Information Technology

Leveraging Open Source for Digital Transformation of Enterprise

Organizations have to constantly change and tailor their business strategy to meet the changing needs of internal and external customers. However, in recent years, they have not been prepared to take advantage of the digital paradigm that has enveloped and embraced every aspect of the customer lifecycle. The explosive growth of e-commerce, mobile and social media has completely altered the customer’s lifestyle and buying habits.

What Big Data Needs to be Coupled With to Actually be Useful

Big data has become tremendously popular with businesses these days. It’s the latest buzz term that everyone seems to be using to indicate their willingness to use new technology to improve their companies. That doesn’t make it bad; it just means that it’s a clear trend many are eager to become a part of. In fact, its transformative effect is very real despite the tendency of businesses to refer to it as if it were a shiny new toy. As revolutionary as big data analytics has been in just the past few years, some organizations may be misunderstanding how to truly get the most out of it.

The Open Source Benefits for Businesses

The open source technology originated at the “bottom of the stack” with the Linux operating system, which has become one of the most popular operating systems now. In late 1990’s the term open source was coined and the evolution of Apache, Mozilla, Perl took place, while birth of “Commercial Open Source” was seen in early 2000. The adoption started moving up the technology stack in 2005 and post 2008, Open Source adoption by enterprises was seen widely and in 2012 open source became an integral part of every enterprise IT strategy.

Big Data's Ability to Tell a Story

To even suggest that the construction and communication of a story could one day be taken over by computers can lead to eye rolling and dismissive scoffs. After all, storytelling is a uniquely human activity, one that requires creativity, emotion, and a connection with the human audience. At first glance, computer could never replicate such a thing, right? The conventional wisdom, however, might be off in this case. With the rise of big data, new ways to create and tell stories have been developed, leading many to rethink what they previously held to be true about the art of storytelling.

What is Internet of Things (IoT) and its Impact on Industries?

A British entrepreneur, Kevin Ashton coined this term “Internet of Things” in 1999. Also called “Internet of Everything”, it is the way of interaction amongst network of physical objects or things included within software, sensors, electronics, and connectivity. It enables objects to transfer data inside a network, to connect with humans, with computers or with other objects.

The Need for Decentralized Cloud Computing

On an early August morning, users of Amazon Web Services (AWS) woke up to some rather startling and frightening news. Error messages indicated that services were down both for the Simple Storage Service (S3) and Elastic Compute Cloud (EC2) solutions that Amazon provides. This severe outage lasted well into the afternoon and early evening before Amazon finally notified its customers that the problems had been corrected and services restored. While the outage lasted less than a day, it sparked a new discussion about what caused it and, just as important, how to prevent such outages from occurring in the future. For some, the solution to the problem was clear: decentralized cloud computing.

Web Application Security Testing: SAST, DAST or IAST?

Since early 2011 Gartner has been writing about how to combine Static application security testing (SAST) and Dynamic application security testing (DAST) approaches to application security testing and raising many questions about the subject. This post will explain the differences between the two methodologies, the advantages disadvantages of the two approaches and how they can work together from a business perspective and from the perspective of web applications, as these are the weakest in term of security.

Static Application Security Testing (SAST) 

Why More Health Care Organizations Are Turning to SaaS Solutions

There’s no denying it: The cloud has become an integral part of the health care delivery system. According to one recent survey, 83 percent of all health care organizations are using cloud-based services, with the vast majority of those services Software as a Service (SaaS) applications.

This represents a marked increase over the past few years, where health care organizations expressed reluctance to take advantage of the cloud due to concerns about security, regulatory compliance issues, and questions about functionality during implementation. In fact, the same survey found that only 6 percent of health care organizations have no plans to leverage the cloud in any way.

The Promising Future of the Internet of Things in India

The Internet of Things (IoT) is lauded by most as the next great revolution in technology. A world where every object we use has a sensor, enabling it to connect to the internet so it can communicate with each other and the user is a world that seems like something out of science-fiction. With the Internet of Things fast approaching, that world could become a reality very soon. Experts estimate that the IoT market could be worth as much as $1.7 trillion by 2020, with more than 50 billion devices connecting to the IoT by that time. But where will much of that growth come from? The U.S.

Smart Wearables and Cloud Security: The Rise of Mobile Malware

When you look at the greatest technological advances of the past several decades, it's clear that software has taken the lead. While hardware continues to improve, get smaller and do more with less, it's software that has enabled feature-rich operating systems that can exist on an interface barely larger than your hand. Hardware has maintained a more or less consistent form. It's no wonder then that many corporations are still painfully in the dark ages when it comes to the increase in the BYOD ecosystem. As the new Apple Watch and other smart watches begin to hit the scene, it's going to become increasingly difficult for network engineers to keep company networks secure.