acts as a barrier between on-premises and a cloud provider’s infrastructure which can be a Azure, AWS , Google Cloud , IBM cloud etc.

The technology is needed to secure cloud services which are being adopted at a large pace by different organization’s. CASB vendors understand that for the protection of cloud services is different since the data is yours but stored in a systems that belong to someone else.

The benefits provided by CASB are:

  • Efficiently govern cloud data.
  • Ensure compliance.
  • Guard against threats.

There are different vendors of CASB such as Bitglass, Microsoft , Mcaffee, Symantec , Cisco , Forcepoint etc. More information about the vendors – click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

What is Vulnerability Management?

Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a system. There are tools that are used to identify Cyber Exposure risks across an entire organization, and aligns them with your operational goals and objectives.

In cyberseuirty terms there are some important good to know what vulnerabilities, threats, and exploits mean:

  • Cybersecurity Vulnerabilities. A vulnerability is a potential weakness in a security architecture that opens an organization or individual to cyberattacks.
  • Cybersecurity Threats. “Cybersecurity threat” refers to a combination of tools and methods involved in a cyberattack. These threats are not inherent to the network. Instead, they leverage vulnerabilities on the network.
  • Cybersecurity Exploits. Exploits are those when a cybersecurity threat is applied to a vulnerability to conduct some form of malicious activity. Impacts of these exploits may vary by threat and vulnerability type.

LifeCycle of VM

Find below the phases of the Vulnerability Management Lifecycle:

PHASE 1 – The Cloud Platform that provides multiple technologies, including scanner appliances, agents, sensors, and connectors to help you detect and discover both on-premise and cloud-based host assets.

PHASE 2 – The scanners, agents, sensors, and connectors work together to identify host assets throughout your entire enterprise architecture.

PHASE 3 – The primary objective of the assessment phase is to find vulnerabilities on the host assets in your VM subscription.

PHASE 4 – Regardless of the data collection techniques you use, all findings are securely stored in the Cloud Platform, where reporting tools and features allow you to identify the vulnerabilities that pose the greatest risk to your organization, and share these findings with your patch and operational teams.

PHASE 5 – The remediation tools and features built-in to the VM application, will help you to prioritize detected vulnerabilities and identify the vulnerabilities that have been successfully mitigated.

PHASE 6 – Verify any vulnerabilities that have been patched or fixed. This task is performed automatically every time a scanner appliance, agent or sensor provides new assessment data to the Cloud Platform.

Note: The above information on VM lifecycle has been taken from Qualys Training sites, for more information , please click here.

To know more about VM or its best practices please connect with us below.

We make Technology Eazy via Docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

What is Patch Compliance?

To explain you about a patch compliance lets imagine that when you are working out in the morning while lifting those 25kg dumbles you somehow got hurt on your knees or legs that too a minor cut what you do?

You apply an antiseptic or a Band-Aid so that the cut doesn’t go deeper and get spoiled by airborne viruses. As in the Band-Aid is removed you are back on your daily life routine.

How Band-aid is connected to Patch Management?

So now just imagine if your system or a machine which on an everyday usage keeps on getting cuts and before it goes deeper it should be applied with a Band-Aid that is it should be kept updated with all the latest patches to remove vulnerabilities.

In a technical language a patch management is the process of managing a network of computers by regularly performing patch deployment to keep computers up to date.  This helps to reduce the system-related failures so you can improve productivity and save on the costs associated with poor patch management.

The benefits which one can have after updating patches:

  • Security:  The network security is strengthen to avoid any data breach.
  • Productivity:  The patch update increases the productivity of the system which thereafter increases the profits of the businesses.
  • Compliance:  Patch management ensures that you stay within compliance of the security standards.

To know more about the best practices related to Patch Management stay connected to our website or follow our blog on WordPress or Blogger or contact us below:

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Facebook:

What is MS Intune?

MS Intune is a cloud-based management solution which provides mobile and OS device management.

To give you an example of MS intune, as in when you download any application from a play store whether it is a Google or Apple iOS, there are applications which doesn’t allow you to do some activities ex: taking screenshots these are blocked by some background applications which are also downloaded along with your main application, because of security. MS In tune is downloaded to secure your official data as if incase you lost your device the same data could be erased through in tune before your data gets in the hands of an attacker.

Lets understand some best practices to be followed, when using MS intune:

  • Create security groups for Intune deployment rings
  • Configure Windows 10 software update rings
  • Setup Office 365 apps deployment for Windows 10
  • Setup App protection policies
  • Create Company terms and conditions
  • Customize Company Portal branding
  • Configure Device clean-up rules on a weekly/monthly time frame
  • Configure Apple MDM push certificates
  • Setup Device Configuration profiles

Intune Deployment Rings

Create a basic group using the Azure Active Directory (Azure AD) portal, a basic group is added to a single resource by the resource owner (administrator) and includes specific members (employees) that need to access that resource.

Windows 10 software update rings

The MDM’s should be updated with the latest software of windows to secure it from any cyberattacks.

Setup App protection policies

Create and assign Microsoft Intune app protection policies (APP) for users of your organization. App protection policies can apply to apps running on devices that may or may not be managed by Intune.

Company terms and conditions

As an Intune admin, you must require that users accept your company’s terms and conditions before using the Company’s Portal

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website: | Facebook:

Website Built with

Up ↑

Create your website with
Get started