|
![]() |
|
|||||||||||||||
![]() ![]() webhalla @RickvanSoest Proficiat Rick met onze mooie verjaardag! You say it's your birthday It's my birthday too, yeah They say it's your birthday We're gonna have a good time I'm glad it's your birthday Happy birthday to you Birthday - The Beatles https://t.co/pGKgl7lDwH 16 Jan 2023 “Jouw helpen gezonder te leven, staat voorop bij VGZ”. Maar dan vooral niet uitkeren en niet reageren op klachten. U kunt nu nog weg. #zorgverzekering #vgz Al 3 maanden geen reactie op bevestigde klacht nr 01027044 d.d. 25/9/2022 https://t.co/kYEvH44YIM 26 Dec 2022 Hi VGZ, al meer dan twee maanden geen reactie na bevestigde klacht (nr 01027044 d.d. 25/9/2022) over aanvragen #vergoeding zittend #ziekenvervoer. Schiet al meer dan een jaar voor en U belooft binnen twee weken reactie. #zorgverzekering #vgz voor iedereen? https://t.co/AylZmJmSs7 https://t.co/f6DYLGPQHG 17 Dec 2022 @VGZ, al weer twee maanden geen reactie na bevestigde klacht (nr 01027044 d.d. 25/9/2022) over #vergoeding zittend #ziekenvervoer. Schiet nu al meer dan een jaar #taxi voor en U belooft binnen twee weken reactie. #zorgverzekering #vgz #crepeerverzekering dan maar #ambulance ? 26 Nov 2022 @VGZ , Wanneer krijg ik antwoord op bevestigde klacht (nr 01027044 d.d. 25/9/2022) over #vergoeding zittend #ziekenvervoer zodat ik ook weer “voorop in #gezondheid en #zorg” kan. Schiet nu al meer dan een jaar voor en U belooft binnen twee weken reactie. #zorgverzekering #vgz https://t.co/gupLw0ZPY7 12 Nov 2022 |
About Johan van Soest![]() Ing. Johan van Soest CIPM is:
![]() MottoI strive towards structured, standardized, redundant, stable ICT-solutions with the best possible service for internal and external customers bound by policy, possibilities and budgetPersonal Data is protected by continuously improving the Availability and Integrity of data and increasing Confidentiality (CIA triad) through technical and organisational measures (training, awareness, encryption, anonymization and procedures)
..:: Certified Information Privacy Manager ::..The CIPM is the world's first and only certification in privacy program management. When you earn a CIPM, it shows that you don't just know privacy regulations-you know how to make it work for your organization. In other words, you're the go-to person for day-to-day operations when it comes to privacy. The IAPP's CIPM, CIPP/E, CIPP/US and CIPT credentials are accredited by the American National Standards Institute (ANSI) under the International Organization for Standardization (ISO) standard 17024: 2012. Since 2018 the IAPP credentials received global recognition by the International Accreditation Forum Multilateral Recognition Arrangement and ANAB-accredited...:: Hardware ::..The computer science education sector 'Hardware' does not only include the Hardware design of a computer (see computerarchitectuur) but also includes peripherals, analog and digital (a- and synchronous sequential) circuits with and without local intelligence..:: Software / Programs / Programming ::..Software education within the computer science education can be divided into:
..:: ComputerArchitectuur ::..Computer architecture is the course that educates the designing of computers. It includes:
..:: Interfacing ::..The connection between computers and between computers and periferals. These are all the devices used to convert electrical signals to and fro the computer. One can think of printers, robot arms, sound- and video cards, modems, computer networks etc....:: ComputerNetwerken ::..The course Computer networks lectures the communication between computers, between computers and peripherals and communication with digitizing equipment. It builds on the knowledge gained with the courses Telecommunication and Datacomunication. The main topics include:
..:: SysteemOntwerp ::..The course software engineering, aims at the difficulties that arise when constructing large programs. It builds on the informatics knowledge together with the organizational management and psychological knowledgeThe course software engineering is structured as a theoretical study and two practices. The solution strategy has the following stages:
..:: OperatingSystemen ::..The Operating System (MS-DOS, MS-Windows, Linux and Unix are some well known "OS'ses) is a program that has the purpose to create a workspace to enable the users to execute programs and process and store data. The main purpose is ease of use, the secondary purpose is efficient usage of the computer hardware. During the TCK education, the main attention is to single/multi-user and single/multiprocessor operating systems, disk/file organization and semaphores...:: DataCommunicatie ::..The TCK course data communication teaches the technologies that are required when (a- and synchronous) digital signals are being transmitted over analog telecommunication media (ether, glass fiber, cable). Main points of interest are:
..:: RegelTechniek ::..In the course Process Control of the TCK education both analog and discrete process control is teached.Points of interest include:
..:: CompilerBouw ::..The course Languages and Compiler Construction teaches the mathematical description of several regular languages on which compilers are constructed. A compiler is a program that reads programs written in a certain source language and converts it to a target language that can be executed on specific hardware. The main tasks of a compiler are the translation process and the generation of error messages and warnings when the source language (program) does not complies with the syntax of the programming language...:: DataBases ::..The TCK course Databases consists of:
..:: BestandsOrganisatie ::..This course teaches everything needed to create an optimal solution for a given problem (create, maintain or query databases). This way one can make an educated decision to:
..:: Recovery Time Objective ::..A definition of the amount of time it takes, from initial disaster declaration, to having critical business processes available to users. Although automation greatly contributes to enabling low RTO, this metric can't be quantified mathematically...:: Recovery Point Objective ::..A definition of the amount of data loss that's deemed acceptable, defined by application, in the event of a disaster-failover scenario. This can be from zero to minutes or hours depending on the criticality of the data. It's a definition that can be quantified by an examination of a given I/O profile, the available bandwidth linking the primary and recovery sites, and the applications tolerance to latency."..:: Log shipping ::..Log shipping is one of the failover solutions offered by Microsoft SQL Server.Failover means substituting a primary server with a backup (sometimes also referred to as standby) server if the primary hardware becomes unusable. To keep the data current and to minimize risk of data loss the process ships, on a continuous basis, SQL Server transaction log backups to the standby SQL Server and automatically restores them to the database. Log Shipping can be used to provide close to 100% uptime ..:: TFA ::..Two Factor Authentication.Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. In this context, the two factors involved are sometimes spoken of as something you have and something you know. ..:: BCM ::..Business Continuity Management.A holistic management process that identifies potential threats to an organization and the impacts to business operations that those threats-if realized-might cause, and which provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities.
To complement this education, he studied relevant courses at the Technical University of Eindhoven. He especially liked the social orientated courses and the team based courses. That his interests are not limited to technical issues, is shown by the fact that he also managed to complete, with success, the Management education for technicians in Utrecht (The Netherlands)
To support the necessary legal knowledge about the on May 25th 2018 enforced European privacy laws, the General Data Protection Regulation (GDPR), Johan is certified as Information Privacy Manager (CIPM). CIPM is the world's first and only certification in privacy program management. ![]() Brief career descriptionJohan is employed at the ICT - Department of Brabantia. This is a global operating leading company that designs, produces, sells and distributes household goods. There he started programming and supporting the mainframe software for manufacturing (MRP, purchasing, calculation, planning, inventory management), logistics and sales. Next he worked as a system designer for these ERP applications and was responsible for the Mainframe Management (3 mainframe operators). Because of his advice to standardize on one platform for software development and network management, significant costs could be saved on network management and expensive mainframe licenses and accompanying expensive hardware upgrades. Realising an immediate cost saving of 1.5 million guilders and additional yearly savings on expensive Mainframe licenses. After having successfully managed the large network and mainframe migration projects, Johan was employed as Business Continuity Manager (BCM) and ICT - Specialist within the same company. In this role the groupleaders and ICT-Manager are coached in organizing, describing, configuring and testing disaster recovery procedures concerning the worldwide ICT services. Modifications and investments are assessed against possible consequences for disaster recovery, and high availability of the final solution. Given the constant introduction of new technologies, trends and services a continuous improvement process (Deming) is set up, so the changes are consolidated in standardized procedures.
Given the positive results of the BCM role, Johan was asked by management in 2017 to assume the role of Data Protection Officer FG / DPO of the General Data Protection Regulation (AVG / GDPR). In 2018 he has achieved the world renowned IAPP
CIPM certification.
ICT renews itself so quickly with new concepts and technologies so "lifelong learning" consisting of a solid education supplemented by product-oriented courses and through professional literature is required. A complete list of courses can be found here (Partially in Dutch). Successful projects![]() Project steps.
Current tasks
|
|||||||||||||||
Generated by WebHalla™ Version 0.1.e.6 : Tuesday 21-3-2023
© Copyright 1995-2023 ing. Johan P.G. van Soest CIPM
Weather in Waalre by
![]() ![]() Temperature 12.46 °C
![]() Wind chill 11.88 °C
![]() Humidity 81 %
![]() Air pressure 1011 hPa
![]() Wind speed 4.63 m/s
![]() Wind direction South West
![]() ![]() Sun Rise 6:39
![]() Sun Set 18:51
![]() Updated:2023-03-21 18:24:21
![]() |