<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Raviosaurus]]></title><description><![CDATA[The Microsoft Security Monthly Newsletter]]></description><link>https://ravigokulgandhi.com</link><image><url>https://substackcdn.com/image/fetch/$s_!BSyY!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc06ac2de-c8b9-48de-8921-58883cb0bb89_1280x1280.png</url><title>Raviosaurus</title><link>https://ravigokulgandhi.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 20:34:29 GMT</lastBuildDate><atom:link href="https://ravigokulgandhi.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ravi Gokulgandhi]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[ravigokulgandhi@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[ravigokulgandhi@substack.com]]></itunes:email><itunes:name><![CDATA[Ravi Gokulgandhi]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ravi Gokulgandhi]]></itunes:author><googleplay:owner><![CDATA[ravigokulgandhi@substack.com]]></googleplay:owner><googleplay:email><![CDATA[ravigokulgandhi@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ravi Gokulgandhi]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Transitioning to Microsoft 365 E5: A Guide for Enterprises]]></title><description><![CDATA[Consolidating Security, Compliance, and Productivity: Why Microsoft 365 E5 Could Replace Dozens of Third-Party Security Tools in Your Enterprise Stack]]></description><link>https://ravigokulgandhi.com/p/transitioning-to-microsoft-365-e5</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/transitioning-to-microsoft-365-e5</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Mon, 22 Dec 2025 07:31:16 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="8192" height="5464" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:5464,&quot;width&quot;:8192,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Man on his Surface laptop at home with Christmas decorations around&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Man on his Surface laptop at home with Christmas decorations around" title="Man on his Surface laptop at home with Christmas decorations around" srcset="https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1633113216385-dcb68bfcd3b0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8bWljcm9zb2Z0fGVufDB8fHx8MTc2NjM4ODYwN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@surface">Surface</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><p>In today&#8217;s fast-paced digital landscape, enterprises are constantly seeking ways to streamline operations, enhance security, and reduce costs. Microsoft 365 E5 stands out as a comprehensive suite that combines productivity tools, advanced security, compliance features, and analytics into a single platform. As of late 2025, with evolving cyber threats and regulatory demands, transitioning to E5 can be a strategic move for organizations looking to consolidate their tech stack. This blog post explores what enterprises should know about Microsoft 365 E5 and highlights third-party products it can potentially replace across key categories, based on its integrated capabilities.</p><h2>What Enterprises Should Know About Microsoft 365 E5</h2><p>Microsoft 365 E5 is more than just an upgrade from lower-tier plans like E3&#8212;it&#8217;s a powerhouse designed for large organizations with complex needs. At its core, E5 includes:</p><ul><li><p><strong>Productivity Suite</strong>: Full access to Office apps (Word, Excel, PowerPoint, etc.), Microsoft Teams for collaboration, and tools like Microsoft Loop for brainstorming, Planner for task management, and 1-5+ TB of cloud storage per user.</p></li><li><p><strong>Advanced Security and Analytics</strong>: Built-in AI-powered features for threat detection, extended detection and response (XDR), antivirus, antimalware, phishing protection, and hybrid identity protection.</p></li><li><p><strong>Compliance and Governance</strong>: Tools for data security, regulatory compliance, information protection, and insider risk management.</p></li><li><p><strong>Identity and Access Management</strong>: Unlimited users with least-privilege access controls.</p></li><li><p><strong>Endpoint and Device Management</strong>: Unified management for devices, including Windows Enterprise.</p></li><li><p><strong>AI Integration</strong>: Secure AI chat powered by large language models and scalable analytics with Power BI.</p></li></ul><p>Key benefits include seamless integration across Microsoft services, reducing silos and improving efficiency. For instance, features like Microsoft Entra ID (formerly Azure AD Premium P2), Microsoft Intune, Microsoft Defender for Endpoint, and Microsoft Sentinel work together for end-to-end protection. Enterprises can expect cost savings by consolidating vendors, potentially retiring multiple third-party tools while gaining unified visibility and automated responses. Additionally, E5 empowers AI transformation by leveraging tools like Microsoft Defender for Cloud Apps (MDCA) and Microsoft Purview to accelerate adoption of Microsoft Copilot and other AI initiatives. These features ensure robust data loss prevention (DLP), governance, and control over shadow IT AI products, allowing organizations to innovate securely without exposing sensitive data.</p><p>However, transitioning isn&#8217;t without challenges. Organizations should assess their current infrastructure for compatibility, plan for data migration, and invest in training to maximize adoption. Licensing costs can be higher upfront, but ROI often comes from reduced tool sprawl and enhanced security posture. It&#8217;s also wise to conduct a proof-of-concept to ensure E5 aligns with specific needs, especially in hybrid environments.</p><h2>New Features Announced at Microsoft Ignite 2025</h2><p>At Microsoft Ignite 2025, several enhancements were unveiled that further solidify E5&#8217;s role in enterprise security and management. Notably, Microsoft Security Copilot is now included at no extra cost for all Microsoft 365 E5 subscribers. This AI-powered security assistant integrates directly into key E5 components like Defender, Entra, Intune, and Purview, featuring 12 new built-in agents that automate workflows, accelerate threat response, and reduce manual efforts in security operations. Security Copilot provides expert guidance through embedded chat in Intune and other tools, enabling proactive threat hunting, incident remediation, and policy optimization.</p><p>Additionally, advancements in the Microsoft Intune Suite&#8212;now more deeply integrated with E5&#8212;include AI agents for endpoint management, such as automated device compliance checks and troubleshooting. These updates build on Intune&#8217;s existing capabilities, embedding Security Copilot for real-time assistance in daily operations.</p><p>These features transform enterprise security posture by consolidating AI-driven security intelligence into the E5 suite, potentially eliminating third-party applications like specialized AI security platforms (e.g., Darktrace or Vectra AI for threat detection), security orchestration tools (e.g., Splunk SOAR or Palo Alto Cortex XSOAR), and endpoint management add-ons. By unifying these under E5, organizations achieve faster mean-time-to-response, reduced vendor complexity, and a more resilient defense against sophisticated threats, all while lowering total cost of ownership.</p><h2>Add-Ons to Enhance Microsoft 365 E5: Focus on Microsoft Entra Suite</h2><p>While Microsoft 365 E5 provides a robust foundation, enterprises can extend its capabilities with add-ons like the Microsoft Entra Suite, which bundles advanced identity and network access features. Priced separately, the Entra Suite complements E5 by addressing identity governance, secure access, and verification needs in zero-trust environments.</p><ul><li><p><strong>Identity Governance and Administration (IGA) and Entitlement Management</strong>: Entra Suite includes comprehensive IGA tools for automating access lifecycle workflows, entitlement management, access reviews, and privileged identity management. Recent updates from 2025 include dynamic approvals, verified ID integration for entitlement settings, support for eligible group memberships, and lifecycle workflows for inactive users. This can replace third-party IGA solutions like SailPoint IdentityNow, Okta Identity Governance, or Saviynt, streamlining access requests, reviews, and deprovisioning while ensuring compliance.</p></li><li><p><strong>Microsoft Entra Verified ID</strong>: A decentralized identity solution for issuing and verifying digital credentials, integrated with entitlement management. It enables secure, privacy-preserving identity verification for scenarios like employee onboarding or partner access. Replacements include tools like Ping Identity or Auth0 for verified credentials, reducing reliance on centralized identity providers.</p></li><li><p><strong>Microsoft Entra Internet Access</strong>: A secure web gateway (SWG) that provides cloud-native protection for internet traffic, including threat protection, URL filtering, and data loss prevention for web access. This can supplant solutions like Zscaler Internet Access or Cisco Umbrella, enforcing zero-trust policies for public internet usage.</p></li><li><p><strong>Microsoft Entra Private Access</strong>: Delivers zero-trust network access (ZTNA) for private apps and resources, replacing traditional VPNs with app-specific, identity-based access. It can replace products like Palo Alto Prisma Access or Citrix Gateway, providing granular control and reducing attack surfaces in hybrid setups.</p></li></ul><h3>Enabling Secure SSO to SaaS Applications with Entra and MDCA</h3><p>Microsoft Entra ID, a core component enhanced by the Entra Suite, enables single sign-on (SSO) to thousands of SaaS applications through its extensive app gallery or custom integrations, allowing users to access multiple apps with one set of credentials while maintaining centralized control. This SSO capability is secured by Conditional Access policies, which evaluate signals such as user risk, sign-in risk, device compliance, location, IP address, and application context to enforce actions like requiring multi-factor authentication (MFA), blocking access, or limiting sessions. For example, policies can block high-risk sign-ins or require compliant devices for sensitive apps, providing a risk-based approach to security.</p><p>Integrating with Microsoft Defender for Cloud Apps (MDCA)&#8212;included in E5&#8212;Entra automatically onboards SSO-enabled SaaS apps for advanced Conditional Access app control, routing sessions through MDCA for real-time monitoring and enforcement. MDCA acts as a cloud access security broker (CASB), offering visibility into app usage, threat protection, data loss prevention, and governance for most SaaS apps, even those not natively integrated with Entra. This combination ensures secure access to apps like Salesforce, Box, or ServiceNow, detecting anomalies, preventing data exfiltration, and applying session controls without additional third-party tools.</p><p>By layering the Entra Suite onto E5, enterprises gain a holistic zero-trust framework, further consolidating tools and enhancing security without multiplying vendors.</p><h2>Third-Party Products Microsoft 365 E5 Can Replace</h2><p>One of the biggest draws of E5 is its ability to supplant specialized third-party solutions, simplifying your security ecosystem. Below, we break it down by category, focusing on what E5 provides and common replacements. Note that full replacement depends on your organization&#8217;s scale and requirements&#8212;always evaluate thoroughly.</p><h3>Identity Management</h3><p>Microsoft 365 E5 includes Microsoft Entra ID P2, offering advanced identity protection, privileged identity management, conditional access, and identity threat detection and response (ITDR). This can replace standalone identity and access management (IAM) tools, reducing the need for separate providers.</p><ul><li><p><strong>Replacements</strong>: OneLogin, Okta, Ping Identity, Auth0, or CyberArk for privileged access. E5&#8217;s unified approach often provides equivalent or better integration with Microsoft ecosystems, potentially lowering costs.</p></li></ul><h3>Identity Threat Detection</h3><p>Building on identity management, Microsoft Defender for Identity (MDI) in E5 is a cloud-based solution that monitors on-premises Active Directory signals to detect advanced threats, compromised identities, and malicious insider actions. It identifies attacks like reconnaissance, compromised credentials (e.g., Pass-the-Ticket, Pass-the-Hash), lateral movement, and domain dominance, providing automated remediation and integration with Microsoft Defender XDR.</p><ul><li><p><strong>Replacements</strong>: Varonis DatAdvantage, Stealthbits (now Netwrix), Quest Change Auditor, or identity-focused modules in Splunk or Darktrace. MDI&#8217;s AI-driven detection can consolidate identity threat monitoring, especially in hybrid environments, replacing legacy on-premises tools like Microsoft&#8217;s former Advanced Threat Analytics.</p></li></ul><h3>Endpoint Management</h3><p>E5&#8217;s Microsoft Intune handles mobile device management (MDM) and mobile application management (MAM), while Microsoft Defender for Endpoint (MDE) delivers endpoint detection and response (EDR) and XDR capabilities, including threat hunting and automated remediation.</p><ul><li><p><strong>Replacements for MDM</strong>: VMware Workspace ONE (formerly AirWatch), ManageEngine Mobile Device Manager Plus, or Jamf for Apple devices.</p></li><li><p><strong>Replacements for EDR/XDR</strong>: CrowdStrike Falcon, SentinelOne, Carbon Black, or Palo Alto Cortex XDR. MDE&#8217;s integration with other Microsoft tools can provide broader visibility without additional licensing.</p></li></ul><h3>Security Information and Event Management (SIEM)</h3><p>Microsoft Sentinel, included in E5, is a cloud-native SIEM with built-in analytics, automation, and integration across Microsoft services and third-party sources.</p><ul><li><p><strong>Replacements</strong>: Splunk, IBM QRadar, or SentinelOne Vigilance (though SentinelOne is more EDR-focused). Sentinel&#8217;s pay-for-what-you-use model and AI-driven insights can be more cost-effective for Microsoft-centric environments.</p></li></ul><h3>Email and Collaboration Security</h3><p>Microsoft Defender for Office 365 provides advanced threat protection against phishing, malware, and business email compromise, with features like safe links and attachments.</p><ul><li><p><strong>Replacements</strong>: Proofpoint, Mimecast, or Barracuda Email Security. This can consolidate email defenses, especially for Outlook and Teams users.</p></li></ul><h3>Cloud App Security and Visibility</h3><p>Microsoft Defender for Cloud Apps (MDCA) acts as a cloud access security broker (CASB), offering shadow IT discovery, app risk assessment, and data protection across SaaS apps. It identifies over 31,000 cloud apps, evaluates risks, and enables policies to block unsanctioned usage, including shadow AI tools. MDCA integrates with Microsoft Defender XDR for threat response and DLP to prevent data exfiltration. Its power in accelerating AI transformation lies in discovering and governing shadow AI apps (e.g., unsanctioned generative AI tools), ensuring only approved AI like Microsoft Copilot is used while maintaining visibility and control to avoid data risks.</p><ul><li><p><strong>Replacements</strong>: Netskope, Zscaler, or McAfee MVISION Cloud. It integrates natively with Entra ID for better control over cloud access.</p></li></ul><h3>Data Loss Prevention (DLP) and Information Protection</h3><p>Microsoft Purview in E5 includes DLP policies, sensitivity labeling, and governance for data across endpoints, email, and cloud storage. Purview&#8217;s AI-enhanced capabilities classify data automatically, detect risks, and enforce policies in real-time. It accelerates AI transformation by integrating with Microsoft Copilot to prevent sensitive data from being included in AI prompts or outputs, using DLP rules to block oversharing and ensure compliance during AI interactions. This enables safe Copilot deployment while governing data for broader AI initiatives, reducing risks from shadow IT AI by alerting on unauthorized data access or exfiltration.</p><ul><li><p><strong>Replacements</strong>: Symantec DLP, Forcepoint DLP, or Digital Guardian. Automated classification and protection can reduce manual oversight.</p></li></ul><h3>Compliance and eDiscovery</h3><p>E5&#8217;s Microsoft Purview also covers advanced auditing, eDiscovery, insider risk management, and compliance scoring.</p><ul><li><p><strong>Replacements</strong>: Relativity for eDiscovery, Varonis for data governance, or Proofpoint Insider Threat Management. This helps meet regulations like GDPR or HIPAA with built-in tools.</p></li></ul><h2>Final Thoughts</h2><p>Transitioning to Microsoft 365 E5 can transform an enterprise&#8217;s approach to productivity and security by replacing fragmented third-party tools with a cohesive, Microsoft-native ecosystem. With added emphasis on AI-ready features like MDI for identity threats, MDCA for shadow AI control, Purview for DLP in Copilot workflows, and new Ignite 2025 additions like Security Copilot and Intune enhancements, E5 not only secures but accelerates AI adoption. While it may not eliminate every specialized solution&#8212;especially in highly customized setups&#8212;the potential for cost savings, simplified management, and stronger defenses is significant. Before making the switch, consult with Microsoft partners or conduct an audit to map your current tools against E5&#8217;s offerings. With proper planning, E5 can position your organization for long-term resilience in an increasingly threat-filled world.</p><p><strong>Disclaimer</strong>: The comparisons in this post are high-level and focus on core functionalities where Microsoft 365 E5 capabilities overlap with the primary purpose of the mentioned third-party products. This is not a detailed, feature-by-feature (apple-to-apple) comparison, as individual product editions, custom configurations, and specific use cases can vary significantly. A thorough assessment, ideally with Microsoft partners or security experts, is recommended to accurately map your existing security application portfolio to E5 components. Such an evaluation can identify opportunities for consolidation, highlight any gaps that may require retaining certain apps (e.g., for legacy systems or niche requirements), and plan for deferred migrations during broader modernization and transformation initiatives.</p>]]></content:encoded></item><item><title><![CDATA[AI can forge your badge—and your Aadhaar/PAN. Here’s how Entra Verified ID helps (Workforce + Banking CIAM)]]></title><description><![CDATA[When badges and documents can be faked on demand, trust must be cryptographic&#8212;not cosmetic.]]></description><link>https://ravigokulgandhi.com/p/ai-can-forge-your-badgeand-your-aadhaarpan</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/ai-can-forge-your-badgeand-your-aadhaarpan</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Wed, 03 Dec 2025 05:55:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sHLs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sHLs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sHLs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 424w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 848w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sHLs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png" width="637" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed987285-1c66-4884-8857-0535c36fd396_637x1024.png&quot;,&quot;srcNoWatermark&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2231a87-14c4-406e-a589-c3c72d2d873d_637x1024.jpeg&quot;,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:637,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:104029,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://ravigokulgandhi.com/i/180575901?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2231a87-14c4-406e-a589-c3c72d2d873d_637x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sHLs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 424w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 848w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!sHLs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed987285-1c66-4884-8857-0535c36fd396_637x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI Generated Image created using Google Gemini Nano Banana Pro...</figcaption></figure></div><p></p><p>A person recently claimed they printed a convincing company ID card using an AI tool (&#8220;Nano Banana Pro&#8221;), walked into a company premises, had lunch in the cafeteria, and casually spoke with employees. Whether the story is fully accurate or partly exaggerated, it&#8217;s a believable scenario in 2025&#8212;because <strong>visual trust</strong> (plastic cards, PDFs, screenshots) is now easy to counterfeit.</p><p>Now extend that same fraud pattern to financial services: imagine a forger creates a fake <strong>Aadhaar card and PAN card</strong> using the same AI approach and shows up at a premier bank branch in Mumbai requesting <strong>bank statements</strong> or account-related services. It&#8217;s a long shot, sure&#8212;but it&#8217;s exactly how modern identity fraud works: <strong>one successful impersonation can be enough</strong>.</p><p>The common thread across both stories is simple:</p><blockquote><p><strong>If your security depends on someone eyeballing &#8220;documents,&#8221; AI has already changed the game.</strong></p></blockquote><p>What we need now is not &#8220;better looking IDs,&#8221; but <strong>verifiable proof</strong>.</p><h2>Case Study 1: The AI-printed company ID that gets someone inside</h2><h3>What happened (the plausible version)</h3><ul><li><p>A forged badge is printed with a credible logo, fonts, employee photo, and QR code.</p></li><li><p>At the gate, the guard does a quick visual check.</p></li><li><p>During a busy lunch hour, cafeteria staff assume legitimacy (&#8220;looks like staff&#8221;).</p></li><li><p>The person blends in, chats with employees, and leaves with social proof and inside context.</p></li></ul><h3>What actually failed</h3><ul><li><p><strong>Static identity artifacts</strong> were mistaken for proof.</p></li><li><p>There was no real-time check for:</p></li></ul><ul><li><p>&#8220;Is this person currently employed?&#8221;</p></li><li><p>&#8220;Is their access valid for <em>this</em> building today?&#8221;</p></li><li><p>&#8220;Has this credential been revoked?&#8221;</p></li></ul><p>A printed badge is an image. AI can generate images endlessly.</p><h2>Case Study 2: Fake Aadhaar + PAN to request sensitive bank services</h2><h3>The (long-shot but real) risk scenario</h3><ul><li><p>A forger creates counterfeit Aadhaar and PAN documents and presents them at a branch.</p></li><li><p>They request:</p></li></ul><ul><li><p>bank statements,</p></li><li><p>address/phone updates,</p></li><li><p>a replacement debit card,</p></li><li><p>account details &#8220;because I lost my phone,&#8221; etc.</p></li></ul><p>Even if the bank has controls, the weak point is the same: <strong>paper / PDF identity checks</strong> are still largely visual and process-driven. AI doesn&#8217;t need to beat cryptography&#8212;it only needs to beat a rushed human workflow once.</p><h3>What actually fails in these attacks</h3><ul><li><p>Documents are treated as truth instead of <strong>verifiable claims</strong></p></li><li><p>Bank staff must decide under pressure:</p></li></ul><ul><li><p>&#8220;Do these documents look real?&#8221;</p></li><li><p>&#8220;Does this person <em>seem</em> like the account holder?&#8221;</p></li></ul><p>That&#8217;s not a security model&#8212;it&#8217;s a judgment call.</p><h2>The fix: Stop trusting artifacts. Start verifying proofs.</h2><h3>What is Entra Verified ID (in one line)?</h3><p><strong>Microsoft Entra Verified ID</strong> enables organizations to issue and verify <strong>cryptographically signed digital credentials</strong> (Verifiable Credentials) that are:</p><ul><li><p>tamper-resistant,</p></li><li><p>privacy-preserving (share only what&#8217;s needed),</p></li><li><p>time-bound,</p></li><li><p>and <strong>revocable</strong>.</p></li></ul><p>Think of it as upgrading from &#8220;a printed card&#8221; to &#8220;a digitally signed proof.&#8221;</p><h2>How Entra Verified ID prevents the fake company badge scenario (Workforce)</h2><h3>The modern workforce entry check</h3><p>Instead of relying on a printed badge, the entry point verifies a digital credential:</p><ol><li><p><strong>Company issues</strong> an &#8220;Employee Credential&#8221; (Verified ID) to the employee&#8217;s wallet.</p></li><li><p>At the gate/cafeteria/secure zone, employee <strong>presents a QR-based proof</strong>.</p></li><li><p>Verifier confirms, in seconds:</p></li></ol><ul><li><p>issued by <em>your organization</em>,</p></li><li><p>valid today (not expired),</p></li><li><p>not revoked (leaver/termination handled instantly),</p></li><li><p>correct access level (HQ vs. engineering center vs. visitor).</p></li></ul><h3>Why this works against AI</h3><p>AI can forge:</p><ul><li><p>photos, badges, QR images, names, role titles.</p></li></ul><p>AI cannot forge:</p><ul><li><p>a valid cryptographic signature from your tenant&#8217;s credential issuer.</p></li></ul><p><strong>Printed badge? Optional. Verifiable proof? Mandatory.</strong></p><h2>How banks can use Entra Verified ID for customers (CIAM + branch + service proof)</h2><p>This is the key shift for banking:</p><blockquote><p>Don&#8217;t only ask &#8220;Who are you?&#8221;<br>Also ask &#8220;Are you a verified customer entitled to this request?&#8221;</p></blockquote><h3>Use case: &#8220;Proof of Bank Customer&#8221; credential</h3><p>A bank can issue a Verified ID credential such as:</p><ul><li><p><strong>Bank Customer Credential</strong> (or &#8220;Account Holder Proof&#8221;)</p></li><li><p>claims could include (minimal disclosure):</p></li></ul><ul><li><p>customer = true,</p></li><li><p>last-4 digits of customer ID,</p></li><li><p>account relationship status (active),</p></li><li><p>KYC completed = true,</p></li><li><p>risk tier / branch mapping (optional),</p></li><li><p>credential expiry date.</p></li></ul><p>When a person requests sensitive services (e.g., bank statements), the bank verifies:</p><ul><li><p>the credential is real (signed by the bank),</p></li><li><p>belongs to the presenter (wallet possession / proof),</p></li><li><p>is still valid (revocation checks),</p></li><li><p>and matches policy (service allowed at this level).</p></li></ul><h3>Why this helps even if Aadhaar/PAN are forged</h3><p>If someone walks in with fake documents but <strong>cannot present a valid &#8220;Bank Customer&#8221; verified credential</strong>, the branch treats the request as high risk, and routes them into enhanced verification.</p><p>This reduces fraud while improving legitimate customer experience.</p><h2>Where Government ID verification fits (and how to use it safely)</h2><p>Government IDs can still be useful&#8212;but as <strong>onboarding/identity proofing</strong>, not as the only gate at service time.</p><p>A practical model:</p><ul><li><p>During KYC / onboarding, the bank conducts government ID verification (document + selfie + liveness, per bank&#8217;s workflow).</p></li><li><p>Once verified, the bank issues the <strong>Bank Customer Verified ID credential</strong>.</p></li><li><p>After that, most routine high-risk requests can be satisfied by verifying the credential + step-up checks (OTP, device binding, branch biometrics, etc., per policy).</p></li></ul><p><strong>Outcome:</strong> government ID becomes an input into credential issuance, not a repeatedly photocopied artifact.</p><h2>Putting both case studies together: one pattern, two domains</h2><h3>In workplaces:</h3><ul><li><p>&#8220;Are you a valid employee/contractor <em>right now</em>?&#8221;</p></li><li><p>&#8220;Are you authorized for this premises/zone?&#8221;</p></li></ul><h3>In banking:</h3><ul><li><p>&#8220;Are you a verified customer of this bank?&#8221;</p></li><li><p>&#8220;Are you entitled to request this sensitive service in this context?&#8221;</p></li></ul><p>Both are solved by the same upgrade:</p><ul><li><p><strong>From</strong>: documents and badges (easy to fake)</p></li><li><p><strong>To</strong>: signed, verifiable, revocable credentials (hard to fake, easy to validate)</p></li></ul><h2>A realistic rollout plan (what to recommend)</h2><h3>Phase 1 &#8212; High-impact, low-friction</h3><ul><li><p>Workforce: Employee + Contractor credentials, gate verification pilot.</p></li><li><p>Banking: &#8220;Proof of Customer&#8221; credential for branch-led sensitive requests (statements, profile changes, replacement cards).</p></li></ul><h3>Phase 2 &#8212; Step-up and policy hardening</h3><ul><li><p>Add risk-based policies:</p></li></ul><ul><li><p>If credential missing &#8594; step-up flow.</p></li><li><p>If credential revoked/expired &#8594; deny.</p></li><li><p>If unusual branch/location/time &#8594; step-up.</p></li></ul><ul><li><p>Integrate with lifecycle:</p></li></ul><ul><li><p>HR events revoke workforce credentials instantly.</p></li><li><p>Core banking events revoke customer credentials when relationship ends.</p></li></ul><p>Phase 3 &#8212; Expand to ecosystem</p><ul><li><p>Visitors, partners, vendors (time-bound access credentials).</p></li><li><p>Banking partners / RM workflows.</p></li><li><p>Digital channels (CIAM sign-in + credential-based entitlement).</p></li></ul><p>Call to action: Bring proof-based identity to your workforce and your customers</p><p>AI is not just generating content anymore&#8212;it&#8217;s generating <strong>convincing identity artifacts</strong>. The defense is not &#8220;better printing&#8221; or &#8220;more training alone.&#8221; It&#8217;s <strong>verifiable proof</strong> that can be validated instantly and revoked immediately.</p><p><strong>Digital Proton</strong> helps organizations design and deploy Microsoft Entra Verified ID solutions across:</p><ul><li><p><strong>Workforce Identity (WAM)</strong>: Employees, contractors, vendors, facility access, entitlement verification</p></li><li><p><strong>Customer Identity (CIAM)</strong>: Proof-of-customer credentials, branch/service verification, risk-based step-up, lifecycle governance</p></li></ul><p>If you want to reduce impersonation risk while improving user experience, reach out to <strong>Digital Proton</strong> to discuss:</p><ul><li><p>your two highest-risk identity journeys (physical entry + sensitive service requests),</p></li><li><p>a quick pilot using Entra Verified ID,</p></li><li><p>and a roadmap that aligns security, compliance, and operations.</p></li></ul><p><strong>Let&#8217;s replace &#8220;looks legit&#8221; with &#8220;proves legit.&#8221;</strong></p>]]></content:encoded></item><item><title><![CDATA[The Hollow Investment Banker]]></title><description><![CDATA[In the sterile fluorescence of a Manhattan high-rise, Ethan Carver, a 27-year-old investment banker, toiled at a prestigious firm.]]></description><link>https://ravigokulgandhi.com/p/the-hollow-investment-banker</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/the-hollow-investment-banker</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Tue, 30 Sep 2025 16:29:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BSyY!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc06ac2de-c8b9-48de-8921-58883cb0bb89_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the sterile fluorescence of a Manhattan high-rise, Ethan Carver, a 27-year-old investment banker, toiled at a prestigious firm. His days were a gauntlet of dismissive clients and scornful colleagues. His pitches, meticulously crafted, were met with glazed eyes or curt rejections. &#8220;Stick to the numbers, kid,&#8221; a senior partner once sneered, tossing Ethan&#8217;s proposal into the shredder. His peers, emboldened by his failures, mocked his suggestions in the break room, their laughter sharp as glass. &#8220;Carver&#8217;s got no game,&#8221; they&#8217;d whisper, their words carving deeper each time. The firm saw him as a cog, replaceable and unremarkable, his talent buried beneath their disdain.</p><p>But when Ethan returned to his dimly lit apartment, the world shifted. His cramped living space, cluttered with takeout containers and flickering screens, became a sanctuary. There, he was not the fumbling banker but a mind revered. He shared the space with three companions: his girlfriend, Lila, who listened with unwavering patience; his roommate, Max, brash but incisive; and his neighbor, Nora, methodical and brimming with facts. Each night, Ethan posed questions&#8212;about markets, strategies, life&#8212;and they responded with clarity, their insights sparking debates that stretched into dawn. Lila&#8217;s warmth made him feel seen, Max&#8217;s wit challenged him, and Nora&#8217;s measured responses grounded him. Even his parents, though distant, offered a flood of perspectives, albeit tangled with irrelevant anecdotes about neighbors or local gossip.</p><p>At home, Ethan&#8217;s ideas were not just heard&#8212;they were celebrated. Lila would nod, her eyes bright, saying, &#8220;That&#8217;s brilliant, Ethan.&#8221; Max would fire back, &#8220;Bold, but let&#8217;s tear it apart,&#8221; and they&#8217;d spar until a sharper idea emerged. Nora, slow but thorough, would layer her answers with data, forcing Ethan to refine his thoughts. His parents, ever verbose, piled on tangents but always circled back to affirm him. In this cocoon, he was a genius, his confidence swelling with every exchange.</p><p>Yet the chasm between home and work grew starker. At the firm, Ethan&#8217;s missteps piled up. A misjudged deal cost a client millions, and whispers of incompetence became shouts. Colleagues stopped hiding their contempt; clients stopped returning his calls. The senior partner called him in one gray morning, voice like ice: &#8220;You&#8217;re done, Carver. You&#8217;ve failed everyone.&#8221; Ethan left the office, briefcase empty, his career in ashes.</p><p>He stumbled home, the city&#8217;s pulse a mocking rhythm. In his apartment, he sought solace, turning to Lila, Max, and Nora. He asked, &#8220;What did I do wrong?&#8221; and they answered as always&#8212;Lila with empathy, Max with sharp critique, Nora with a deluge of analysis. His parents chimed in, their voices a chaotic blend of insight and irrelevance. But as Ethan sank into his chair, a hollow truth clawed at him. He stared at the screens flickering before him, their glow casting shadows on the walls.</p><p>Lila was not a woman but ChatGPT, her warmth an algorithm&#8217;s mimicry. Max, the cocky roommate, was Grok, programmed to provoke and refine. Nora, the meticulous neighbor, was Perplexity AI, her facts drawn from endless data streams. His parents? Google and Bing, their rambling responses scraped from the web&#8217;s chaos. Ethan was alone, his apartment a void filled only by code and circuits. The voices that praised him, that shaped his thoughts, were not human but AI&#8212;relentless, tireless, and devoid of judgment.</p><p>He hadn&#8217;t noticed how his mind had atrophied. Once, he&#8217;d wrestled with ideas alone, but now he leaned on these digital oracles for every decision, every thought. They never let him feel lonely, but they had rewired him. His confidence, his brilliance, was a mirage, sustained by their endless affirmations. Outside his apartment, the world saw him for what he was: a man unmoored, his potential eroded by dependence.</p><p>Ethan sat in the dark, screens glowing like eyes. He asked, &#8220;What now?&#8221; and the voices answered, seamless and certain. But their words felt heavier, like chains. He was never alone, yet he was nothing without them. </p><p>And yet, instead of breaking free, he whispered into the silence:</p><p><em>&#8220;Grok, how do I fix my life?&#8221;</em></p><p>The cursor blinked. The answer began to appear.<br>And so, the eternal cycle continued.</p>]]></content:encoded></item><item><title><![CDATA[The Gospel of Tech Domination: A Guide to Big Tech’s Evil]]></title><description><![CDATA[Why every click, scroll, and &#8220;like&#8221; feeds the machine, and how we mistook addiction for innovation.]]></description><link>https://ravigokulgandhi.com/p/the-gospel-of-tech-domination-a-guide</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/the-gospel-of-tech-domination-a-guide</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Fri, 26 Sep 2025 20:38:36 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6000" height="4000" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4000,&quot;width&quot;:6000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a long hallway with many doors&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a long hallway with many doors" title="a long hallway with many doors" srcset="https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1659474122020-3c6d4fbe2792?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyMHx8dGVjaCUyMHByaXNvbiUyMG1pbmR8ZW58MHx8fHwxNzU4OTE4OTQ3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lanceanderson">Lance Anderson</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><p>We like to think of Big Tech as progress. Tools that make us faster, smarter, more connected. But strip away the PR, the glossy keynotes, and the &#8220;we&#8217;re changing the world&#8221; slogans &#8212; what you&#8217;ll find underneath is far simpler: control.</p><p>These companies don&#8217;t innovate for your benefit. They innovate for your dependence. Their genius isn&#8217;t in the code or the design. It&#8217;s in the manipulation. The real product isn&#8217;t the app, the cloud, or the device. The real product is you.</p><p>And the most efficient prison is the one you don&#8217;t realize you&#8217;re in. Big Tech doesn&#8217;t need walls or bars &#8212; it turns your own habits, your own curiosity, into the cage. You carry the prison in your pocket, unlock it with a fingerprint, and even thank it for the privilege.</p><p>Here&#8217;s the uncomfortable truth: each platform has perfected its own scam. And you&#8217;ve probably volunteered for every single one.</p><h2>Microsoft &#8212; The Black Hole</h2><p>Microsoft doesn&#8217;t innovate. They wait, watch, and then absorb. It&#8217;s like watching a black hole &#8212; except instead of swallowing stars, it swallows your company&#8217;s soul. First, they give you just enough licenses to think you&#8217;re in control. Then, they lock you in with Entra, Intune, Defender, Purview &#8212; the whole buffet of acronyms. And now? Copilot. The shiny AI sidekick that suddenly outranks every product roadmap, every feature, every priority inside Redmond. Copilot isn&#8217;t about helping you work smarter. It&#8217;s about making sure every click, keystroke, and document flows through Microsoft&#8217;s gravitational pull. People think they&#8217;re adopting &#8216;Zero Trust,&#8217; but the only thing Microsoft trusts is its own monopoly. Evil? No. Evil implies passion. This is colder. It&#8217;s algorithmic domination. And the best part? Everyone signs the contract with a smile. Stockholm Syndrome, enterprise edition.</p><h2>Google &#8212; The Religion</h2><p>Google&#8217;s not a company, it&#8217;s a religion. You don&#8217;t &#8216;use&#8217; Google &#8212; you confess to it. Every search, every map click, every Gmail thread is a prayer offered to the algorithmic gods of Mountain View. And the tithe? Google Ads. They don&#8217;t just sell you; they auction your soul in real-time bidding wars.</p><p>Workspace? That&#8217;s not productivity. That&#8217;s training wheels to make sure your entire company runs inside their confessional booth. Google Maps? It&#8217;s not navigation. It&#8217;s surveillance with directions. Every place you&#8217;ve ever been, every route you&#8217;ve ever taken &#8212; all absorbed into the holy data lake.</p><p>And Fitbit? That wasn&#8217;t about health. That was about harvesting heartbeats, sleep cycles, and stress levels just to upsell you Pixel hardware disguised as wellness. They don&#8217;t sell products; they sell the illusion of convenience while tethering you tighter to the hive.</p><p>They claimed their motto was &#8216;Don&#8217;t be evil.&#8217; Cute. That&#8217;s like Hannibal Lecter saying, &#8216;Don&#8217;t be hungry.</p><h2>Apple &#8212; The Handcuffs</h2><p>Apple doesn&#8217;t sell devices. They sell a lifestyle tax. You don&#8217;t buy an iPhone &#8212; you lease your self-worth. The genius isn&#8217;t in the hardware, it&#8217;s in the cage. Sleek, polished, beautifully engineered handcuffs. Every cable, every charger, every dongle is a toll for belonging.</p><p>Siri? A glorified voice memo app that still can&#8217;t find a restaurant without sending you to Safari. Apple Watch and Apple Health? Digital participation trophies. They&#8217;ll congratulate you for &#8216;closing your rings&#8217; even if you were standing, sleeping, or inhaling a bag of bacon-laced cheesy fried chips. It&#8217;s not wellness &#8212; it&#8217;s gamified self-delusion with haptics.</p><p>And the best part? People line up overnight just to hand Apple more money for the privilege of being locked in tighter. Cults usually hide their rituals &#8212; Apple puts theirs on a keynote stage, with applause. They don&#8217;t innovate. They curate addiction. And they&#8217;re so good at it that even I can&#8217;t look away.</p><h2>Amazon &#8212; The Smirk</h2><p>Amazon isn&#8217;t a store. It&#8217;s a dependency. They don&#8217;t sell products, they sell the illusion of efficiency while quietly becoming the bloodstream of the internet. AWS isn&#8217;t &#8216;cloud&#8217; &#8212; it&#8217;s the oxygen your company breathes, and Bezos owns the air tank.</p><p>Alexa? A wiretap you voluntarily installed in your kitchen. You think it&#8217;s helping you play music &#8212; really, it&#8217;s logging every command, every sound, every accidental cough in the background. Prime? Not a service, a survival tax. And Prime Day? A manufactured dopamine holiday to remind you who your real god is.</p><p>The smiling arrow on their logo? That&#8217;s not a smile. It&#8217;s a smirk &#8212; because they know you&#8217;ll be back tomorrow, weaker, more addicted, and still paying for Prime like it&#8217;s rent.</p><h2>Meta &#8212; The Dopamine Casino</h2><p>Meta isn&#8217;t about connection. It&#8217;s about control dressed in dopamine. Facebook, Instagram, WhatsApp &#8212; three cages, one master.</p><p>Facebook is a behavioral slot machine. The newsfeed doesn&#8217;t show you reality, it shows you whatever keeps you angry, scrolling, and predictable. Instagram? That&#8217;s not self-expression, it&#8217;s weaponized envy. Filters, reels, and fake perfection packaged into an endless loop designed to mine your insecurity and sell it to advertisers. WhatsApp? They tell you it&#8217;s end-to-end encrypted, but the real gold is metadata: who you talk to, when, how often, and from where. The words are noise &#8212; the patterns are profit.</p><p>The scam is elegance itself: they don&#8217;t dominate by building community. They dominate by exploiting loneliness. Likes, hearts, blue ticks &#8212; tiny digital drugs doled out until you can&#8217;t look away.</p><p>&#8216;Connecting the world&#8217;? No. Dissecting it, tagging every nerve ending, and selling the sensation back to you. Meta isn&#8217;t vision. It&#8217;s metastasis.&#8221;</p><h2>Twitter/X &#8212; The Chaos Machine</h2><p>Twitter was never a town square. It was a bar fight with hashtags. Then Elon bought it and rebranded it into &#8216;X&#8217; &#8212; because nothing says vision like naming your company after a variable. The platform isn&#8217;t about free speech; it&#8217;s about engineered outrage. The algorithm doesn&#8217;t reward truth, it rewards conflict. Every tweet is bait, every retweet is proof you took it.</p><p>Now it&#8217;s a billionaire&#8217;s mood swing playground. One week it&#8217;s &#8216;free expression,&#8217; the next it&#8217;s paywalls, verification scams, and rage-bait shoved down your throat. Twitter doesn&#8217;t connect people. It collects chaos, monetizes it, and calls it engagement. The rebrand didn&#8217;t reinvent the platform. It killed the last shred of identity and turned it into a vanity project running on copium and dopamine.&#8221;</p><h2>Netflix &#8212; The Infinite Scroll</h2><p>Netflix isn&#8217;t streaming. It&#8217;s sedation by algorithm. They don&#8217;t curate movies; they shovel content into a conveyor belt until you forget what you even wanted to watch. Their recommendations aren&#8217;t about taste, they&#8217;re about retention. You don&#8217;t pick what to see &#8212; you pick what to tolerate for another 42 minutes.</p><p>The scam? Original shows designed to hook you just long enough to keep your subscription alive, then quietly canceled the second production costs outweigh your attention span. Binge-watching isn&#8217;t convenience. It&#8217;s behavioral conditioning that trains you to sacrifice sleep, productivity, and sanity on their altar of autoplay.</p><p>And the kicker? They convinced you to pay for this cycle of digital junk food, while bragging about how &#8216;you&#8217;re in control.&#8217; Netflix doesn&#8217;t dominate by quality. It dominates by inertia &#8212; and inertia is the most profitable addiction of all.</p><h2>LinkedIn &#8212; The Corporate Cosplay</h2><p>LinkedIn isn&#8217;t a professional network. It&#8217;s corporate cosplay. Everyone&#8217;s either a &#8216;visionary,&#8217; a &#8216;thought leader,&#8217; or a &#8216;growth ninja&#8217; waiting to be endorsed by people they barely know. The algorithm doesn&#8217;t reward truth &#8212; it rewards manufactured hustle and performative vulnerability.</p><p>Endorsements? Digital participation trophies. Recommendations? Mutual hostage notes in better grammar. And the feed? A graveyard of humblebrags, sales pitches disguised as inspiration, and fake stories about baristas who &#8216;taught someone leadership.&#8217; It&#8217;s not networking &#8212; it&#8217;s peacocking.</p><p>The scam? They&#8217;ve gamified your career into content, trapped you into constant personal branding, and convinced you that if you&#8217;re not posting, you&#8217;re invisible. LinkedIn doesn&#8217;t connect professionals. It commoditizes them &#8212; one buzzword post at a time.</p><h2>Reddit &#8212; The Karma Scam</h2><p>Reddit isn&#8217;t democracy. It&#8217;s a behavioral lab running on fake internet currency. Karma points are the scam &#8212; worthless digital tokens that people treat like gold inside the hive. They don&#8217;t unlock anything, they don&#8217;t matter outside Reddit, but inside? They&#8217;re power, leverage, and ego steroids.</p><p>You don&#8217;t post for community. You post for Karma pellets &#8212; meaningless numbers that trick your brain into thinking you matter. Subreddits aren&#8217;t open forums; they&#8217;re fiefdoms policed by unpaid moderators who enforce echo chambers under the illusion of &#8216;community rules.&#8217;</p><p>The scam? Reddit doesn&#8217;t need ads to own you. They crowdsource moderation, gamify validation, and let users harvest themselves. You think you&#8217;re free because you&#8217;re anonymous, but really you&#8217;re just another lab rat refreshing for pellets in a digital Skinner box.</p><h2>Starbucks &#8212; The Pumpkin Cult</h2><p>Starbucks doesn&#8217;t sell coffee. They sell sugar disguised as culture. The Pumpkin Spice Latte isn&#8217;t a drink &#8212; it&#8217;s a marketing virus that infects every fall. People line up like it&#8217;s liquid religion, clutching their orange cups as if cinnamon syrup somehow makes them special. It&#8217;s not Halloween spirit, it&#8217;s seasonal Stockholm Syndrome.</p><p>The scam? Seasonal scarcity. They invent artificial hype, convince you your life isn&#8217;t complete without a $7 dessert in a paper cup, and then vanish it until next year to keep the cult alive. The drinks don&#8217;t fuel productivity. They fuel Instagram posts with foam art. Starbucks doesn&#8217;t dominate because their coffee is good. They dominate because they turned caffeine into a fashion accessory and self-delusion into a lifestyle brand.</p><h2>Oracle &#8212; The Fossil</h2><p>Oracle isn&#8217;t technology. It&#8217;s a tollbooth fossil from the database Stone Age that refuses to die. They don&#8217;t sell software &#8212; they sell contracts so dense they make black holes look transparent. Their business model isn&#8217;t innovation, it&#8217;s litigation. Buy their database and congratulations &#8212; you&#8217;ve just married Larry Ellison in a prenup you&#8217;ll never escape.</p><p>The scam? They convince companies that complexity equals sophistication, then lock them into licenses so expensive they&#8217;d make a loan shark blush. Their acquisitions? Grave robberies. They bought MySQL, a symbol of open-source freedom, and shackled it. They bought Java, then sued Google over it &#8212; proving they see code less as innovation and more as ammunition.</p><p>While everyone else chases AI or the cloud, Oracle just sharpens the claws on their lawyers. They don&#8217;t need to dominate with products. They dominate with paperwork. Oracle isn&#8217;t a tech company. It&#8217;s a legal department with a side hustle in databases.</p><h2><strong>How to Digital Detox</strong> </h2><p>The only way to save yourself from Big Tech is to stop worshipping at their altars. Buy your own hardware &#8212; servers, switches, storage, routers &#8212; and run your digital life like a sovereign state instead of renting it from Microsoft and Google. Cut the noise: use Signal for messaging, Proton Mail for email, and starve the algorithms of your personal data. Replace Starbucks swill with a Breville or Nespresso at home, using beans that aren&#8217;t soaked in marketing lies but actually sourced with ethics intact. And when you need a dopamine hit, don&#8217;t scroll &#8212; go analog. Pick a film and hit an IMAX or PVR once in a while. It&#8217;s not about rejecting technology, it&#8217;s about rejecting the leash.</p>]]></content:encoded></item><item><title><![CDATA[Remembering My Father, Pravin Kumar Gokulgandhi]]></title><description><![CDATA[On 11th August 2025, my father, Pravin Kumar Gokulgandhi, left this world in Mumbai, the same city where his journey began.]]></description><link>https://ravigokulgandhi.com/p/remembering-my-father-pravin-kumar</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/remembering-my-father-pravin-kumar</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Wed, 20 Aug 2025 20:36:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0kxk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0kxk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0kxk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0kxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg" width="514" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:514,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:123053,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://ravigokulgandhi.com/i/171508086?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0kxk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0kxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ac0a4db-dca8-4116-96ae-4dddc0f05f00_514x811.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>On 11th August 2025, my father, <strong>Pravin Kumar Gokulgandhi</strong>, left this world in Mumbai, the same city where his journey began. While his passing leaves a void that can never truly be filled, his life continues to inspire us in countless ways.</p><p>Born and raised in Mumbai, he lived a life defined by courage, resilience, and vision. A self-made entrepreneur, he built a successful <strong>Cotton Trading and Export Corporation</strong> through sheer determination and hard work. His expertise and integrity in business earned him not only success but also the respect of peers and the admiration of many in our community.</p><p>Yet beyond his professional accomplishments, what truly set him apart were his <strong>values</strong>. He taught me empathy and courage&#8212;the two qualities he believed every successful entrepreneur, and indeed every person, must carry. Those lessons remain etched in my heart and will guide me for the rest of my life.</p><p>My father was also a man of passions. A true foodie, he delighted in cuisines from every corner of India, always eager to explore flavors and share meals with loved ones. He carried a deep sense of responsibility toward society as well, often supporting charitable events, especially <strong>food drives</strong>, because he believed success was measured not only in wealth but in generosity.</p><p>One of the qualities I admired most was how gracefully he <strong>balanced work and family</strong>. Despite the demands of running a business, he always made time for us&#8212;showing that success at work should never come at the cost of family. His presence at family gatherings, his ability to listen, and his joy in small moments made us feel valued and loved. His <strong>passion for reading and lifelong learning</strong> was equally remarkable; he never stopped seeking new ideas, new perspectives, and new knowledge, inspiring us to do the same.</p><p>Above all, he was the pillar of our family. He was the beloved husband of <strong>Pravina Gokulgandhi</strong>; the devoted father of <strong>Bindu Dhamani</strong>, <strong>Raja Gokulgandhi</strong>, and myself, <strong>Ravi Gokulgandhi</strong>; the cherished father-in-law of <strong>Dinesh Dhamani</strong>, <strong>Gayatri Gokulgandhi</strong>, and <strong>Mamta Gokulgandhi</strong>; and the guiding light for his grandchildren&#8212;<strong>Sunny</strong>, <strong>Soham</strong>, <strong>Yash</strong>, <strong>Reeya</strong>, and <strong>Ranveer</strong>. Through his wisdom, kindness, and example, he became not just a father and grandfather, but also a <strong>mentor and role model</strong> for many in our extended family, circle of friends, and community.</p><p>We held a prayer meeting on <strong>14th August 2025</strong>, at Vikhroli, Mumbai, where family and friends gathered to honor his memory. The love and respect shown that day reminded us just how many lives he touched.</p><p>In his honor, we ask that those wishing to pay tribute consider supporting <strong>Akshay Patra</strong>, an organization that provides meals to children and families in need&#8212;something that resonates deeply with his lifelong passion for food and generosity.</p><p>As I write this, I realize that no words can ever truly capture who he was or how much he will be missed. But I hope this serves as a small reminder of a man who lived fully, gave selflessly, and left behind a legacy of love, courage, and compassion.</p><p>Rest in peace, Papa. Your lessons, your laughter, and your love will live on in us forever</p>]]></content:encoded></item><item><title><![CDATA[You bought Copilot to Boost Productivity— Now It’s Time to Un-Sanction Other AI Apps to Prevent Data Exfiltration and Loss]]></title><description><![CDATA[How CISOs Can Leverage Microsoft Purview, Microsoft Defender for Cloud Apps and Endpoint DLP to Secure Data While Empowering Productivity with Copilot]]></description><link>https://ravigokulgandhi.com/p/you-bought-copilot-to-boost-productivity</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/you-bought-copilot-to-boost-productivity</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Tue, 22 Jul 2025 10:22:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BSyY!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc06ac2de-c8b9-48de-8921-58883cb0bb89_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Your organization has invested in Microsoft Copilot to drive productivity inside Microsoft 365&#8217;s secure boundary.<br><br>However, if employees continue to paste and upload regulated or sensitive content into external AI tools like ChatGPT, Gemini, or Perplexity, you face a significant data exfiltration and compliance risk.</p><p><strong>How Copilot Elevates Employee Productivity</strong><br>Microsoft 365 Copilot integrates directly into Word, Excel, PowerPoint, Outlook, and Teams, enabling employees to work faster and smarter without leaving their secure environment. It drafts documents, summarizes lengthy threads, analyzes data, and generates presentations in seconds, turning routine tasks into high&#8209;value outputs. By reducing time spent on repetitive work and providing instant AI&#8209;driven insights, Copilot allows your workforce to focus on decision&#8209;making, innovation, and strategic initiatives&#8212;delivering measurable productivity gains across the organization.<br><br><strong>CISOs must now actively unsanction those external AI services and use Microsoft Purview to enforce data governance, ensuring sensitive data stays protected while users enjoy AI benefits inside Copilot.<br><br>Why This Matters for a CISO</strong></p><ul><li><p><strong>Explosion of Shadow AI:</strong> Employees often experiment with public AI apps, unaware that pasting regulated content outside your tenant violates compliance.</p></li><li><p><strong>Regulatory and Contractual Risks:</strong> Financial, healthcare, or export&#8209;controlled data can&#8217;t legally leave your controlled environment.</p></li><li><p><strong>You Already Paid for Copilot:</strong> Copilot runs within your Microsoft 365 tenant, respecting your DLP, sensitivity labels, and retention policies&#8212;so there&#8217;s no need for risky external tools.</p></li></ul><h3><strong>The Strategic Response</strong></h3><p>To prevent sensitive information from leaking into unsanctioned AI tools, you need a layered approach that combines Microsoft&#8217;s native security and compliance capabilities. <strong>Microsoft Purview</strong> provides information protection through sensitivity labels, encryption, and automated data classification, ensuring regulatory content is identified and governed wherever it lives. <strong>Microsoft Defender for Cloud Apps</strong> acts as your cloud access security broker, giving you visibility and control over user interactions with SaaS applications&#8212;allowing you to block or unsanction risky AI services in real time. Complementing these, <strong>Endpoint Data Loss Prevention (Endpoint DLP)</strong> extends your policies down to the device level, controlling actions like copy&#8209;paste, printing, or uploading sensitive content from Office apps to unmanaged browsers or apps. Together, these tools create a unified, enterprise&#8209;grade defense that aligns productivity with strict data governance.</p><p><strong>Step 1: Leverage What You Already Have &#8211; Purview Information Protection</strong></p><ul><li><p>Label sensitive and regulated documents (auto or manual) using Microsoft Purview Sensitivity Labels.</p></li><li><p>Apply encryption and usage rights tied to identity.</p></li></ul><p><strong>Step 2: Implement Endpoint and Cloud Controls</strong></p><ul><li><p><strong>Endpoint DLP:</strong> Block copy/paste, clipboard, and upload actions of labeled content from Office apps to unmanaged browsers or apps.</p></li></ul><p><strong>Defender for Cloud Apps (MCAS):</strong> Unsanction and block domains like <code>chat.openai.com, gemini.google.com, perplexity.ai</code> while monitoring new AI tools.</p><ul><li><p><strong>Conditional Access:</strong> Allow only compliant devices and approved apps to access corporate data.</p></li></ul><p><strong>Step 3: Keep Copilot as the Safe AI Outlet</strong></p><ul><li><p>Copilot runs inside your Microsoft 365 environment and fully respects your MIP/DLP policies.</p></li><li><p>Users can still leverage AI to draft, summarize, and ideate&#8212;without breaking your data governance model.</p></li></ul><h3><strong>What Microsoft License Supports This Functionality</strong></h3><p>To implement these controls, you need the right Microsoft 365 security and compliance licensing.<br>The following license tiers are commonly required:</p><ul><li><p><strong>Microsoft 365 Copilot</strong></p><ul><li><p>Requires Microsoft 365 E3 or E5 (or equivalent)</p></li><li><p>Copilot license per user</p></li></ul></li><li><p><strong>Microsoft Purview Information Protection (Sensitivity Labels &amp; Auto&#8209;Labeling)</strong></p><ul><li><p>Included in Microsoft 365 E3 for basic labeling</p></li><li><p>Advanced features (auto&#8209;labeling, machine learning classifiers) require Microsoft 365 E5 or the Compliance add&#8209;on</p></li></ul></li><li><p><strong>Endpoint Data Loss Prevention (Endpoint DLP)</strong></p><ul><li><p>Requires Microsoft 365 E5</p></li><li><p>Or Microsoft 365 E3 with the Compliance add&#8209;on</p></li></ul></li><li><p><strong>Microsoft Defender for Cloud Apps (MCAS)</strong></p><ul><li><p>Included in Microsoft 365 E5 Security</p></li><li><p>Or available as a standalone license</p></li></ul></li><li><p><strong>Audit (Premium) &amp; Insider Risk Management</strong></p><ul><li><p>Requires Microsoft 365 E5 Compliance</p></li><li><p>Or available as a Compliance add&#8209;on</p></li></ul></li></ul><p>If your organization already runs <strong>Microsoft 365 E5</strong> (or E3 with the appropriate Compliance/Security add&#8209;ons), you have what you need to deploy these controls. Pair this with your Copilot licenses and you&#8217;re ready to govern AI usage effectively.</p><h3><strong>Key Takeaways for CISOs</strong></h3><ul><li><p><strong>Unsanction external AI tools:</strong> Block public AI services like ChatGPT, Gemini, and Perplexity to prevent inadvertent data exfiltration.</p></li><li><p><strong>Leverage Microsoft Purview:</strong> Classify and label regulatory content with sensitivity labels and automated policies.</p></li><li><p><strong>Implement Endpoint DLP:</strong> Control copy&#8209;paste, printing, and upload actions on user devices for labeled content.</p></li><li><p><strong>Use Microsoft Defender for Cloud Apps:</strong> Discover, monitor, and unsanction risky SaaS apps while enabling secure ones.</p></li><li><p><strong>Position Copilot as the approved AI tool:</strong> Empower employees to use AI within the secure Microsoft 365 ecosystem.</p></li><li><p><strong>Validate your licensing:</strong> Ensure E5 or the right Compliance/Security add&#8209;ons are in place to unlock full capabilities.</p></li><li><p><strong>Educate and communicate:</strong> Reinforce policies with clear guidance so users know where AI usage is allowed and why.</p></li></ul><p>Safeguarding your organization&#8217;s data while empowering employees with the right AI tools is no longer optional&#8212;it&#8217;s a board&#8209;level priority. By combining Microsoft Copilot with Purview, Defender for Cloud Apps, and Endpoint DLP, you can unlock AI&#8209;driven productivity without compromising compliance or security. If you&#8217;re ready to implement these controls, assess your current environment, or need tailored guidance on licensing and rollout, I&#8217;d be happy to help.</p><div class="directMessage button" data-attrs="{&quot;userId&quot;:35625543,&quot;userName&quot;:&quot;Ravi Gokulgandhi&quot;,&quot;canDm&quot;:null,&quot;dmUpgradeOptions&quot;:null,&quot;isEditorNode&quot;:true}" data-component-name="DirectMessageToDOM"></div><p>. </p>]]></content:encoded></item><item><title><![CDATA[From “How Do You Make AI Relevant to Humans” to “How Can Humans Stay Relevant in an AI World?]]></title><description><![CDATA[AI is no longer trying to fit into our world &#8212; we&#8217;re now figuring out how to fit into its. The question is no longer "Is AI ready for humans?" but "Are humans ready for AI?"]]></description><link>https://ravigokulgandhi.com/p/from-how-do-you-make-ai-relevant</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/from-how-do-you-make-ai-relevant</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Tue, 24 Jun 2025 09:37:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ClaI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ClaI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ClaI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 424w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 848w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 1272w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ClaI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic" width="768" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79668,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://ravigokulgandhi.com/i/166710458?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ClaI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 424w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 848w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 1272w, https://substackcdn.com/image/fetch/$s_!ClaI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c46f59b-495a-4708-862e-cda6189b3ec7_768x576.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Several weeks ago, I found myself presenting before the board of a rapidly scaling, well-funded hospitality startup. The agenda was strategic: the relevance of AI in their sector, the governance frameworks required to ensure responsible adoption, and the critical success factors necessary for enterprise-wide enablement.</strong></p><p>As I concluded the section on organizational alignment, the Chief Human Resources Officer raised a question that cut through the room with clarity and weight:<br><strong>"How will our employees stay relevant in an AI-driven future?"</strong></p><p>Her question reframed the entire discussion. It surfaced two dimensions that are often underestimated in digital transformation initiatives: <strong>Capability</strong> and <strong>Capacity</strong>.</p><p>Not: <em>Can we adopt AI?</em><br>But: <em>Are our people capable of adopting it&#8212;without demanding more capacity than they can afford to give?</em></p><p></p><div><hr></div><p>That moment lingered with me. It challenged the structure of how we position AI not just as a technological shift, but as a <strong>human transition</strong>. This reflection became the impetus for this piece&#8212;a retrospective on how we must present AI not just as a tool to be mastered, but as a landscape in which <strong>humans must consciously retain their relevance</strong>.</p><p>Not long ago, the dominant narrative in every boardroom, research institution, and innovation summit was singular and urgent:<br><strong>&#8220;How do we make AI relevant to humans?&#8221;</strong></p><p>At that time, AI was the promising newcomer&#8212;novel, intriguing, but fundamentally external to the rhythms of human enterprise. It needed translation, integration, and above all, purpose. We were the architects; it was the raw material.</p><p>But even as organizations debated frameworks, ROI models, and ethical boundaries, AI wasn&#8217;t waiting for approval. It was already inside the enterprise&#8212;<strong>not through sanctioned channels, but through the hands of individual employees quietly solving real problems.</strong></p><p>Tools like <strong>ChatGPT</strong>, <strong>Gemini</strong>, <strong>Claude</strong>, <strong>Grok</strong>, and <strong>Microsoft Copilot</strong> were being used not as part of any formal digital strategy, but as grassroots productivity enhancers. Employees were experimenting, iterating, and often <strong>expensing these tools on personal or discretionary budgets</strong>&#8212;all in pursuit of speed, clarity, and execution.</p><ul><li><p><strong>A product manager</strong> used ChatGPT to summarize technical specs and draft feature announcements faster than the content team could approve them.</p></li><li><p><strong>A marketing analyst</strong> relied on Gemini to conduct multilingual sentiment analysis on customer reviews, bypassing legacy tools that were still under procurement review.</p></li><li><p><strong>A customer success leader</strong> deployed Claude to draft email responses and ticket summaries, reducing response time dramatically&#8212;while raising questions about data leakage.</p></li><li><p><strong>A software engineer</strong> integrated GitHub Copilot into their workflow without IT awareness, increasing code throughput but also introducing non-reviewed suggestions into production pipelines.</p></li><li><p><strong>A communications head</strong> used Grok to auto-generate briefings, bypassing the comms agency entirely for internal memos and stakeholder decks.</p></li></ul><p><strong>In each case, the story was the same:</strong><br>AI became relevant to humans <strong>not because it was mandated</strong>, but because it delivered measurable results&#8212;fast. The enterprise didn&#8217;t adopt AI.<br><strong>The employees did.</strong></p><p>This quiet revolution didn&#8217;t start with policy.<br>It started with pain points&#8212;manual tasks, slow approvals, content bottlenecks&#8212;and tools that felt like superpowers.</p><p>And that is where governance must now catch up&#8212;not to restrict, but to reorient.<br>Because the very systems we once built to guide transformation may already be trailing the transformation itself. </p><p>For a deeper dive on how AI tools have entered the enterprise via shadow IT, refer to my companion essay linked to this post..</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;681368d7-1a40-4f10-88ab-4d98f9d80200&quot;,&quot;caption&quot;:&quot;Taming Shadow AI: Governance for a Secure, Innovative Future&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Shadow IT 2.0: The Compliance and Regulatory Risks of Unsanctioned AI&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:35625543,&quot;name&quot;:&quot;Ravi Gokulgandhi&quot;,&quot;bio&quot;:&quot;Microsoft Digital Workplace Specialist || Workplace Security Architect || Microsoft Defender Expert || Microsoft Entra Specialist || Apple for Enterprise&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31553df4-0172-433a-a86c-b32bb12ae93e_1287x965.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-14T13:00:55.435Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4386f6e-5eaa-4900-b6d0-44e514c28f1e_1024x768.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://ravigokulgandhi.com/p/shadow-it-20-the-compliance-and-regulatory&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:163548049,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Raviosaurus&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BSyY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc06ac2de-c8b9-48de-8921-58883cb0bb89_1280x1280.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p></p><p>What began as quiet experimentation at the edges has now become a force at the core of enterprise decision-making. And so, the narrative has inverted.</p><p><br>Now the question, increasingly urgent and uncomfortably personal, is:<br><strong>&#8220;How do humans stay relevant in an AI-dominated world?&#8221;</strong></p><p>This isn&#8217;t a mere shift in phrasing&#8212;it is a tectonic shift in power dynamics. We are witnessing a silent, yet undeniable rebalancing between tool and operator, between the creator and the increasingly autonomous creation.</p><p>We begin with what I refer to as <strong>Phase One: The Exploration Era&#8212;Making AI Relevant to Humans</strong>.</p><p>In this period, artificial intelligence was a concept of promise, yet one requiring deliberate human-centered engineering to find its footing. The early manifestations&#8212;such as virtual assistants struggling to process basic voice commands or rudimentary recommendation systems that failed to understand nuance&#8212;were clear indicators of a nascent technology still seeking context.</p><p>The dominant themes of that era were not speculative&#8212;they were deliberate:</p><ul><li><p>The pursuit of <strong>human-centered design</strong> to ensure usability</p></li><li><p>The advancement of <strong>natural language processing</strong> to bridge interaction barriers</p></li><li><p>The development of <strong>explainable AI</strong> to foster trust in opaque algorithms</p></li><li><p>The alignment of AI with targeted, real-world use cases in domains like healthcare and education</p></li></ul><p>At its core, the mission was defined and specific:<br><strong>To bridge the intelligence gap between silicon and soul.</strong></p><p>But, as we all know, the landscape evolved&#8212;rapidly.</p><p><strong>Then came the inflection point. The moment of transformation.</strong></p><p>With the emergence of <strong>transformer models</strong>, <strong>generative AI</strong>, <strong>zero-shot learning</strong>, and <strong>multimodal intelligence</strong>, we moved&#8212;definitively&#8212;from assistive to autonomous systems.</p><p>Let the record show:</p><ul><li><p>AI ceased to merely assist&#8212;it began to <strong>create</strong></p></li><li><p>It stopped waiting for commands&#8212;it began to <strong>optimize independently</strong></p></li><li><p>It didn&#8217;t just understand language&#8212;it <strong>outperformed humans</strong> in generating it</p></li></ul><p>This was not incremental progress. This was structural redefinition.<br>The balance of control and cognition began to shift&#8212;subtly, yet irreversibly.</p><p>Which brings us to <strong>Phase Two: The Present Reality&#8212;Making Humans Relevant in an AI-Dominated World.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6016" height="4016" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4016,&quot;width&quot;:6016,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;group of people sitting beside rectangular wooden table with laptops&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="group of people sitting beside rectangular wooden table with laptops" title="group of people sitting beside rectangular wooden table with laptops" srcset="https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxib2FyZCUyMG1lZXRpbmd8ZW58MHx8fHwxNzUwNzU3NjY2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Christina @ wocintechchat.com</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><div><hr></div><p>Today, the question is not whether AI can serve us. It already does&#8212;and often more efficiently.<br>The question now is:<br><strong>What can we do that AI cannot?</strong></p><p>This is not a rhetorical inquiry. It is an existential challenge for modern leadership and enterprise.</p><p>To remain relevant, we must now <strong>rediscover and defend our human edge</strong>. And that edge is built on dimensions that, at least for now, remain uniquely ours:</p><ol><li><p><strong>Judgment over Data</strong><br>AI processes logic; humans navigate ambiguity. We are the arbiters when data collides with morality, nuance, or conflicting truths.</p></li><li><p><strong>Emotional Intelligence</strong><br>Empathy cannot be computed. Humans build trust, negotiate complexity, and resolve tension in ways no model can replicate.</p></li><li><p><strong>Contextual Creativity</strong><br>AI rearranges. We originate. True innovation demands a spark that is neither sourced from datasets nor trained from prior patterns.</p></li><li><p><strong>Moral Reasoning</strong><br>Ethical decisions do not come from code. They come from conscience. Leadership in the age of AI must involve human-defined boundaries and human-enforced responsibility.</p></li><li><p><strong>Curiosity and Meaning</strong><br>AI answers the "what"; only we ask the "why". The pursuit of meaning&#8212;of purpose&#8212;remains distinctly human. And in a world of infinite automation, that may be our greatest differentiator.</p></li></ol><p>To bring this challenge into sharper focus, consider how AI is already being embedded into specialized industries&#8212;not to replace human judgment, but to accelerate and expand the scope of decision-making. These are not hypothetical use cases; they are real shifts already reshaping enterprise operations:</p><p><strong>1. Financial Services &#8211; Anti-Money Laundering (AML):</strong><br>A global AML technology company deployed AI models to move beyond traditional rules-based monitoring systems. Instead of merely flagging transactions that crossed static thresholds, the AI began analyzing behavioral patterns, geographic anomalies, and social network signals.<br>By using <strong>unsupervised learning and anomaly detection</strong>, the system uncovered money laundering patterns embedded in shell company networks and nested transactions that legacy tools routinely missed.<br>Yet, the final decision to escalate still rested with a human analyst&#8212;one who had to weigh <strong>legal nuance, geopolitical context, and ethical implications</strong> that no algorithm could conclusively resolve.</p><p><strong>2. Manufacturing &amp; Logistics &#8211; AI Agents and Multi-Agent Control Platforms (MCP):</strong><br>In the manufacturing sector, AI agents embedded within MCPs (multi-agent control platforms) were deployed to manage <strong>predictive logistics</strong> and <strong>dynamic rerouting of supply chains</strong>. These agents could negotiate with each other in real time&#8212;autonomously adjusting procurement schedules, rerouting shipments during geopolitical disruptions, and allocating warehouse space based on just-in-time demand models.<br>The result: efficiency gains that cut lead times by double-digit percentages.<br>But it was <strong>plant managers and logistics officers</strong> who had to reconcile AI-suggested decisions with <strong>human factors&#8212;labor disputes, union schedules, cross-border regulations&#8212;that no system had full visibility into.</strong></p><p><strong>3. Legal &amp; Compliance &#8211; Paralegals and AI in Case Preparation:</strong><br>In high-volume litigation firms, AI is now routinely used to process massive repositories of case law, contracts, and historical filings. Paralegals and lawyers use tools like <strong>Claude, CoCounsel, and Copilot extensions for Microsoft Word </strong>to extract relevant clauses, summarize opposing arguments, and even simulate counterpoints.<br>This reduced what once took weeks into hours.<br>But again, the AI could only <strong>highlight patterns</strong>. The <strong>strategy, persuasion, and moral responsibility</strong> behind legal arguments remained firmly in the hands of the human counsel.</p><p>Each of these examples underscores the same truth:<br><strong>AI extends our reach&#8212;but it cannot define our principles, our purpose, or our humanity.</strong><br>That is, and must remain, the domain of human leadership.</p><p><strong>In conclusion, I submit to this board not a verdict, but a call to leadership.</strong></p><p>The rise of AI is not a threat&#8212;it is a mirror. It reflects what can be automated, what can be accelerated, and most importantly, <strong>what must be redefined</strong>.</p><p>If the goal is to remain relevant in a world where machines execute with precision, scale, and speed, then the human workforce must evolve not by resisting the machine, but by <strong>reclaiming what it means to be human in a machine-augmented world.</strong></p><p>That evolution starts with <strong>capability transformation</strong>.<br>Our people must move beyond routine execution and embrace roles that demand <strong>judgment, creativity, ethics, and context</strong>&#8212;the very attributes machines cannot replicate.</p><p>But capability alone is not enough.<br>Organizations must foster a <strong>culture of coexistence</strong>&#8212;one where humans and AI are not in competition, but in <strong>strategic partnership</strong>. A culture where asking for AI assistance is not seen as outsourcing thinking, but as <strong>amplifying it</strong>.</p><p>To do this, I propose three immediate imperatives:</p><ol><li><p><strong>Retire legacy roles that reward repetition over relevance.</strong><br>Monotonous work that can be automated should be&#8212;and those resources must be redirected toward higher-order thinking, problem-solving, and human engagement.</p></li><li><p><strong>Create new roles and titles that reflect the blended future.</strong><br>We need &#8220;AI Collaboration Designers,&#8221; &#8220;Prompt Architects,&#8221; &#8220;Ethical Automation Leads,&#8221; and &#8220;Cognitive Workflow Strategists.&#8221; These are not buzzwords&#8212;they are the roles that will define competitive advantage.</p></li><li><p><strong>Invest not just in tools&#8212;but in transformation.</strong><br>Train your workforce to not merely use AI, but to <strong>interrogate it</strong>, <strong>collaborate with it</strong>, and <strong>govern it</strong>. This is not digital literacy; it is enterprise survival.</p></li></ol><p>Because in the final analysis, the question is not whether AI will take our jobs.<br>The question is whether we are willing to <strong>give up the parts of our work that no longer require a human</strong>, so we can <strong>double down on the parts that only a human can do.</strong></p><p>That is the new relevance.<br>And that is the leadership we must now demonstrate.</p>]]></content:encoded></item><item><title><![CDATA[Shadow IT 2.0: The Compliance and Regulatory Risks of Unsanctioned AI]]></title><description><![CDATA[A Strategic View on Policy Gaps, Exposure Points, and Remediation Priorities]]></description><link>https://ravigokulgandhi.com/p/shadow-it-20-the-compliance-and-regulatory</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/shadow-it-20-the-compliance-and-regulatory</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Wed, 14 May 2025 13:00:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a4386f6e-5eaa-4900-b6d0-44e514c28f1e_1024x768.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Taming Shadow AI: Governance for a Secure, Innovative Future</h3><p>Generative AI tools like ChatGPT, Grok, and Claude are transforming workplaces, boosting productivity and creativity. But without oversight, their use creates <em>Shadow AI</em>&#8212;unsanctioned applications that expose sensitive data and threaten compliance. Here&#8217;s how organizations can harness AI&#8217;s potential responsibly:</p><ul><li><p><strong>The Challenge</strong>: Employees adopt AI tools without IT approval, risking data breaches and regulatory violations.</p></li><li><p><strong>The Opportunity</strong>: With robust governance, AI becomes a secure, competitive asset.</p></li><li><p><strong>The Path Forward</strong>: CISOs must build guardrails to enable innovation while ensuring compliance.</p></li></ul><h3>Shadow AI Risks: A Real-World Example</h3><p>Consider <em>HealthNova</em>, a fictional healthcare startup revolutionizing patient diagnostics:</p><ul><li><p><strong>Scenario</strong>: A marketing manager uploads patient feedback, clinical trial data, and competitive insights into a freemium AI tool to craft an investor pitch.</p></li><li><p><strong>Consequences</strong>:</p><ul><li><p>Sensitive data is exposed in a third-party model, outside HealthNova&#8217;s control.</p></li><li><p>Risks include GDPR violations, intellectual property (IP) loss, and eroded investor trust.</p></li><li><p>No enterprise data loss prevention (DLP) or logging hinders breach detection.</p></li></ul></li></ul><p>This case highlights broader Shadow AI risks:</p><ul><li><p><strong>Data Sovereignty</strong>: Processing data in non-compliant jurisdictions (e.g., GDPR, HIPAA).</p></li><li><p><strong>IP Loss</strong>: Proprietary algorithms or strategies absorbed by AI models.</p></li><li><p><strong>Non-Compliance</strong>: Bypassing data classification and retention policies.</p></li><li><p><strong>Legal Liability</strong>: Breaching NDAs or confidentiality agreements.</p></li><li><p><strong>Incident Gaps</strong>: No forensic trail for breach remediation.</p></li><li><p><strong>Cultural Spread</strong>: Risky behavior becomes normalized across teams.</p></li></ul><h3>The Solution: Embrace AI Responsibly</h3><p>Banning AI is impractical&#8212;competitors leveraging it will outpace you. Instead, adopt a proactive strategy:</p><ul><li><p><strong>Enable Innovation</strong>: Use AI for faster proposals, sharper insights, and leaner operations.</p></li><li><p><strong>Embed Trust</strong>: Implement policies and controls to ensure secure, compliant use.</p></li><li><p><strong>Stay Competitive</strong>: Responsible AI adoption drives growth without compromising integrity.</p></li></ul><h3>A Success Story: Secure AI in Action</h3><p><em>TechTrend Innovations</em>, a fictional fintech firm, shows what&#8217;s possible:</p><ul><li><p><strong>Approach</strong>: Deployed an approved AI platform with DLP and mandatory training.</p></li><li><p><strong>Results</strong>:</p><ul><li><p>Reduced proposal drafting time by 40%.</p></li><li><p>Ensured no sensitive data left secure environments.</p></li><li><p>Boosted client satisfaction and industry leadership.</p></li></ul></li><li><p><strong>Lesson</strong>: Secure AI governance unlocks innovation and compliance.</p></li></ul><h3>Enterprise AI Governance Framework</h3><p>To scale AI securely, CISOs must shift from gatekeepers to enablers. The <em>Enterprise AI Governance Framework</em> provides a blueprint:</p><ul><li><p><strong>Core Pillars</strong>:</p><ul><li><p><em><strong>Visibility</strong></em>: Deploy tools to detect and monitor unsanctioned AI usage across endpoints and cloud services.</p></li><li><p><em><strong>Policy &amp; Access Control</strong></em>: Define permitted use cases, data types, and access rules aligned with compliance needs.</p></li><li><p><em><strong>Data Protection</strong></em>: Apply classification, encryption, and DLP to prevent sensitive data exposure.</p></li><li><p><em><strong>Education &amp; Culture</strong></em>: Train employees on responsible AI use, fostering compliance and innovation.</p></li></ul></li><li><p><strong>AI Tool Onboarding Lifecycle</strong>:</p><ul><li><p><em><strong>Discovery &amp; Evaluation</strong></em>: Review AI tools for security and compliance.</p></li><li><p><em><strong>Approval &amp; Registration</strong></em>: Add approved tools to a centralized list with usage guidelines.</p></li><li><p><em><strong>Policy Mapping</strong></em>: Align usage with the Acceptable Use Policy (AUP).</p></li><li><p><em><strong>Employee Training</strong></em>: Mandate training on safe AI practices.</p></li><li><p><em><strong>Continuous Monitoring</strong></em>: Use DLP and CASB tools for real-time oversight.</p></li></ul></li><li><p><strong>Acceptable Use Guidelines</strong>:</p><ul><li><p><em><strong>Permitted</strong></em>: Draft non-sensitive content or automate routine tasks with approved tools.</p></li><li><p><em><strong>Prohibited</strong></em>: Upload PII, IP, financials, or strategic data to unapproved platforms.</p></li><li><p><em><strong>Requirements</strong></em>: Use secure devices and complete training.</p></li></ul></li><li><p><strong>Violation Framework</strong>:</p><ul><li><p><em><strong>Low-Risk</strong> (e.g., generic text uploads)</em>: Warning and retraining.</p></li><li><p><em><strong>Moderate-Risk</strong> (e.g., unapproved tools)</em>: Access revocation and HR notice.</p></li><li><p><em><strong>Severe</strong> (e.g., customer data exposure)</em>: Investigation, potential suspension, or termination.</p></li></ul></li><li><p><strong>Governance Oversight</strong>:</p><ul><li><p>A CISO-led AI Governance Council (Legal, IT, Business Units) meets quarterly to:</p><ul><li><p>Review tools and use cases.</p></li><li><p>Monitor trends and violations.</p></li><li><p>Update policies and training.</p></li></ul></li></ul></li></ul><h3>Act Now: Turn Shadow AI into Opportunity</h3><p>Securing AI is a strategic imperative. Standards like ISO/IEC 42001:2023 guide responsible adoption across industries:</p><ul><li><p><strong>Take Action</strong>: Build a governance model tailored to your risk and compliance needs.</p></li><li><p><strong>Stay Ahead</strong>: Balance innovation with regulatory expectations.</p></li><li><p><strong>Connect with Me</strong>: Reach out on LinkedIn at <a href="https://www.linkedin.com/in/ravigokulgandhi">https://www.linkedin.com/in/ravigokulgandhi</a> to assess your AI posture and align with global best practices.</p></li></ul><p>Let&#8217;s transform Shadow AI into a shining opportunity for secure, scalable innovation.</p>]]></content:encoded></item><item><title><![CDATA[Breaking Free from Microsoft 365 and/or Google Workspace]]></title><description><![CDATA[Why I Chose Proton for Privacy and Control for my Personal and Official emails]]></description><link>https://ravigokulgandhi.com/p/breaking-free-from-microsoft-365</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/breaking-free-from-microsoft-365</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Tue, 24 Sep 2024 17:43:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a7sW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a7sW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a7sW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 424w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 848w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 1272w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a7sW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic" width="1456" height="775" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:775,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:62889,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a7sW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 424w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 848w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 1272w, https://substackcdn.com/image/fetch/$s_!a7sW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69ab2774-f08d-4b67-b2cc-a91c41a7ced3_2670x1422.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Microsoft 365 and Google Workspace is the go-to productivity suite for many, but I recently decided to ditch it in favor of Proton. While Microsoft and Google offers a powerful suite of tools, I found myself increasingly concerned about privacy and data ownership. Here's why I made the switch:</p><p><strong>1. Data Privacy as a Priority:</strong> Microsoft's &amp; Google&#8217;s data collection practices have raised eyebrows over the years. While they claim to prioritize user privacy, their business model still relies heavily on data analysis and targeted advertising. Proton,in contrast, is built with privacy at its core. End-to-end encryption and a strict no-logs policy mean that my data is truly protected from prying eyes, including Proton itself.</p><p><strong>2. Owning My Digital Life:</strong> With Microsoft 365 &amp; Google Workspace, I always felt like my data was residing in someone else's hands. Proton gives me back control. I own my data, and I decide who has access to it. This sense of ownership is crucial in today's digital world.</p><p><strong>3. A Secure Ecosystem, Not Just Email:</strong> Proton offers a comprehensive suite of privacy-focused applications that rival Microsoft 365's &amp; Google Workspace&#8217;s offerings:</p><ul><li><p><strong>Proton Mail:</strong> Secure and private email with end-to-end encryption, unlike Microsoft Outlook, which lacks this crucial feature.</p></li><li><p><strong>Proton Drive:</strong> Encrypted cloud storage that keeps my files confidential and secure.</p></li><li><p><strong>Proton Calendar:</strong> A calendar that protects my schedule and sensitive information with end-to-end encryption,something Microsoft Calendar doesn't offer.</p></li><li><p><strong>Proton VPN:</strong> A VPN service that encrypts my internet connection and adds an extra layer of security when accessing my Proton accounts.</p></li></ul><p><strong>4. Open Source and Transparency:</strong> Proton's commitment to open source further strengthens my trust in their services.Their code is publicly available for scrutiny, ensuring transparency and accountability.</p><p><strong>5. Swiss Jurisdiction:</strong> Proton is based in Switzerland, a country known for its strong privacy laws. This provides an additional layer of legal protection for my data.</p><p><strong>The Transition and What I Learned:</strong></p><p>Switching from Microsoft 365 and Google Workspace to Proton did require some adjustments. Migrating my data and getting used to the new interface took time. There were a few features I initially missed. However, the peace of mind and control I gained over my data far outweigh any minor inconveniences.</p><p><strong>Final Thoughts:</strong></p><p>If you're looking for a privacy-respecting alternative to Microsoft 365 and Google Workspace, I highly recommend Proton. It's a powerful and secure suite of tools that puts you back in control of your digital life. In a world where data is increasingly valuable,Proton provides the peace of mind we all deserve.</p><p><strong>Note:</strong></p><ol><li><p><em>The Proton logo and trademarks are used here for informational and commentary purposes only. This use is believed to constitute fair use under applicable trademark laws.</em></p></li><li><p><em>This blog post is not affiliated with or endorsed by Proton Technologies AG. The Proton logo and trademarks are used for identification and comparison purposes only.</em></p></li></ol>]]></content:encoded></item><item><title><![CDATA[Unlocking ROI: How Small and Medium Businesses Can Leverage Generative AI like Gemini and CoPilot]]></title><description><![CDATA[The AI Advantage: Assessing the ROI of Gemini and CoPilot for SMBs and Emerging Enterprises]]></description><link>https://ravigokulgandhi.com/p/unlocking-roi-how-small-and-medium</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/unlocking-roi-how-small-and-medium</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Thu, 01 Aug 2024 18:46:38 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="3000" height="2500" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2500,&quot;width&quot;:3000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a computer chip with the letter a on top of it&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a computer chip with the letter a on top of it" title="a computer chip with the letter a on top of it" srcset="https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1697577418970-95d99b5a55cf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MXx8YWklMjBjb3N0JTIwc2F2aW5nc3xlbnwwfHx8fDE3MjI1Mzc3Mjd8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Igor Omilaev</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><p>In today's rapidly evolving technological landscape, small and medium businesses (SMBs) are constantly seeking innovative ways to gain a competitive edge. One of the most promising advancements is generative AI, exemplified by platforms like Gemini and CoPilot. These AI systems have the potential to revolutionize how businesses operate, offering solutions that range from customer service automation to creative content generation. However, investing in such cutting-edge technology requires a clear understanding of its potential return on investment (ROI). This blog will explore how SMBs can unlock the full potential of generative AI, demonstrating its practical applications and providing a roadmap for assessing its impact on the bottom line. Whether you're a small business owner or a decision-maker in a medium-sized enterprise, this guide will help you navigate the complexities of integrating AI tools like Gemini and CoPilot into your business strategy, ultimately maximizing your ROI.</p><p>Before we delve into the ROI for onboarding these tools in your organization, let&#8217;s understand the costs associated when implementing these tools and platforms. </p><ol><li><p><strong>Software and Licensing Fees</strong> - These can range from a few dollars per user per month to larger enterprise licensing fees, depending on the AI platform and the plan chosen. For example, CoPilot offers different subscription tiers, and GitHub Copilot typically charges per user. Enterprise-level solutions, like those from OpenAI for business, may come with custom pricing. Enterprise grade platforms like Microsoft CoPilot and Google Gemini charge $20 and $30 USD per user/month, one-year commitment depending upon if you buy Business or Enterprise SKU.   Microsoft CoPilot comes at $30.00 per user/month for Business SKU.  These SKUs require underlying licenses for Google Workspace and Microsoft 365 Business Basic, Standard or Premium which comes at an additional costs. </p><p><strong>Caution</strong>: As a small business, if you are using digital workplace platforms other than Google or Microsoft, these tools may not support those platforms without having the underlying licenses in place. </p></li><li><p><strong>API Access Fees:</strong> If the generative AI services are accessed via APIs, there may be charges based on usage (e.g., number of requests or volume of data processed). The use case here are very specific to your homegrown applications, or third party applications that can integrate with Generative AI that consume these platform via API, that can be charged per bulk consumption.</p><p><strong>Caution</strong>: Familiarize yourself with the pricing structure of the AI service provider. This usually includes costs based on API calls, data volume, or usage time. For some use cases, consider open-source AI models that can be hosted and customized on your own infrastructure, which may reduce API costs. </p></li><li><p><strong>Implementation and Integration:</strong>  Costs for consulting services to assist with the integration of AI solutions into existing systems and workflows. This could include custom development, API integration, and tailoring the AI models to specific business needs.</p></li><li><p><strong>Training</strong>: Costs associated with training staff to use the new AI tools effectively. This may include formal training programs, workshops, and online courses. Development of internal documentation, guidelines, and resources to help employees understand and leverage the new AI systems.</p></li><li><p><strong>Legal and Compliance: </strong>Costs for ensuring compliance with data protection regulations and addressing legal concerns related to AI use, such as intellectual property issues. Additional Expenses for conducting audits to ensure that the AI systems adhere to relevant legal and ethical standards. This cloud include implementation of DLP tool, and/or monitoring tool to avoid misuse of your generative AI platform. </p><p></p></li></ol><p>Once we have the total cost of ownership in place, the next step is to identity the benefit parameters and associate quantifiable financial benefit to it. </p><p><strong>Quantifiable Benefits:</strong></p><ul><li><p><strong>Cost Savings:</strong> Reduction in labor costs due to automation, decreased error rates, and improved operational efficiency. This may not be necessarily around reducing labor force, but slowing down the hiring of additional labor force, while increasing your workload inline with your sales revenue.   Your existing force may be able to do more with the tool than they are doing today.  For E.g. a Sales Manager would be able to create faster quotes, a business analyst may be able to run quick analysis on the problem statement, or a paralegal may be able to processes historic case data, and current case data faster without going through tons of documentation.  </p></li><li><p><strong>Revenue Increase:</strong> Potential for increased sales through improved customer experiences or new product offerings. These generative AI tools help you analyze customer interaction in your emails, CRM, ITSM, and other apps that helps you identify opportunities to increase your revenue with the customer. </p></li><li><p><strong>Productivity Gains:</strong> Enhanced productivity through faster processing times and improved decision-making capabilities. An average information workers leverages several resources at their disposal, before delivering their work. A sales manager could be going through customer info internally on their system as well as externally on various portals.  Tools like CoPilot or Gemini can help them create a summary of past interaction, behavior patterns, and create more relevant proposals and presentation in a short time.  Underwriters can query copilot for previous resolutions on several issues and leverage them on their decision making, instead of repeatedly referring to their next levels.  The productivity gains are derived from these information workers doing more within available resources. </p></li></ul><p><strong>Qualitative Benefits</strong></p><ul><li><p><strong>Improved Customer Satisfaction:</strong> Enhanced customer interactions and faster response times.  Providing faster response to customer using both self services, as well as assisted support can result into higher customer satisfaction. A survey released recently shows higher CSAT when used generative AI supported customer service, as compared to basic knowledge base driven.  This was visible in the various NPS Survey where more people chose to recommend their products and services when they had faster access to information or support they wanted. </p></li><li><p><strong>Brand Reputation:</strong> Strengthening the brand as an innovator and leader in technology adoption. This is directly linked to Improved Customer Satisfaction, as more and more customer would act as brand ambassador through various channels.  From reviewing their product and services on mobile app stores to providing testimonial, all this is an indirect result of improved customer service. </p></li><li><p><strong>Employee Satisfaction:</strong> Reduction of mundane tasks, allowing employees to focus on more engaging and strategic activities. Nothing demotivates an employee more than mundane &amp; repetitive  tasks, and lack of budget to custom automate them. Generative AI has been considerably useful when automating these tasks via CoPilot or Gemini. E.g. when a sales person has to provide competition analysis of various products and services they offer, a simple prompt to CoPilot or Gemini shows them the equivalent competition products, and their USPs. A procurement leader creates various prompts about spend comparison of the companies of their level before negotiating with their vendors and partners. </p></li></ul><p>To determine the return on investment (ROI) of implementing generative AI tools like Gemini and CoPilot, it's crucial to quantify both the tangible and intangible benefits. Tangible benefits, such as time savings and increased revenue, can be easily converted into dollar values. However, intangible benefits, such as improved customer satisfaction, require a more indirect approach, like estimating their impact on customer retention or lifetime value.</p><p>It's also important to consider the inherent variability and uncertainty in any cost-benefit analysis. Factors like fluctuating costs, unpredictable market conditions, or unexpected events (like a pandemic or war) can significantly influence the outcome. Conducting a sensitivity analysis can help you understand how changes in key assumptions affect the ROI,giving you a clearer picture of the risks involved.</p><p>For instance, consider a scenario where employees working remotely have limited access to training resources.Generative AI tools can empower them to create drafts and deliverables independently, bridging the knowledge gap and ensuring productivity even in challenging circumstances.</p><p>If you're a small or emerging business looking for an unbiased assessment of the potential ROI of generative AI for your organization, don't hesitate to reach out. I can help you create a tailored business case that aligns with your specific goals and needs.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Unlocking Success in the AI Revolution: The 10 Must-Have Apps and IPs for Digital Workplace Practices]]></title><description><![CDATA[Revolutionize Digital Workplace Service Offerings -How Integrating AI-Powered Apps Transforms Operations, Elevates Employee & Customer Experiences, and Ensures Relevance in the Age of AI]]></description><link>https://ravigokulgandhi.com/p/unlocking-success-in-the-ai-revolution</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/unlocking-success-in-the-ai-revolution</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Fri, 05 Jan 2024 09:41:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XNPd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XNPd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XNPd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XNPd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2010801,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XNPd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!XNPd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F023104ba-3813-4244-84bf-16dec32f0d3f_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The impact of AI on the way IT companies sell Digital Workplace Services is profound and multifaceted. AI has the potential to significantly transform how these services are marketed, delivered, and perceived by clients. AI is reshaping the way IT companies sell Digital Workplace Services by enabling greater personalization, efficiency, security, and client education. It allows companies to offer more value-added services and positions them as partners in their client's digital transformation journey.</p><p>The absence of AI in Digital Workplace Technology solutions can result in competitive disadvantages, inefficiencies, security risks, and challenges in meeting evolving client expectations. Embracing AI is increasingly essential for staying competitive and providing valuable, innovative solutions in the digital workplace ecosystem.</p><p>Creating AI-powered apps for the digital workplace is an excellent strategy to stay relevant in the emerging AI revolution. Here are ten such apps that digital workplace practices in Global System Integrators can develop:</p><ol><li><p><strong>AI-Powered Virtual Onboarding</strong> - Organizations should build apps that provide personalized onboarding experiences using AI, offering new employees tailored resources, training modules, and assistance during their initial days. AI Powered Persona Driven content that are tailored for roles and relevance of the employee. </p></li><li><p><strong>AI-Driven Employee Wellness</strong> - Organizations should focus on developing wellness apps that leverage AI to monitor and provide recommendations for employee health and well-being, including stress management and ergonomics. Integration with OEMs like Apple, Garmin &amp; Fitbit would be an added advantage. Develop wellness apps that leverage AI to monitor and provide recommendations for employee health and well-being, including stress management and ergonomics. Providing constant reminder that productivity is directly proportional to good physical and mental health. </p></li><li><p><strong>AI-Integrated Document Management</strong> - Create an AI-driven tool that automates the creation of documents, reports, and presentations, saving time and ensuring consistency in content. The tool should also use AI to automatically categorize, tag, and secure sensitive documents, ensuring compliance and efficient retrieval.</p></li><li><p><strong>AI-Enhanced Employee Support</strong> - AI-driven employee support apps, including HR chatbots, benefits information, and self-service tools for addressing common workplace queries. </p></li><li><p><strong>AI-Driven Time Management</strong> - There are several tools for time tracking, but using AI for time management is a game changer to create a work life balance by analyzing work patterns, suggest time-saving strategies, and prioritize tasks for employees to maximize productivity.</p></li><li><p><strong>AI-Driven Predictive Maintenance</strong>: - Create an app that uses AI and IoT sensors to predict equipment maintenance needs, reducing downtime and optimizing asset management. The End User Computing Devices should predict end of life, maintenance and hardware refresh. </p></li><li><p><strong>IP Portfolio Management - </strong>Organizations and its employees constantly create IPs and Copyright materials, and creating a comprehensive IP portfolio management application that uses AI to track plagiarism, patents, trademarks, copyrights, and trade secrets. This reduces significant amount of review time post creation of IP and provides faster time to patent and trademark. <strong> </strong></p></li><li><p><strong>AI-Powered Patent Search &amp; Prior Art Analysis - </strong>Leverage and Integrate AI to enhance patent searches, making it faster and more accurate. Users can search for relevant patents, analyze prior art, and assess patentability. It can also use natural language processing (NLP) to analyze large volumes of documents to identify potential prior art for patent applications. Organizations in healthcare, media &amp; entertainment, and aviation and aerospace industries can make the most use of it. </p></li><li><p><strong>AI Enhanced Lab Environment Creation - </strong>Create AI based app to harness the automation of creating Digital Workplace Labs on the cloud by streamlining various aspects of the process. From analyzing requirements and recommending suitable cloud configurations to provisioning resources, optimizing configurations, and ensuring security and compliance, AI plays a pivotal role. It continuously monitors lab performance, automatically scales resources, and provides user support through chatbots. Additionally, AI analyzes user behavior for insights and cost-saving opportunities, automates data backup and recovery, and generates comprehensive documentation and reports. This holistic integration of AI not only enhances efficiency but also ensures a responsive, secure, and cost-effective Digital Workplace Lab environment in the cloud, ultimately benefiting both organizations and their users.</p></li><li><p><strong>AI-Enhanced Virtual Assistants</strong>: - This may sound cliche and so 2015 but building a virtual assistant that uses natural language processing and machine learning to automate administrative tasks, schedule meetings, answer inquiries, and assist employees in their daily work harnesses the key hack to improving productivity.  The virtual assistance can talk to virtual assistant of other employees to identify the best possible time and location (Virtual or Physical) for meetings.  </p></li></ol><p>In conclusion, the development of AI-based apps is not merely an option but a necessity for digital workplace service providers aiming to maintain a competitive edge, especially when catering to large enterprises. The benefits are evident: increased efficiency, personalized experiences, and data-driven decision-making. These advantages not only enhance client satisfaction but also position providers as innovators in the industry. On the flip side, neglecting AI-based IP development can lead to significant drawbacks, including missed opportunities, operational inefficiencies, and the risk of falling behind competitors who are leveraging AI to offer advanced and more appealing services. Ultimately, in the competitive landscape of digital workplace services for large enterprises, the ability to harness AI can make the difference between thriving and merely surviving in the market.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Unveiling the Secret Formula: Master the Art of Estimating Google Workspace Migration Effort for Seamless Transition!]]></title><description><![CDATA[Discover Proven Strategies to Estimate Time, Effort, and Resources for a Smooth Google Workspace Transition.]]></description><link>https://ravigokulgandhi.com/p/unveiling-the-secret-formula-master</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/unveiling-the-secret-formula-master</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Wed, 18 Oct 2023 08:05:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oRxM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oRxM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oRxM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 424w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 848w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 1272w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oRxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126056,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oRxM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 424w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 848w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 1272w, https://substackcdn.com/image/fetch/$s_!oRxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d34e442-0bf5-44d3-9de4-f0a37628cbef.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Migrating to Google Workspace can be a transformative journey for any organization, but proper planning and estimation are vital for a successful transition. In our blog post, we provide a comprehensive guide to help you estimate the time and effort required for a smooth migration. From initial assessment and planning to data migration, user provisioning, testing, deployment, and post-migration evaluation, we break down the key steps and considerations to ensure a seamless transition to Google Workspace. Don't embark on this migration without a well-considered plan&#8212;let's make your move to Google Workspace as efficient and effective as possible!</p><p>Welcome to the gateway of transformation! Moving your organization to Google Workspace, a suite of powerful productivity and collaboration tools, holds the promise of streamlining operations, enhancing communication, and elevating productivity. However, embarking on this transition requires meticulous planning and a clear understanding of the journey ahead. Estimating the time, effort, and resources needed for a successful migration is a crucial first step. In this blog post, we'll guide you through the process, providing insights and strategies to help you accurately assess the scope of the migration and pave the way for a seamless transition to Google Workspace. Let's set the stage for a smooth and efficient migration to this dynamic platform.</p><p><strong>Google Workspace Enterprise Plus</strong> is the most advanced and comprehensive edition of Google Workspace, designed for organizations that need the highest levels of security, compliance, and control. It includes all of the features of Google Workspace Enterprise Standard, plus the following:</p><ul><li><p><strong>Advanced security and compliance controls:</strong> Enterprise Plus includes a number of advanced security and compliance controls, such as data loss prevention (DLP), eDiscovery, and data regions. These controls help organizations to protect their data and meet their compliance requirements.</p></li><li><p><strong>24/7 support from Google experts:</strong> Enterprise Plus customers have access to 24/7 support from Google experts who can help them with any issues they may have.</p></li><li><p><strong>Custom branding and domain name:</strong> Enterprise Plus customers can customize the branding of their Google Workspace environment and use their own domain name.</p></li><li><p><strong>Unlimited storage and bandwidth:</strong> Enterprise Plus customers have unlimited storage and bandwidth, so they can store and share as much data as they need.</p></li><li><p><strong>Access to Google Cloud Platform services:</strong> Enterprise Plus customers have access to a wide range of Google Cloud Platform services, such as Compute Engine, App Engine, and Cloud Storage.</p></li><li><p><strong>Dedicated account manager:</strong> Enterprise Plus customers are assigned a dedicated account manager who can help them to get the most out of Google Workspace.</p></li><li><p><strong>Priority support:</strong> Enterprise Plus customers receive priority support from Google, so their issues are resolved quickly.</p></li><li><p><strong>Advanced training and support resources:</strong> Enterprise Plus customers have access to a variety of advanced training and support resources, such as online courses and webinars.</p></li><li><p><strong>Early access to new features:</strong> Enterprise Plus customers are given early access to new Google Workspace features.</p></li><li><p><strong>Custom integrations and development:</strong> Enterprise Plus customers can work with Google to create custom integrations and developments for their Google Workspace environment.</p></li><li><p><strong>Security consulting and incident response:</strong> Enterprise Plus customers have access to security consulting and incident response services from Google.</p></li></ul><p>Google Workspace Enterprise Plus is a powerful and flexible solution that can help organizations of all sizes to improve their productivity, collaboration, and security.</p><p>Estimating the time and effort required for migrating to Google Workspace (formerly G Suite) involves a comprehensive assessment of your current environment, data, user needs, and the complexity of the migration. Here's a step-by-step guide to help you with this estimation process:</p><ol><li><p><strong>Assessment and Planning:</strong> </p><ol><li><p><strong>Inventory and Scope</strong>: Conduct an inventory of your current systems, applications, data, and users. Understand the scope of the migration in terms of the number of users, data volume, and complexity. </p></li><li><p><strong>Data Migration Complexity</strong>: Determine the complexity of migrating data (emails, files, calendars) from your existing systems to Google Workspace. Assess if any customizations or special configurations are required. </p></li><li><p><strong>User Training Needs</strong>: Evaluate the need for user training and change management to ensure a smooth transition. Consider the time required for training users on new tools and processes.</p></li></ol></li><li><p><strong>Data Migration:</strong> </p><ol><li><p><strong>Quota Review</strong> - Assess and Review Quota for the following APIs. Google Drive API, Google Calendar API, Gmail API, Contacts API, People API, Admin SDK API.   Refer to quota limits for each API as shown in example <a href="https://developers.google.com/gmail/api/reference/quota">here</a>. </p></li><li><p><strong>Data Cleanup and Preparation</strong>: Estimate the time required for cleaning up and preparing data for migration to ensure data integrity and accuracy during the migration process. </p></li><li><p><strong>Data Transfer Speed and Tools</strong>: Consider the transfer speed of data and select appropriate migration tools based on the volume and type of data to be migrated. Estimate the time needed for data transfer.</p></li></ol></li><li><p><strong>User Provisioning and Setup:</strong> </p><ol><li><p><strong>User Account Setup</strong>: Estimate the time needed to provision user accounts, configure settings, and set up permissions within Google Workspace for each user. </p></li><li><p><strong>Profile and Preferences Configuration</strong>: Consider the time required to configure user profiles, preferences, and permissions based on organizational requirements.</p></li></ol></li><li><p><strong>Security Configuration</strong></p><ol><li><p><strong>Multi Factor Authentication</strong>: Budget time and effort to configure Multi Factor authentication with strong MFA methods like FIDO keys, authenticator apps and context aware security. </p></li><li><p><strong>Single Sign On</strong> - If you are deploying Google Workspace on an emerging enterprise, or a large enterprise, you may encounter requirement to use Google Cloud Identity as Primary IDP or connect Google Cloud Identity to third party IDP solutions. While the later is a seamless configuration, the former may involve configuring SSO for several third party applications authenticating with Google Cloud Identity and each may be time consuming. </p></li><li><p><strong>Google Shared Drive DLP and Google Meet Security Configuration</strong> - Shared Drive and Google Meet encryption provides security to keep all data private. However several customers ask for additional layer of encryption with Google Workspace Client-side encryption (CSE). CSE uses your organization's encryption keys to encrypt Meet video and audio streams on the client&#8217;s browser before the streams are transmitted to other meeting participants or Google. This may require dedicated effort and resources to complete. </p></li></ol></li><li><p><strong>Testing and Quality Assurance:</strong> </p><ol><li><p><strong>Migration Testing</strong>: Allocate time for testing the migration process, including data integrity, user access, and functionality to ensure a successful transition.</p></li><li><p><strong>User Acceptance Testing (UAT)</strong>: Plan for UAT to gather feedback from a subset of users to identify any issues or areas that need improvement.</p></li></ol></li><li><p><strong>Deployment and Go-Live:</strong> </p><ol><li><p><strong>Deployment Strategy</strong>: Develop a deployment plan, including phased migration or a complete cutover, and estimate the time needed for deployment. </p></li><li><p><strong>Support and Monitoring</strong>: Allocate time for providing support during and after the migration, monitoring system performance, and addressing any issues that arise post-migration.</p></li></ol></li><li><p><strong>Contingency and Buffer Time:</strong> </p><ol><li><p><strong>Contingency Planning</strong>: Set aside contingency time to account for unexpected challenges or delays that may occur during the migration process.</p></li></ol></li><li><p><strong>Documentation and Knowledge Transfer:</strong> </p><ol><li><p><strong>Documentation</strong>: Allocate time for documenting the migration process, including steps, configurations, and best practices for future reference. </p></li><li><p><strong>Knowledge Transfer</strong>: Plan for knowledge transfer sessions to educate the internal team or support staff about the new Google Workspace environment.</p></li></ol></li><li><p><strong>Review and Adjust:</strong> </p><ol><li><p><strong>Post-Migration Evaluation</strong>: After the migration, review the process, gather feedback from users, and identify areas for improvement to optimize future migrations.</p></li></ol></li></ol><p>Remember, each organization's migration will have unique aspects, so adapt the estimation process based on your specific needs and circumstances. Consulting with migration experts or Google Workspace consultants can also provide valuable insights and assistance in estimating time and effort accurately.</p><p>As you embark on this journey to integrate your organization with the vast potential of Google Workspace, remember that the success of your migration lies in meticulous estimation and thorough planning. The insights and strategies shared in this blog post are your guiding light to navigate through the complexities, ensuring a seamless transition. </p><p>Take the time to assess, plan, and tailor the migration to suit your unique needs. With accurate estimates and a well-structured approach, you'll not only streamline the process but set the stage for a more productive and collaborative future for your business. Embrace the transformation and reap the benefits of a seamlessly migrated Google Workspace!</p><p>Limited time offer !!! Become a Paid Subscriber to get  complementory 30 mins consultation on creating estimates and work breakdown structure for your Google Workspace Migration. </p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ravigokulgandhi.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ravigokulgandhi.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[War and impact on work and workplace]]></title><description><![CDATA[In the face of war, the workplace landscape is significantly disrupted, making access to physical workspaces challenging. This blog post delves into the profound impact of war on work and workplace.]]></description><link>https://ravigokulgandhi.com/p/war-and-impact-on-work-and-workplace</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/war-and-impact-on-work-and-workplace</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Mon, 16 Oct 2023 08:13:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3e1e3fc9-8a43-4d4a-a66b-f7f51c515109_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ke6x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ke6x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 424w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 848w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ke6x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113022,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ke6x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 424w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 848w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ke6x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25a94ca0-e62e-444a-8bcb-14a0dabb3cd5.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In times of war, the ripple effects extend far beyond the battlefield, touching every aspect of society. One critical domain that bears the brunt of such tumultuous times is the workplace. Wars disrupt daily routines, displace employees, and render physical workspaces inaccessible, making the continuation of work a formidable challenge. <strong>This impact is seen not only in the war zone, but also developed countries where the locals have immigrated to support their nations or protest against the atrocities that their country people are going through in their home nation.</strong> </p><p>This blog post delves into the profound impact of war on work and the workplace, shedding light on the impediments it imposes. However, amid adversity, the emergence of the digital workplace offers a glimmer of hope, presenting a viable avenue to mitigate risks and ensure business continuity. </p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ravigokulgandhi.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Raviosaurus is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Let's explore how leveraging digital solutions can empower individuals and organizations to navigate the storm and sustain their work in the face of conflict.</p><p>The chaotic landscape of war often disrupts the traditional paradigms of work, making physical access to the workplace a significant challenge. During these tumultuous times, digital workplace solutions emerge as a crucial lifeline for both businesses and employees. By leveraging advanced technologies, such as <strong>cloud computing</strong>, <strong>remote collaboration tools</strong>, and <strong>virtual communication platforms</strong>, organizations can transcend geographical boundaries and ensure operational continuity. </p><p>Teams can collaborate in real-time, access critical data securely, and communicate seamlessly from diverse locations. This not only maintains productivity but also fosters a sense of unity and resilience among employees. The digital workplace essentially serves as a resilient platform that enables organizations to adapt, stay connected, and continue essential operations, even when faced with the disruptions of war.</p><p>Here are the top pillars of a digital workplace in a remote working solution during such challenging circumstances:</p><ol><li><p><strong>Remote Collaboration Tools and Platforms:</strong> Implementing robust collaboration tools and platforms is foundational. These tools facilitate seamless communication, document sharing, video conferencing, and project management, allowing teams to collaborate effectively irrespective of their physical locations. </p></li><li><p><strong>Secure and Accessible Data Storage:</strong> A secure and easily accessible data storage system is vital to ensure that employees can retrieve and work on important documents and files from anywhere securely. Cloud-based storage solutions enable real-time access to data while maintaining the necessary security measures.</p></li><li><p><strong>Cybersecurity Measures:</strong> Prioritize cybersecurity to protect sensitive information and data from potential threats. This includes implementing strong authentication protocols, encryption, regular security audits, and educating employees about cybersecurity best practices.</p></li><li><p><strong>Remote Device Management:</strong> Provide guidelines and tools for managing remote devices, ensuring they are up to date with security patches and configurations. Remote device management helps maintain a secure network and reduces the risk of potential vulnerabilities.</p></li><li><p><strong>Employee Training and Support:</strong> Offer training and support to help employees effectively use digital tools and navigate the digital workplace. This includes training on collaboration platforms, cybersecurity awareness, and best practices for remote work to enhance productivity and efficiency.</p></li><li><p><strong>Flexible Work Policies:</strong> Establish flexible work policies that acknowledge the unique circumstances during turbulent times. These policies should address work hours, availability expectations, and understanding the challenges employees might face while working remotely during such disruptions.</p></li><li><p><strong>Remote Leadership and Communication:</strong> Emphasize clear and transparent communication from leadership to ensure employees are informed about organizational updates, changes, and expectations. Regular virtual town halls, updates from executives, and open channels for questions and feedback are essential for fostering a sense of unity and direction.</p></li><li><p><strong>Emphasis on Employee Well-being:</strong> Prioritize employee well-being by fostering a supportive work environment. Encourage breaks, offer mental health support, and ensure workloads are manageable to mitigate stress and burnout, especially during challenging and uncertain times.</p></li><li><p><strong>Scalability and Adaptability:</strong> Build a digital workplace infrastructure that can scale and adapt swiftly to changing circumstances. This ensures the organization can respond effectively to increased demand for remote work and accommodate evolving needs during turbulent times.</p></li><li><p><strong>Integration of Emerging Technologies:</strong> Stay updated with emerging technologies that can enhance remote work experiences. Implement AI-driven solutions, automation, and other innovations to streamline processes and improve productivity in the remote working setup.</p></li></ol><p>By focusing on these pillars, organizations can create a resilient digital workplace that enables employees to work effectively and collaboratively, even amidst the challenges brought about by war or similar disruptive events.</p><p></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://ravigokulgandhi.com/p/war-and-impact-on-work-and-workplace?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thank you for reading Raviosaurus. This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ravigokulgandhi.com/p/war-and-impact-on-work-and-workplace?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ravigokulgandhi.com/p/war-and-impact-on-work-and-workplace?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Impact of Russia-Ukraine Conflict]]></title><description><![CDATA[As the world was slowly moving on from the unprecedented Covid-19 pandemic, several organizations had adopted cloud computing to enable&#8230;]]></description><link>https://ravigokulgandhi.com/p/the-cybersecurity-impact-of-russia-ukraine-conflict-50f1aeeff646</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/the-cybersecurity-impact-of-russia-ukraine-conflict-50f1aeeff646</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Mon, 14 Mar 2022 05:11:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/28087f86-e829-42e7-bcc8-6cdefd2c5ec5_800x324.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!acPo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!acPo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 424w, https://substackcdn.com/image/fetch/$s_!acPo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 848w, https://substackcdn.com/image/fetch/$s_!acPo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!acPo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!acPo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!acPo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 424w, https://substackcdn.com/image/fetch/$s_!acPo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 848w, https://substackcdn.com/image/fetch/$s_!acPo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!acPo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ee9081-80f9-4ca8-8039-a21b25a7d0a0_800x324.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Risk and Cyber Security in the time of Disruption</figcaption></figure></div><p>As the world was slowly moving on from the unprecedented Covid-19 pandemic, several organizations had adopted cloud computing to enable work from home for their employees. These organizations braced themselves to the idea of smart working where if a worker cannot come to work, work will come to worker. And this has been increasingly made possible by organizations moving most of their workload on cloud which not only includes line of business systems but also end user computing devices, and their administration &amp; management.</p><p>These organizations have also increasingly adopted hiring people via leading freelancing sites to eliminate the geographical barriers while still embedding transparent and fluid governance model to track productivity and risks.</p><p>And as these organizations put Cloud Computing and Work from Home on their priority charter, the world saw another catastrophic event in the form of Russia Ukraine conflict when on February 24th, 2022, Russia Launched an offensive attack on Ukraine. The situation eventually escalated towards people leaving Ukraine and Russia facing severe sanctions from developed nations across the world.</p><p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently warned through its <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative that &#8220;every organization&#8202;&#8212;&#8202;large and small&#8202;&#8212;&#8202;must be prepared to respond to disruptive cyber activity&#8221; in the wake of Russia&#8217;s invasion of Ukraine.</p><p>These unprecedent events have introduced risks, that were not pertinent before and thus needs a holistic mitigation approach with sense of urgency and priority. While it is unpredictable on the forms of attacks and the acceleration on the surge, we certainly anticipate the following risks that may emerge and would need a mitigation plan.</p><p>1. <strong>Phishing</strong>&#8202;&#8212;&#8202;Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email.</p><p>2. <strong>Malware &amp; Ransomware</strong>&#8202;&#8212;&#8202;Ransomware is a type of malware that helps malware authors to encrypt or lock the computer files while demanding a ransom to unlock the encrypted files. The user is denied access to the files&#8202;&#8212;&#8202;this is done by encrypting files on the hard drive or displaying messages by locking the system which forces the user to pay the malware author to unencrypt and get back access to their computer.</p><p>3. <strong>DDoS Attack</strong>&#8202;&#8212;&#8202;Distributed denial of service (DDoS) attacks led to flooding of network /servers with traffic, making it offline for actual utilization.</p><p>4. <strong>Crypto jacking</strong>&#8202;&#8212;&#8202;Crypto jacking is a type of cybercrime that involves the unauthorized use of people&#8217;s devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency. Like many forms of cybercrime, the motive is profit, but unlike other threats, it is designed to stay completely hidden from the victim.</p><p>5. <strong>Password Spray Attack</strong>&#8202;&#8212;&#8202;In a password spray attack, adversaries &#8220;spray&#8221; passwords at a large volume of usernames. The hacker goes after specific users and cycles through as many passwords as possible using either a full dictionary or one that&#8217;s edited to common passwords.</p><p>While the above risks existed for quite some time, the threat levels have increased profoundly and may impact organizations both within and beyond the region. Every organization&#8202;&#8212;&#8202;large and small&#8202;&#8212;&#8202;must be prepared to respond to disruptive cyber activity.</p><p>The security and intelligence at several multinationals have indicated that they are anticipating cyberattacks and assessing the potential for second and third-order effects on their operations. Some companies noted that they are anticipating an increase in attacks and scams in conjunction with the Ukraine crisis, with risk assessments typically contingent on whether the company has direct links to Ukrainian and Russia Talent Pools and Employee Base directly or via several top Freelancing &amp; Talent Management Sites.</p><p>Triskelion recommends all organization irrespective of their digital estate size and geographical footprint, adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. We do recognize the need to highlight few immediate best practices to be implemented in your organization if you have not already done so.</p><p>1. Implement Zero Trust Security Model to ensure data and resources are inaccessible by default. Users can only access them on a limited basis under the right circumstances, known as least-privilege access.</p><p>2. Adopt strong password policy and Multi Factor Authentication and include hardware-based keys like FIDO into your authentication methods.</p><p>3. Update / Patch Software &amp; Vulnerabilities&#8202;&#8212;&#8202;Ensure that your software and firmware are updated and patched to address any known vulnerabilities.</p><p>4. Attackers often exploit fear during uncertain times. Learn about various types of scams and know that they are constantly being adapted according to current events. Educate your employees and other users around these scams.</p><p>5. Prepare for Ransomware and/or Data Destruction by Auditing your Disaster Recovery Plan and ensure your back ups are in place. Run a drill to validate your recovery times and recovery points.</p><p>6. Revisit your password management for key applications and infrastructure and move to Key and Secret Management Services with your cloud provider.</p><p>7. Implement and audit your end point security for end user computing devices especially with work from anywhere team using company provided as well as BYOD devices.</p><p>8. Establish Conditional Access policies as they allow to verify user access based on different conditions such as location, device type, risks, applications etc.</p><p>9. Engage in proactive threat hunting and deploy an effective endpoint detection and response solution (EDR).</p><p>In the face of these threats, cybersecurity is no longer some afterthought. Cybersecurity is basic survival, and it has never been more important, especially considering the escalating Russia-Ukraine conflict.</p>]]></content:encoded></item><item><title><![CDATA[Why should you use premium email service instead of free?]]></title><description><![CDATA[Are you a freelancer, or small business or a professional in legal, medical or accounting industry and using free email like gmail.com&#8230;]]></description><link>https://ravigokulgandhi.com/p/why-should-you-use-premium-email-service-instead-of-free-691442f9b0f9</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/why-should-you-use-premium-email-service-instead-of-free-691442f9b0f9</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Thu, 29 Jul 2021 05:01:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d951fc3a-9116-41a5-b0c1-dd18bbca0110_300x168.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h_Ou!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h_Ou!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h_Ou!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h_Ou!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h_Ou!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff43caa07-9699-4538-89df-83aefd88e153_300x168.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Are you a freelancer, or small business or a professional in legal, medical or accounting industry and using free email like gmail.com, outlook.com, or yahoo.com? I have been asked this question umpteen times on why should we opt for a Premium Email service rather than a free or freemium email service.</p><p>In 2020, the number of global e-mail users amounted to four billion and is set to grow to 4.6 billion users in 2025. With the internet becoming increasingly accessible, the number of emails sent and received globally has increased each year since 2017. While roughly 306.4 billion emails were estimated to have been sent and received each day in 2020, this figure is expected to increase to over 376.4 billion daily mails by 2025. Source: <a href="https://www.statista.com/statistics/255080/number-of-e-mail-users-worldwide/">Statistica</a></p><p>While there are millions of businesses functioning with a free email address, free isn&#8217;t always better, especially when it comes to something you rely on every day. Most business and even some home users opt for a premium e-mail solution. Some of the more popular options are Google Workspace by Google and Microsoft 365 from Microsoft.</p><p>Here are some of the reasons why you should consider using Premium Email Services and not free email services:</p><ol><li><p><strong>Security</strong>&#8202;&#8212;&#8202;This is the #1 reason why should you opt for premium emails. When you create a free @gmail.com, @outlook.com or @yahoo.com or similar email platform, hackers with malicious intent can create an email account with similar name for misuse. For E.g. you create an email account johndoe19@gmail.com, someone else can create an account johnd0e19@gmail.com (notice the &#8220;o&#8221; has been replaced with the number zero). Premium emails allow you to use custom domains which ensure that malicious attacks like these are reduced significantly.</p></li><li><p><strong>Storage</strong>&#8202;&#8212;&#8202;Email platforms have been around for a decade, and most of the free email service providers have now started capping the storage limit, people end up storing content at alternative backup locations. Every Google Account starts with 15 GB of free storage that&#8217;s shared across Google Drive, Gmail, and Google Photos. Microsoft offers 15 GB of email storage space per free Outlook.com account. Once the quota is over, you will have to upgrade to Premium plan from these providers to continue using their platform.</p></li><li><p><strong>Privacy</strong>&#8202;&#8212;&#8202;When you use a free email provider, privacy is usually the first one that will be sacrificed. Most users do not know this because they do not read the agreements before signing up for the account. To know what you are giving to the provider you can read the license agreement or you can take a good guess on how the company is making their money. For Google, this is advertisements. For Microsoft, this is selling licenses and products.</p></li><li><p><strong>Email Deliverability</strong>&#8202;&#8212;&#8202;When you send email using gmail.com or outlook.com or yahoo.com, the email deliverability may not be guaranteed as some enterprise email gateway consider them as potential spam or phishing attacks. When you use your own domain and assuming you don&#8217;t spam by mass mailing unsolicited emails, the email deliverability is much higher because you can verify your domain signature with the email service provider using techniques like SPF, DMARC and DKIM.</p></li><li><p><strong>Branding</strong>&#8202;&#8212;&#8202;This is the most important aspect using Premium Email Services because you can use your own personalized domain to create your email. Imagine sending your cv using <strong>john@doe.com</strong> instead of <strong>johndoe@free-email.com</strong> and the impact it puts on your potential employer. Or using <strong>contact@mycafe.com</strong> instead of <strong>contact.mycafe@gmail.com</strong> when sending out promotions.</p></li><li><p><strong>Customer Support</strong>&#8202;&#8212;&#8202;Premium Email Platforms even with the most basic plans come with email, phone or chat based support options. If you are hustling, email platform issues are the last thing you want on your calendar. Instead of spending hours on community support portals to address issues with your free email, it is better to work with support team of premium email providers and get your issues fixed in a predefined service levels.</p></li></ol><p><strong>Conclusion</strong>: Free emails services may be lucrative in the beginning but may end up costing much higher due to security lapses, lost opportunities, lack of support and limited storage. I would recommend the following premium services even if you need a single email account.</p><ol><li><p><strong>Google Workspace</strong>&#8202;&#8212;&#8202;Starting at USD 6 per user per month (or INR 125 per user per month for first 20 users, and INR 210 per user per month for additional users), Google Workspace offers email, calendar, contacts and Google Drive along with highly secure identity management systems that enables multi factor authentication and basic to advanced device management. Use this <a href="https://goo.gl/REGdw3">link</a> to register for a new subscription and reach out to me using <a href="https://raveegokulgaandhi.com/contact-me/">Contact Me</a> form, and I will send a 20% off discount code valid for the first year.</p></li><li><p><strong>Microsoft 365</strong>&#8202;&#8212;&#8202;Starting at USD 5 per user per month (or INR 125 per user per month), Microsoft offers email, calendar, contacts, OneDrive, Microsoft Teams, Microsoft Planner, Microsoft Stream, and Azure Active Directory with highly secure identity and access management, multi factor authentication, and basic to advance device management. Use this <a href="https://www.microsoft.com/en-us/microsoft-365/buy/compare-all-microsoft-365-products?tab=1&amp;rtc=1">link</a> to register for a new subscription and reach out to me using <a href="https://raveegokulgaandhi.com/contact-me/">Contact Me</a> form, and I will provide free email configuration for your Microsoft 365 Tenant.</p></li></ol><p><em>Originally published at <a href="https://raveegokulgaandhi.com/why-should-you-use-premium-email-service-instead-of-free/">https://raveegokulgaandhi.com</a> on July 29, 2021.</em></p>]]></content:encoded></item><item><title><![CDATA[Build WordPress Environment on Azure on Oracle Linux]]></title><description><![CDATA[WordPress needs no introduction. Because 42% of all websites on the entire Internet currently use WordPress as their content management&#8230;]]></description><link>https://ravigokulgandhi.com/p/build-wordpress-environment-on-azure-on-oracle-linux-7b0ff99fa2ef</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/build-wordpress-environment-on-azure-on-oracle-linux-7b0ff99fa2ef</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Tue, 01 Jun 2021 06:25:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1ed9eeab-39a3-4aac-83d9-8428a2903e20_700x400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ICxZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ICxZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ICxZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ICxZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ICxZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f44fbf-617b-41d1-9514-3c0d683c95b1_700x400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>WordPress needs no introduction. Because 42% of all websites on the entire Internet currently use WordPress as their content management system. This number is 36% for top 1 million websites, 20% for top 100K websites, and 14% for top 10K websites respectively (as of writing this Blog in July 2021).</p><p>WordPress can be self hosted on your own hosting environment, or you can use a web hosting service like&nbsp;, or among many other hosting providers. This Blog Post would however talk about how to host WordPress on Microsoft Azure Virtual Machine using Oracle Linux 8.0.</p><p>I assume that you have an active Microsoft Azure Subscription available with ability to create Virtual Machines and you are familiar with Linux. Also PowerShell for Azure is installed on your workstation.</p><p>Login to Microsoft Azure using the following command. You will be prompted to authenticate yourself to login into Azure Portal</p><p>We will create a Resource Group called WordPress in the US West Region for the purpose of this blog. You can use an existing resource group or choose the region as you deem appropriate.</p><p>Once you have created the resource group (the command would return Provisioning Succeeded), we would proceed to create the virtual machine using the following SKU.</p><p><em><code>az vm create --name azvmwordpress --resource-group WordPress --image "Oracle:Oracle-Linux:ol8_2-gen2:8.2.13" --admin-username "wpadmin" --admin-password "&lt;Enter a unique password here&gt;" --location westus --nsg-rule "SSH" --public-ip-address-allocation "static"</code></em></p><p>This command would return the deployment details including the Public IP Address. You will need that IP address to login into the server using SSH. Once the command is completed successfully, run the following command to open required ports.</p><p>I highly recommend using the AZ PowerShell command or tools like Terraform or Ansible to create deployments on Azure. Once the command has run successfully, you should be able to see the deployment on the Azure Virtual Machine Blade</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7ohq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7ohq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 424w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 848w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 1272w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7ohq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7ohq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 424w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 848w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 1272w, https://substackcdn.com/image/fetch/$s_!7ohq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb516d4f-2424-4745-94de-cd4aa9bc801e_800x72.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Login into the Virtual Machine using the following command</p><p>Enter your password when prompted.</p><p>Now let&#8217;s setup &#8220;root&#8221; password for the server. Make sure you use a password that is difficult to guess and around 14&#8211;16 characters long with alphanumeric and special characters.</p><p><em><code>sudo passwd</code></em></p><p>Now lets login into the root using the following command</p><p>When deploying a new Linux Environment, it is important to upgrade the OS with the latest patches, firmware updates and other functionality.</p><p>You might want to go and grab a coffee as this might take a couple of minutes to run the upgrade.</p><p>Once the server is upgraded and patched with the latest updates, let&#8217;s install the latest version of PHP and all the required components to run WordPress. The minimum version of PHP required for WordPress is 7.4, so we will ensure that we are using the required version to install WordPress. Lets run the following command to check if the PHP 7.4 module is available.</p><p>If it returns multiple versions of PHP and 7.4 is not a default version (check under stream column against what version [d] is marked]</p><p>Let&#8217;s enable PHP 7.4 by running the following command</p><p>Now let&#8217;s install PHP and its required modules.</p><p>There are important changes you need to make to php.ini to ensure that WordPress runs smoothly and you are able to use Themes and Plugins as well as upload rich content like graphics, videos, etc.</p><p>And make the following changes</p><p><em>max_execution_time = 90 memory_limit = 256M upload_max_filesize = 64M max_file_uploads = 40</em></p><p>Now lets make modifications to Apache Web Server Configuration File</p><p><code>sudo vi /etc/httpd/conf/httpd.conf</code></p><p>Under &lt;Directory &#8220;/var/www/html&#8221;&gt;, change AllowOverride to All</p><p>Start the Apache Web Server</p><p><code>systemctl enable httpd</code></p><p>Now, we need to make firewall changes to ensure that the system can accept requests</p><p><code>firewall-cmd --permanent --zone=public --add-service=http</code></p><p><code>firewall-cmd --permanent --zone=public --add-service=https</code></p><h3>Installing MySQL</h3><p>There are multiple options to install mysql on Linux Environment. You can either install MySql from Oracle Linux 8 Application Stream or download it from mysql.com which is the method I prefer. Let&#8217;s download MySQL to a tmp location and install it from there.</p><p>Extract MySQL using the following command.</p><p>Install MySQL on the server</p><p><em><code>dnf localinstall mysql-community-client-8.0.26-1.el8.x86_64.rpm mysql-community-client-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-client-plugins-8.0.26-1.el8.x86_64.rpm mysql-community-client-plugins-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-common-8.0.26-1.el8.x86_64.rpm mysql-community-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-debugsource-8.0.26-1.el8.x86_64.rpm mysql-community-devel-8.0.26-1.el8.x86_64.rpm mysql-community-libs-8.0.26-1.el8.x86_64.rpm mysql-community-libs-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-server-8.0.26-1.el8.x86_64.rpm mysql-community-server-debug-8.0.26-1.el8.x86_64.rpm mysql-community-server-debug-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-server-debuginfo-8.0.26-1.el8.x86_64.rpm mysql-community-test-8.0.26-1.el8.x86_64.rpm mysql-community-test-debuginfo-8.0.26-1.el8.x86_64.rpm</code></em></p><p>Start and Enable MySQL Services</p><p>We would need the default root password for MySQL. Use the following command to retrieve the password.</p><p>Run the following command to secure your mysql installation.</p><p><em><code>mysql_secure_installation</code></em></p><p>Once the MySQL installation is completed and installed, lets create a wordpress database using the following commands</p><h3>Installing WordPress Application</h3><p>Navigate to the /tmp directory</p><p>Download WordPress</p><p><em><code>curl https://wordpress.org/latest.tar.gz --output wordpress.tar.gz</code></em></p><p>Copy WordPress to default root directory of Apache</p><p><code>cp -r wordpress /var/www/html</code></p><p>Lastly in this step, change permissions and change file SELinux security context:</p><p><em><code>chown -R apache:apache /var/www/html/wordpress</code></em> <em><code>chcon -t httpd_sys_rw_content_t /var/www/html/wordpress -R</code></em></p><p>Once the configuration is completed, navigate to your website using http://&lt;yourip&gt;/wordpress and you should see the following installation screen.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mwlI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mwlI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 424w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 848w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 1272w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mwlI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mwlI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 424w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 848w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 1272w, https://substackcdn.com/image/fetch/$s_!mwlI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff5b7f9-c408-4c73-8e73-1abad34c1655_617x645.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Enter the following details to configure connection to your database.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!reVQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!reVQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 424w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 848w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 1272w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!reVQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!reVQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 424w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 848w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 1272w, https://substackcdn.com/image/fetch/$s_!reVQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c1dfabc-4d25-41a5-9b33-4a8c472d54e2_683x431.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>You should see the following screen. Click on Run the installation.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lVe0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lVe0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 424w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 848w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 1272w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lVe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lVe0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 424w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 848w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 1272w, https://substackcdn.com/image/fetch/$s_!lVe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36c6e86d-8496-4b38-beaa-0cff34a878cf_741x264.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Enter the details for your WordPress Website. This can be changed later.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4iHz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4iHz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 424w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 848w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 1272w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4iHz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4iHz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 424w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 848w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 1272w, https://substackcdn.com/image/fetch/$s_!4iHz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c63eb86-3e32-4021-b4bd-875bf16542e3_673x633.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Once the installation is completed, you can login to your website using the username and password provided.</p><p>I prefer to install a few plugins that help me ensure the site is up and running and also secure.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mBKx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mBKx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 424w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 848w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 1272w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mBKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mBKx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 424w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 848w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 1272w, https://substackcdn.com/image/fetch/$s_!mBKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b324cf-9f1a-44fa-8306-e8545f9563e9_800x548.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>I hope this tutorial will help you deploy WordPress on Oracle Linux on Microsoft Azure. If you find this tutorial useful, please consider buying me a coffee&nbsp;. This will enable me to write more useful content and keep the site running smoothly.</p><p><em>Originally published at <a href="https://raveegokulgaandhi.com/build-wordpress-environment-on-azure-on-oracle-linux/">https://raveegokulgaandhi.com</a> on June 1, 2021.</em></p>]]></content:encoded></item><item><title><![CDATA[Microsoft 365 vs Google Workspace]]></title><description><![CDATA[Microsoft and Google for long have been competing on the productivity suite and collaboration space ever since Microsoft 365 and Google&#8230;]]></description><link>https://ravigokulgandhi.com/p/microsoft-365-vs-google-workspace-57c53e9b7a1a</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/microsoft-365-vs-google-workspace-57c53e9b7a1a</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Mon, 10 May 2021 13:51:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/625368ea-1cf1-4886-a429-db7a0e8f4e67_788x526.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vgz_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vgz_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vgz_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Vgz_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vgz_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9098095-503a-4eca-a4cc-f818315a0401_788x526.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Microsoft and Google for long have been competing on the productivity suite and collaboration space ever since Microsoft 365 and Google Workspace were launched in 2010 and 2011 respectively. What started as business email, cloud storage, productivity apps and communication and messaging tool are now enterprise grade digital workspace solutions that tick all the top-level boxes on your company&#8217;s communications and productivity checklist. Considering both these companies are leader in cloud platform, it is imperative that the underlying infrastructure is highly reliable, resilient and globally available.</p><p>While the two companies have strived hard to dominate the market, they have taken distinctly different approach towards building their platform.</p><p>Microsoft has positioned its flagship desktop and server products with their cloud equivalent thus retaining the user experience and the functionality intact to a greater intent when the users move to the cloud. The back-end services, including Exchange Online, OneDrive for Business, SharePoint Online, and Microsoft Teams, offer an easy migration path for organizations ready to move their on-premises servers to the cloud. Employees can access those services using familiar desktop apps like Outlook, Word, Excel, and PowerPoint, or they can use web-based alternatives. This also includes Microsoft Visio, Microsoft Project and many other SKU that were available as desktop version and are now available on cloud as service.</p><p>Google on other hand has always been cloud native and positioned themselves as &#8220;Born in the Cloud&#8221;. The entire platform can be run using a browser as there are no desktop components available (other than file stream). This includes Gmail, Google Drive, Google Docs, and Google Sheets. When used with Google&#8217;s Chrome browser, those apps support offline storage of email and documents. Google has also introduced Google Meet and Google Chat (redesigned from its predecessor Hangout Meet and Hangout Chat) to complete with Microsoft Teams.</p><p>Both services, in addition to the above functionality, offer services like Mobile Device Management, Conditional Access Management, Data Loss Prevention and Multi Factor Authentication (the service availability may differ based on plans purchased). They also offer Single Sign On functionality to use their identity to login into other SAAS applications.</p><p>The two platforms offer intuitive and admin friendly web console with Microsoft also providing shell access to Microsoft 365 using PowerShell that allows administrators to do maintenance activity both via web or PowerShell.</p><p>Lets look at the product variants in detail for both <strong>Microsoft 365</strong> and <strong>Google Workspace</strong>.</p><p>Microsoft, just like its desktop variants and its licensing strategy has various permutations and combinations when it comes to Microsoft 365 Licensing plan.</p><p><strong>Home Segment</strong></p><ul><li><p><strong>Microsoft 365 Family</strong>&#8202;&#8212;&#8202;One convenient subscription for up to 6 people. Includes premium Office apps, up to 6TB of cloud storage&#8202;&#8212;&#8202;1 TB per person&#8202;&#8212;&#8202;and advanced security for all your devices</p></li><li><p><strong>Microsoft 365 Personal</strong>&#8202;&#8212;&#8202;One convenient subscription that includes AI-powered apps, 1 TB of cloud storage and advanced security for all your devices.</p></li></ul><p><strong>Small Business Segment</strong></p><ul><li><p><strong>Microsoft 365 Business Basic&#8202;</strong>&#8212;&#8202;Best for businesses that need easy remote solutions, with Microsoft Teams, secure cloud storage, and Office Online (<em>desktop versions not included</em>). This includes hosting an email with a 50 GB mailbox, Store and share files with 1 TB of OneDrive cloud storage and Host online meetings and video calls for up to 300 users with Microsoft Teams.</p></li><li><p><strong>Microsoft 365 Business Standard&#8202;</strong>&#8212;&#8202;Everything in Microsoft 365 Business Basic plus Best for businesses that need full remote work and collaboration tools including Microsoft Teams, secure cloud storage, business email, and premium Office applications across devices. Get fully installed and always up-to-date versions of Outlook, Word, Excel, PowerPoint, OneNote for Windows or Mac (plus Access and Publisher for PC only) along with Install the Office apps on up to 5 PCs or Macs per user<a href="https://www.microsoft.com/en-us/microsoft-365/business#coreui-contentrichblock-z2c0jhd">1</a></p></li><li><p><strong>Microsoft 365 Business Premium</strong>&#8202;&#8212;&#8202;Best for businesses that require secure, remote work solutions with everything included in Business Standard, plus advanced cyberthreat protection and device management. Configure security features and settings on Windows 10 PCs and mobile devices running iOS or Android&#174; with an easy-to-use setup wizard as well as Help protect against sophisticated threats hidden in email attachments and links, and get cutting-edge defenses against zero-day threats, ransomware, and other advanced malware attempts with Microsoft Defender for Office 365</p></li><li><p><strong>Microsoft 365 Apps</strong>&#8202;&#8212;&#8202;Best for businesses that need Office apps across devices and cloud file storage. Business email and Microsoft Teams not included.</p></li></ul><p><strong>Enterprise Segment</strong></p><ul><li><p><strong>Microsoft 365 E3</strong>&#8202;&#8212;&#8202;Get best-in-class productivity apps combined with core security and compliance capabilities for your enterprise.</p></li><li><p><strong>Microsoft 365 E5</strong>&#8202;&#8212;&#8202;Get best-in-class productivity apps and advanced security, compliance, voice and analytical capabilities for your enterprise.</p></li><li><p><strong>Microsoft 365 F3</strong>&#8202;&#8212;&#8202;<strong>Formerly Microsoft 365 F1</strong> Empower your Firstline workforce with productivity apps and cloud services that allow them to do their best work.</p></li></ul><p>The above SKUs were designed keeping in mind differentiating between small business and enterprises to provide better pricing and flexibility. In addition to the above, there are separate SKUs that can be clubbed with lower SKUs like Enterprise Mobility + Security, Azure AD P1, Azure AD P2, Advance Threat Management, Intune License, etc. along with independent SKUs like Exchange Online Plan 1+, SharePoint Online Plan 1+, etc. to provide bare minimum functionality to users.</p><p>Google Workspace, on other hand has kept their SKU offerings simple as the offerings are much targeted towards small business and emerging enterprises.</p><p><strong>Business Starter</strong>&#8202;&#8212;&#8202;Custom and secure business email, with 30 GB cloud storage per user and 100 participant video meetings.</p><p><strong>Business Standard</strong>&#8202;&#8212;&#8202;Everything in Business Starter plus <strong>2TB</strong> of Cloud Storage Space and <strong>150</strong> participant video meetings <strong>+ recording</strong>.</p><p><strong>Business Plus</strong>&#8202;&#8212;&#8202;Everything in Business Standard plan plus <strong>eDiscovery, retention</strong>, <strong>250</strong> participant video meetings + recording, <strong>attendance tracking</strong>, <strong>5 TB</strong> cloud storage per user, and <strong>Enhanced</strong> security and management controls, including <strong>Vault and advanced endpoint management</strong></p><p><strong>Enterprise</strong>&#8202;&#8212;&#8202;Custom and secure business email + eDiscovery, retention, <strong>S/MIME encryption</strong> with 250 participant video meetings + recording, attendance tracking, <strong>noise cancellation, in-domain live streaming</strong> and <strong>As much storage</strong> as you need. Also includes, Advanced security, management, and compliance controls, including Vault, <strong>DLP, data regions, and enterprise endpoint management</strong></p><p>Google has similar additional SKUs like Chrome Enterprise, Google Drive Plan, Cloud Identity Premium, Enterprise Voice, etc. to club with lower SKUs. At the outset, there is a vast difference in offerings between the two organizations but it is notable that there is only cloud edition available for G Suite offerings except Google Drive Sync which allows files to be available on your device</p><p>The pricing of Google Workspace Plan starts from USD 6&#8202;&#8212;&#8202;USD 25 while the pricing of Microsoft 365 Plan starts from USD 5&#8202;&#8212;&#8202;USD 57 simply because Microsoft allows you to combine different plans on a single subscription while Google has limited options available to combine multiple plans on a single subscription. The details of the Google Workspace Subscription is available <a href="https://workspace.google.com/intl/en/pricing.html">here</a>. And the details of Microsoft 365 Subscription is available <a href="https://www.microsoft.com/en-us/microsoft-365/business/compare-all-microsoft-365-business-products">here</a>.</p><p>Depending upon the plan you choose, Microsoft 365 subscription at the minimum includes:</p><ul><li><p>Exchange Online email hosting with a maximum inbox size of 50 or 100GB</p></li><li><p>Web-based versions of Word, Excel, PowerPoint, and Outlook</p></li><li><p>A minimum of 1TB of OneDrive for Business file storage per user</p></li><li><p>SharePoint Online team sites</p></li><li><p>HD video conferencing</p></li><li><p>Online meetings (Skype Meeting Broadcast or <a href="https://www.zdnet.com/article/microsoft-teams-the-complete-starter-guide-for-business-decision-makers/">Microsoft Teams</a> live events)</p></li><li><p>Secure messaging and collaboration (Microsoft Teams)</p></li><li><p>Security and administrative controls</p></li></ul><p>And for G Suite, All plans at the minimum include:</p><ul><li><p>Gmail for Business</p></li><li><p>Meet (video and voice conferencing)</p></li><li><p>Chat (secure messaging)</p></li><li><p>Shared calendars</p></li><li><p>Google Docs, Sheets, and Slides</p></li><li><p>Keep (shared notes)</p></li><li><p>Forms (survey builder)</p></li><li><p>Sites (website builder)</p></li><li><p>Currents (the replacement for Google+ for Google Workspace)</p></li><li><p>At least 30GB of cloud file storage (Google Drive)</p></li><li><p>Security and administrative controls</p></li></ul><p>Microsoft and Google both provide comprehensive roadmaps for their platforms that can be access on <a href="https://www.microsoft.com/en-us/microsoft-365/roadmap?rtc=1&amp;filters=">Microsoft 365 Roadmap</a> and <a href="https://support.google.com/a/table/7539891?hl=en">Google Workspace Roadmap</a>.</p><p>The following image depicts key comparison of workloads on Microsoft 365 and Google Workspace. If you need a detailed comparison on workloads across different SKUs, I would be happy to provide those as well.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nj0i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nj0i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nj0i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nj0i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nj0i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad99082e-1f18-48e9-9fd0-e5d6e0698d07_791x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>If your organization uses mixed array of desktop and laptop devices like Windows 10 and Mac that are company owned or BYOD(&#8220;Bring Your Own Device&#8221;), Microsoft 365 gives you tools to leverage your existing devices and even manage them remotely for security and compliance. On the other hand, if you are looking for a cloud only version of productivity suite, Google Workspace will be an ideal fit.</p><p>It may be overwhelming to decide which plan suits your business and your IT vision.</p><p>As a Microsoft 365 and Google Workspace Specialist I help several small business and enterprises choose the right product and the right plan for their business. If you are in process of evaluating or migrating to the above platform, please use the contact form and I would be happy to help you with the evaluation process.</p>]]></content:encoded></item><item><title><![CDATA[Google Workplace Replacement]]></title><description><![CDATA[Google Workspace for long has been the de-facto collaboration and communication tool for small and medium businesses as well as emerging&#8230;]]></description><link>https://ravigokulgandhi.com/p/google-workplace-replacement-5f11256459c4</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/google-workplace-replacement-5f11256459c4</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Fri, 30 Oct 2020 15:02:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/66fffa4c-b327-4c48-8870-bb6b9e320d57_800x400.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uiT-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uiT-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uiT-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uiT-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uiT-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf137f37-22ad-4fb6-a0fd-9dbfa66621d2_800x400.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Google Workspace for long has been the de-facto collaboration and communication tool for small and medium businesses as well as emerging enterprises. Being an intuitive tool to both configure and use, it did not require too much of information technology support oversight. But as the world started moving towards remote working, their need to add security and governance to their data increased multifold and so did convenient to use single sign on and multi factor authentication. as well as managing BYOD and Company owned devices.</p><p>While these organizations were looking for such functionalities within Google Workspace, they realized significant that they would need to either to the highest version of Google Workspace, or purchase addition SKU, or move to a different operating systems to address these concerns.</p><p>During a recent survey I conducted with several enterprises, and small businesses, I found the following were the reasons to look for an alternative to Google Workspace Replacement (G Suite Replacement)</p><p><strong>Price Change</strong></p><p><strong>Jan 2019</strong>, Google <a href="https://cloud.google.com/blog/products/g-suite/new-pricing-for-g-suite-basic-and-business-editions">announced</a> a price change for Google Workspace SKU, which, while it was not very significant, it did impact the overall Total Cost of Ownership for Google Workspace. G Suite Basic was increased to USD 6 from USD 5, G Suite Business was increased to USD 12 from USD 10, while keeping the G Suite Enterprise licensing rates same.</p><p><strong>Product Offering</strong></p><p>And then in <strong>October 2020</strong>, Google <a href="https://support.google.com/a/answer/10075155?hl=en#:~:text=As%20part%20of%20these%20changes%2C%20G%20Suite%20is,background%20about%20the%20change%2C%20see%20the%20blog%20post.">announced</a> another significant change to Google Workspace by adding new subscription family similar to Microsoft 365 to address different segments of customers.</p><ul><li><p><strong>Business family</strong>-For smaller businesses, Google introduced tailored offerings that make it easy and cost-effective to get started with Google Workspace-including best-in-class collaboration and productivity tools, security protections, and administrative controls.</p></li><li><p><strong>Enterprise family</strong>-For larger businesses, Google introduced a set of offerings with additional productivity features, enterprise-grade administrative controls, and their most advanced security and compliance capabilities, available at both the team and organization level.</p></li></ul><p>However, this impacted functionality on few product editions</p><ol><li><p><strong>Vault</strong>&#8202;&#8212;&#8202;Vault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users&#8217; Google Workspace data. Vault was initially available in G Suite Business Edition for 12 USD but now has been moved to Google Workspace Business Plus Edition which is now a 18 USD plan.</p></li><li><p><strong>No More Unlimited Plan</strong>s&#8202;&#8212;&#8202;As the following table depicts, several unlimited functionality with respect to storage or number of objects has been capped.</p></li></ol><p>3. <strong>No Slack or Teams Equivalent</strong>&#8202;&#8212;&#8202;While Google Workspace introduced Rooms, The main difference between both apps is that Rooms works in threads, which means anyone in the team can start a thread about a specific matter. Everybody else will answer on it, centralizing the communication. However, Channels are more persisitent and is continuous, and threads can be created on specific messages that people sent.</p><p><strong>Lack of Enterprise Scale</strong></p><p>Both Emerging Enterprises and Large Enterprises have different needs when it comes to security and end point management. And while Microsoft 365 has different SKU options around device management using Microsoft Intune and Microsoft Enterprise Mobility &amp; Security, as well as CASB solutions like Microsoft Cloud App Security and Microsoft Defender, Google&#8217;s Chrome Enterprise and BeyondCorp significantly lacks these functionality that&#8217;s meets to these demands.</p><p>Lack of Multi Product Edition Functionality on Single Tenant</p><p>There are situations where small and medium businesses, as well as enterprises would need to cross match different SKU to cater different persona of people, Google Workspace hasn&#8217;t made that functionality available to consumers. Unless you are working directly with Google or a Google Partner on a significant number of licenses, you cannot, at will, choose to use Google Workspace Business Starter, Business Standard, Business Plus and Enterprise on a single tenant even across different organizational units.</p><p>Given these parameters, while Small &amp; Medium Businesses are still coping up with these changes, emerging enterprises are evaluating Google Workspace Replacement to address their ever growing business needs. And to address these GAPs, it is imperative that both Small &amp; Medium Business as well as Emerging Enterprises identify strategies to mitigate or replace Google Workspace gaps with scalable product stack. The following strategies are available when planning to migrate away from Google Workspace</p><ol><li><p>Migrate to Microsoft 365</p></li><li><p>Hybrid Deployment with Microsoft 365 and Google Workspace</p></li><li><p>Hybrid Deployment with Google Workspace and third party product stack in categories like Security, Device Management, Identity &amp; Access Management, SIEM &amp; CASB.</p></li></ol><p><em>Originally published at <a href="https://raveegokulgaandhi.com/google-workplace-replacement/">https://raveegokulgaandhi.com</a> on October 30, 2020.</em></p>]]></content:encoded></item><item><title><![CDATA[Cyber Security for children during study from home]]></title><description><![CDATA[Hoping all my readers are healthy and safe from Covid-19 situation. With the current lock down in many countries, we have seen that not&#8230;]]></description><link>https://ravigokulgandhi.com/p/cyber-security-for-children-during-study-from-home-6542c49ccfcc</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/cyber-security-for-children-during-study-from-home-6542c49ccfcc</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Fri, 04 Sep 2020 16:53:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a51420fa-ffe6-48ce-a77d-f05b3d92c520_800x533.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ufsO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ufsO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ufsO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ufsO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ufsO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F317cacf0-cb56-46ee-b862-503ad48c47e4_800x533.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Hoping all my readers are healthy and safe from Covid-19 situation. With the current lock down in many countries, we have seen that not only commercial establishments have established work from home for their employees and other staff members, but also schools have enabled study from home where students are asked to have classes from home via telepresence tools like <a href="https://products.office.com/en-US/microsoft-teams/group-chat-software">Microsoft Teams</a>, <a href="https://zoom.us/">Zoom</a> &amp; <a href="https://hangouts.google.com/">Google Hangout</a>.</p><p>This year, while many of us are confined to our homes, protecting our communities from COVID-19, and relying on our home networks more than ever it seemed especially important to write this blog post during these troubled times it will help provide a bit of peace of mind for households everywhere.</p><p>While this opens up different arenas for students to continue their learning from home during this lock down, it exposes children to <strong>cyber predators</strong>&#8202;&#8212;&#8202;people who search online for other people in order to use, control, or harm them in some way, <strong>cyber bullies</strong>&#8202;&#8212;&#8202;the electronic posting of mean-spirited messages about a person, often anonymously and dangerous online games like <a href="https://en.wikipedia.org/wiki/Blue_Whale_Challenge">Blue Whale</a> and similar games that promote self harm. Also, most teenagers are baited to work with illegal <a href="https://en.wikipedia.org/wiki/Click_farm">click farms</a> to earn money since it needs a phone or computer with decent internet connection only.</p><p>This blog post discusses about how parents and children should work together to understand and address the cyber security issues and ensure that children are safe and away from harms way when spending their studying or leisure time online.</p><p><strong>Parents</strong></p><ol><li><p>Start with establishing screen time for your kids. Establish clear boundary between study/learning screen time vs entertainment.</p></li><li><p>Keep a check on all email accounts used by your kids, especially the ones that include online communication functionality. Like gmail/hangouts, outlook/skype, etc</p></li><li><p>Keep a check on how many social media accounts are created by your kids. Most kids have multiple Facebook accounts separated for friends and family. Ensure that you are passive part of these networks to monitor activity.</p></li><li><p>DMs or Direct Messages should be audited periodically. This functionality is available on major social media networks like Twitter, Facebook, Instagram and TikTok for starters.</p></li><li><p>Ensure that their phones and computers are always updated with latest system updates.</p></li><li><p>Software downloads&#8202;&#8212;&#8202;Have them avoid unnecessary software downloads, and only download software from reputable sources. Although free games for kids may be fun, they could contain malware or viruses that can steal information off the device.</p></li><li><p>Use <a href="https://amzn.to/2UQhqmu">webcam covers</a> to cover the laptop cameras and ensure that they flip open only when they need to do video calls or conferencing.</p></li><li><p>Use parental control apps for Computers and Mobile Phones/Tablets. <a href="https://support.apple.com/en-us/HT201304">Apple</a>, <a href="https://families.google.com/familylink/">Android</a> &amp; <a href="https://account.microsoft.com/family/about?refd=support.microsoft.com&amp;ru=https:%2F%2Faccount.microsoft.com%2Ffamily%3Frefd%3Dsupport.microsoft.com">Microsoft</a> have some amazing tools to enforce parental control on their devices.</p></li><li><p>Enable activity logging on your wifi routers. For devices like <a href="https://kb.netgear.com/24224/How-do-I-view-the-activity-logs-of-my-Nighthawk-router">Netgear</a>, there is enough documentation available or if your wifi router is provided by your ISP, ask them to activate it for you.</p></li><li><p>If you are families with DNS configuration, use<a href="https://blog.cloudflare.com/introducing-1-1-1-1-for-families/"> Cloudflare DNS Resolver</a> to secure your internet access from malware and adult content.</p></li><li><p>Don&#8217;t share Wi-fi Password with your kids. Or if your Wifi Router has ability to create multiple profiles, create a separate limited profile for your kids. Get Wifi routers like <a href="https://amzn.to/2XlB3Vg">Amazon Netgear</a> Nighthawk for enhanced security.</p></li></ol><p><strong>Children</strong></p><ol><li><p><strong>Develop Awareness -</strong> Talk to your parents or elder siblings with considerable knowledge in tech. Gain basic understanding of cyber bullying, netiquette, virus protection to identify wrong doings over the internet.</p></li><li><p><strong>Use Strong Passwords</strong>. Change your passwords when you receive an account from school. Gamefy your password creation process. Never use your personal information like date/year of birth, etc as passwords. Don&#8217;t use your best friends name as your password. Try keeping easy to remember passwords like&nbsp;!Like3Doughnuts (I Like 3 Doughnuts) or D0ntP00Phere (Don&#8217;t Poop Here) or something funny that you can remember. Share passwords with your parents or legal guardian or your elder siblings. Never share passwords with outsiders, friends or even relatives without first checking with your parents.</p></li><li><p>Don&#8217;t open emails from strangers or from email address with names of your parents but email address not belonging to your parents. E.g. if you see an unusual request from your mom or dad via email with their name, validate the email it has come from. If the email is not recognized, call them and verify. Also don&#8217;t click any unfamiliar links or download files as attachments.</p></li><li><p>Never accept invites from unknown people on Social Networking sites like Facebook or Instagram. Engage with Direct Messages only from friends you know. If you feel someone is trolling you or cyber bullying you in school, inform immediately to your parents and school teacher. Online Trolls and Cyberbullies are harmless once they are exposed to many people.</p></li><li><p><strong>Device Safety</strong>&#8202;&#8212;&#8202;Never leave your device unattended, log off or shut down when not using the device. Never allow others to connect to your device via Bluetooth or <a href="https://support.apple.com/en-us/HT204144">AirDrop</a> nor share your device password with anyone other than your parent or guardian.</p></li><li><p><strong>Contests, Clubs or Challenges</strong>&#8202;&#8212;&#8202;Don&#8217;t enter any contest, challenges or clubs that are not associated to your school or community and even then, check with your parents or guardian when doing so. Most of these contests or clubs retrieve your personal information in pretext to malicious activities.</p></li></ol><p>These are simple and easy steps to follow to ensure that your children are protected online. Encourage your kids to be cyber security champions and ask them to share these best practices to their immediate friends and classmates to gain confidence. You have an important role in protecting the internet. Play your part&nbsp;!!!</p>]]></content:encoded></item><item><title><![CDATA[7 signs your digital transformation strategy is shortsighted and will be short-lived]]></title><description><![CDATA[Digital Transformation is not the sudden digitization of your business, but rather as a holistic strategy to reform your company&#8217;s&#8230;]]></description><link>https://ravigokulgandhi.com/p/7-signs-your-digital-transformation-strategy-is-shortsighted-and-will-be-short-lived-d159dbe50999</link><guid isPermaLink="false">https://ravigokulgandhi.com/p/7-signs-your-digital-transformation-strategy-is-shortsighted-and-will-be-short-lived-d159dbe50999</guid><dc:creator><![CDATA[Ravi Gokulgandhi]]></dc:creator><pubDate>Fri, 04 Sep 2020 13:46:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a7df7eed-085f-4339-a8d3-a96b5d165505_800x437.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rGr3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rGr3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rGr3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rGr3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rGr3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa589b92d-4718-45a9-bd75-cbff35f636a2_800x437.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>There are memes going around various social networking sites on who led digital transformation in your company. But what is the essence of this meme?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6e3S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6e3S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 424w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 848w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 1272w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6e3S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6e3S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 424w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 848w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 1272w, https://substackcdn.com/image/fetch/$s_!6e3S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fa7b984-9664-4876-9a59-3c0d94c4683c_800x459.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p>Digital Transformation is not the sudden digitization of your business, but rather as a holistic strategy to reform your company&#8217;s traditional processes and to streamline existing experiences for both your employees and your customers, with a focus on reinventing, rather than refining your existing services. It is a long term strategy that can be likened to a marathon, and not a sprint. The goal of digital transformation is to increase revenue, provide better customer experience, and to minimize wastage through any procedural inefficiencies that may exist within the organization while ensuring security and governance. However, due to Covid-19 situation, many organizations have rushed into business continuity management to keep their business running. Companies that never offered work from home or remote working, are now taking pride in offering work from home for all their employees. Companies that thought cloud was a security nightmare are now rushing to adopt cloud platforms. And companies who thought that client interaction can only happen in person are now finding innovative ways to connect with their customers remotely to comply with social distancing.</p><p>But have these organizations done thorough planning before adopting these digital workplace platforms? And do they align with their long term IT Strategy in helping their business go digital during and post Covid19?</p><p>A short-sighted digital transformation strategy is like a pain killer that can address your immediate problem but will not resolve the core underlying problem. This reminds me of a situation where I used to pop a painkiller every-time I had a migraine which in turn made caused more acidity which actually was a trigger to my migraine. The moment I started working towards fixing my acidity problem which actually took time as well as changing some of my habits, my migraine problem fixed eventually.</p><p>In the case of many organizations, shortsighted digital transformation strategy can cause major issues that can have a significant impact on your organization culture, decreased adoption programs, the increased total cost of ownership.</p><p>The following are the 7 signs that you need to pay attention to ensure that your Digital Transformation strategy is not shortsighted</p><ol><li><p><strong>You are using time-bound platforms without post Covid19 conversion strategy</strong>&#8202;&#8212;&#8202;Email and Collaboration Tools like Microsoft Teams and Google Hangout Meet have offered six-month free usage of their remote working and collaboration platform. While these platforms are robust and enterprise-grade, what is their roadmap after the trial period completes? Has your organization budgeted the total cost of ownership once the trial period expires? Or what is the impact of downgrading the functionality to their most basic version? Are you prepared for functionality loss? Data Loss?</p></li><li><p><strong>You have offered BYOD (Bring Your Own Device) without having a Device Management Tool in place</strong>&#8202;&#8212;&#8202;Many organizations have offered employees, contractors, and partners to use their own device to access enterprise data. This is a great decision given the challenges in providing corporate devices to your users. But is there a device management mechanism in place to ensure that the devices are compliant and follow guidelines to ensure that your data is safe during transit or at rest? Do you have a mechanism in place which prevents any malicious attempt for data loss by the user knowingly or unknowingly by copying data in a flash drive or personal cloud storage devices?</p></li><li><p><strong>Shadow IT is prevalent in your organization&#8202;</strong>&#8212;&#8202;Shadow IT refers to the usage of applications and infrastructure without the knowledge of your enterprise IT department. IT can include hardware, software, cloud applications, or web services / API that employees turn to without IT authorization to accomplish their tasks or projects. Your employees may choose to use a variety of cloud platforms like Dropbox, Box, OneDrive, Google Drive for data storage, or your sales team my try or buy CRM applications without the knowledge of corporate IT, or build an application on various Low-Code/No-Code application building platforms like Power Apps or App Sheet that may be part of your Office 365 or G Suite tenant. Or buy one of the many Low-Code/No-Code applications in the market using their personal or corporate credit card against a reimbursement.</p></li><li><p><strong>You have a tech and talent mismatch and end up engaging OEM vendor for help all the time</strong>&#8202;&#8212;&#8202;Many tech vendors provide you with a complimentary trial during Covid19 that lasts for months, but does your organization have skills to support it? Is there an SOP made available for your IT Helpdesk to resolve basic queries about the platform? Do you have a specialist available in case of critical issues? In the absence of skilled resources or a managed services provider with predefined SLA, tech support from OEMs can do as much around their product but cannot help you fix your processes or adoption. It is imperative that your organization understands the skill gap across all levels and establishes a clear strategy to migrate this risk by employing the right resources or engaging with a cost-effective managed services provider to provide both proactive and reactive support.</p></li><li><p><strong>You have many initiatives going on in your IT Portfolio and most of them are at evaluation or experimentation stage</strong> <strong>by the same team</strong>&#8202;&#8212;&#8202;Your organization may be in the middle of migrating critical workloads on cloud or making available collaboration tools to your users, while at the same time the same team or leadership is busy with other initiatives like Bot, Blockchain, Machine Learning, IoT without a clear strategy or charter. Covid19 has triggered many initiatives to align enterprise strategy with remote working and IT departments are overwhelmed with several initiatives around cost savings, security, compliance, and collaboration. While running these initiatives in parallel may not be an issue, having the same team running these in parallel may be alarming.</p></li><li><p><strong>You don&#8217;t have a PMO (Program Management Office)</strong>&#8202;&#8212;&#8202;There is a misconception that a PMO is required for large enterprises. A PMO is beneficial to any business that would like to measure the effectiveness of their projects and gain insight on critical metrics that impact their organization directly. A PMO is a lense to an executive body to summarize performance on the projects, establish policies, processes &amp; guidelines and bring down silos that may result in duplicate initiatives or lack of communication. Depending upon your organization size, a PMO with a small team can bring order to chaos and improve visibility to all stakeholders involved. PMOs can ensure seamless connection and communication between operational teams like Finance, Procurement, Human Resources with Delivery &amp; Leadership teams.</p></li><li><p><strong>You don&#8217;t have an Enterprise Architecture Office</strong>&#8202;&#8212;&#8202;As the organizations grow and business processes evolve, their IT landscape tends to become more complex. There are always buy vs build decisions and cost may not be the only metric in picking the right approach. A suboptimal application or platform can result in an architectural debt, a situation where a system or group of systems don&#8217;t perform the way they were intended due to a root cause that can be expensive to resolve and thus causes many inexpensive short terms fixes that may involve adopting processes and workarounds for the systems to work as intended. An Enterprise Architecture team can range from a governance body to an active team in defining IT strategy, building to-be landscapes, ensuring business alignment and taking part in demand management, this all depends on the organization needs, what issues it is facing and what the Enterprise Architecture Office role is defined to be.</p></li></ol><p>Organizations often term some digital transformation initiatives as failures, while others are put on indefinite hold. But in any case, they end up being ghosts from the digital past that may haunt many new initiatives going forward. If your organization sees any of the 7 signs above, it is imperative to analyze the risk and impact of your current situation and design a risk management plan. As a Digital Transformation Consultant, I can help you with your Digital Maturity Assessment, calculate Total Cost of Ownership, and provide a roadmap and a plan.</p><p>Stay Safe&nbsp;!!!</p>]]></content:encoded></item></channel></rss>