RESOURCES


   
The art of finding (and fixing) cloud faults THE ART OF FINDING (AND FIXING) CLOUD FAULTS

blog article

Jan 15, 2018

There is no doubt that cloud computing offers huge benefits to organisations, but CIOs must accept and manage the potential barriers to realising its value. Service faults and latency issues can prove problematic, for example, when the application in question is business-critical. They can also cost...

Read More

The Express Route to a hybrid Azure platform THE EXPRESS ROUTE TO A HYBRID AZURE PLATFORM

blog article

Jan 15, 2018

Cloud computing is promising much – but is failing in many areas as users get to grips with some of its more complex areas.  An example here is when organisations start to look at how best to use multiple cloud platforms across a private and public environment – what is known as a &...

Read More

Choosing the right public cloud provider: A checklist CHOOSING THE RIGHT PUBLIC CLOUD PROVIDER: A CHECKLIST

blog article

Jan 11, 2018

It is common knowledge that moving to the cloud can cut business costs, streamline workflows, eliminate the need for hardware and reduce requirements for in-house IT personnel. The cloud can also make it easier for people to work remotely, collaborate, backup their data and ensure business continuit...

Read More

Chef: The DevOps tools arms race is over, time for application-centrism CHEF: THE DEVOPS TOOLS ARMS RACE IS OVER, TIME FOR APPLICATION-CENTRISM

blog article

Jan 10, 2018

Technical community manager for the EMEA at Chef Software Mandi Walls thinks that DevOps itself is approaching the point of mainstream monetisation. So much is this the case that she suggests we are at the point of seeing the monetisation of [DevOps] buzzwords and certifications, which happens when ...

Read More

ROBOT: For When the Metal Ones Decide to Come for You ROBOT: FOR WHEN THE METAL ONES DECIDE TO COME FOR YOU

blog article

Dec 13, 2017

Dust off your Old Glory Insurance policy, ROBOT attack is now a real thing that can happen to you.  Researchers Hanno Böck, Juraj Somorovsky, and Craig Young have a new attack to tell you about, and they have named it Return of Bleichenbacher’s Oracle Threat (ROBOT). Their main findi...

Read More

OWASP – The Superhero of AppSec OWASP – THE SUPERHERO OF APPSEC

blog article

Dec 07, 2017

The security industry needs unbiased sources of information who share best practices with an active membership body who advocates for open standards. In the AppSec world, one of the best is the Open Web Application Security Project (or OWASP).

Read More

7-Point Checklist for Selecting a Managed Security Services Provider 7-POINT CHECKLIST FOR SELECTING A MANAGED SECURITY SERVICES PROVIDER

blog article

Nov 28, 2017

A mixed bag of services: Your business risks are unique, as is your budget. In order to deliver the most in-depth security coverage, you should look for providers that offer a wide range of services, provide multiple service levels, give you the ability to mix and match and have prepackaged offering...

Read More

A lot has changed in 20 years, especially when it comes to technology A LOT HAS CHANGED IN 20 YEARS, ESPECIALLY WHEN IT COMES TO TECHNOLOGY

blog article

Nov 21, 2017

Just as technology has greatly changed in the last 20 years, so has the world of IT. John and Steve can attest to that as they continually position customers’ IT needs for the future. Like Steve, John and the 550 OneNeck employees, the company is constantly looking ahead, surveying the IT land...

Read More

Why Enterprises Seem Obsessed With Cost When It Comes to Cloud Computing WHY ENTERPRISES SEEM OBSESSED WITH COST WHEN IT COMES TO CLOUD COMPUTING

blog article

Nov 20, 2017

Embarking on a digital transformation usually begins with the important goals of improving the customer experience and creating a cohesive, integrated environment for business processes. Rounding out the motivation to move to cloud computing is the expected cost savings that come with subscription-b...

Read More

TrustSec: The Cybersecurity Enforcer TRUSTSEC: THE CYBERSECURITY ENFORCER

blog article

Nov 16, 2017

So many newsworthy hacks in recent years have had a staggering impact on literally millions of consumers and businesses. While these hacks have perhaps made us numb to their effects, the reality is these breaches represent the new normal in today’s digitized world. And given that attackers are...

Read More

7 Ways IoT is Reshaping the Internet 7 WAYS IOT IS RESHAPING THE INTERNET

blog article

Nov 15, 2017

Two decades ago, the Internet was the shiny new object in the room. The Worldwide Web was just emerging as a new paradigm for communication and commerce, and the world brimmed with possibilities. Today, not only has the Internet fulfilled those nascent dreams, it has become the undisputed foundation...

Read More

Cisco Email Security is Top Solution CISCO EMAIL SECURITY IS TOP SOLUTION

blog article

Nov 15, 2017

Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware,...

Read More

WHAT ARE THE OPTIONS WHEN IT COMES TO OUTSOURCING CUSTOM SOFTWARE DEVELOPMENT? WHAT ARE THE OPTIONS WHEN IT COMES TO OUTSOURCING CUSTOM SOFTWARE DEVELOPMENT?

blog article

Nov 14, 2017

The digital transformation processes require service providers to offer new options for how the Application Development and Delivery Leaders and service providers structure their engagement. In addition to the traditional staff augmentation and fixed-price models, there are various new partnership m...

Read More

What executives can learn from future technology WHAT EXECUTIVES CAN LEARN FROM FUTURE TECHNOLOGY

blog article

Nov 14, 2017

Future technology is rapidly changing the way we live and work, and IT professionals who keep abreast of these innovations will be rewarded. Here’s a look at 15 technologies that are going to have major impacts on how people work and live by 2020. Artificial intelligence (AI) is a hot topic in...

Read More

Outsourcing IT Can Be A Winning Master Plan OUTSOURCING IT CAN BE A WINNING MASTER PLAN

blog article

Nov 13, 2017

These days, many businesses lack the internal resources to run effective internal IT operations. Outsourcing IT gives organizations access to deep expertise and saves on employment costs, among many other benefits.

Read More

Keep Nutanix Calm and carry on cloud computing KEEP NUTANIX CALM AND CARRY ON CLOUD COMPUTING

blog article

Nov 08, 2017

In addition to its core product updates released in line with the European leg of its.NEXT conference and exhibition series, enterprise cloud company Nutanix has added to its set of cloud tools, services and operating system components with some additional items. These would be CPU-intensive applica...

Read More

Why the Cloud Doesn’t Always Appeal to Enterprises Seeking Unified Communications WHY THE CLOUD DOESN’T ALWAYS APPEAL TO ENTERPRISES SEEKING UNIFIED COMMUNICATIONS

blog article

Nov 06, 2017

While you may hear a lot about the benefits of cloud adoption for unified communications (UC), the reality is that cloud adoption for UC is just as complicated and messy as it is when it comes to data storage or networks. Enterprises see the appeal of the cloud, but the transition is often limited b...

Read More

Cloud native series: Avi Networks defines pros & cons CLOUD NATIVE SERIES: AVI NETWORKS DEFINES PROS & CONS

blog article

Nov 03, 2017

Cloud native applications are capturing the hearts and minds of strategic IT leaders by changing the narrative around how applications are developed and consumed. The growth in container and microservices adoption frees developers from the shackles of the underlying infrastructure so they can consum...

Read More

DBS Bank shows off API platform in fintech gold rush DBS BANK SHOWS OFF API PLATFORM IN FINTECH GOLD RUSH

blog article

Nov 03, 2017

DBS Bank, Southeast Asia’s largest bank by market cap, has claimed the honour of having the world’s biggest banking API (application programming interface) platform with over 155 APIs that developers can plug into to create a variety of services. These APIs run the gamut, from mortgage l...

Read More

Top Black Friday Fiascos Your Software Should Be Tested For TOP BLACK FRIDAY FIASCOS YOUR SOFTWARE SHOULD BE TESTED FOR

blog article

Nov 02, 2017

Software Glitches and high-traffic choke ups are some of the major scares that websites can face during peak shopping seasons. In the past, retailers have also taken required action to tackle these issues. Walmart, in 2016, built software called OneOps that helped handle peak traffic on Walmart.com ...

Read More

AT&T open sources Acumos AI via Linux Foundation AT&T OPEN SOURCES ACUMOS AI VIA LINUX FOUNDATION

blog article

Oct 31, 2017

American telecommunications mainstay AT&T is working with Indian multinational IT and networking technology firm Tech Mahindra to build an open source Artificial Intelligence (AI) platform named Acumos. Hosted by The Linux Foundation, the platform is hoped to provide a marketplace for accessing,...

Read More

Security startup silences chatty networks to thwart attacks SECURITY STARTUP SILENCES CHATTY NETWORKS TO THWART ATTACKS

blog article

Oct 31, 2017

The internet was never designed to be secure; a fact that has given information technology organizations fits for more than 20 years. The TCP/IP protocol behind the internet assumes a high level of trust for devices that are on an internal network and willingly shares information about other devices...

Read More

GARTNER TOOLKIT: IDENTIFY THE RIGHT COMPANY FROM 80+ AGILE/DEVOPS SERVICE PROVIDERS GARTNER TOOLKIT: IDENTIFY THE RIGHT COMPANY FROM 80+ AGILE/DEVOPS SERVICE PROVIDERS

blog article

Oct 30, 2017

The growth of digital business and the need for innovative projects is driving the increase of agile software development methodologies as well as DevOps adoption. Gartner Toolkit is listing the 80 most recommendable vendors in the world to help end-users selecting vendors in agile and DevOps areas....

Read More

Partner Spotlight: CDK Global PARTNER SPOTLIGHT: CDK GLOBAL

blog article

Oct 30, 2017

CDK Global is a leading global provider of integrated IT solutions to the automotive retail industry. In fact, they’re the only IT provider that understands the unique needs of auto dealers and dealerships. With 20 years of experience in networking, they use that knowledge to build the best ne...

Read More

Rising Online Sales will Contribute to Green Information Technology (IT) Services Market Growth By 2021 RISING ONLINE SALES WILL CONTRIBUTE TO GREEN INFORMATION TECHNOLOGY (IT) SERVICES MARKET GROWTH BY 2021

blog article

Oct 30, 2017

Green IT involves the practices related to information technology (IT) optimization and environmentally sustainable computing. It involves uses, manufacturing, design and disposing of servers, computers and associated subsystems such as communication system, networking systems, storage devices, prin...

Read More

The 4 Steps Your Organization Can Take to Boost Cybersecurity THE 4 STEPS YOUR ORGANIZATION CAN TAKE TO BOOST CYBERSECURITY

blog article

Oct 27, 2017

Cybersecurity investments are set to soar in the next few years, and there are plenty of reasons why. As smart cities evolve and more devices get connected to the Internet of Things, the threat vectors across the country multiply. According to IDC, worldwide revenues for security-related hardware, s...

Read More

The Future of IT Demands Simplicity THE FUTURE OF IT DEMANDS SIMPLICITY

blog article

Oct 26, 2017

The speed of change in technology requires manufacturers to deal with increasing complexity as well as the challenge of security. As technology evolves, the complexity it creates is challenging even the savviest IT professionals to keep pace — and the challenge is only getting steeper. When yo...

Read More

The Need of Regression Testing in the Agile World THE NEED OF REGRESSION TESTING IN THE AGILE WORLD

blog article

Oct 25, 2017

Regression testing is a software testing process that validates whether the software developed and tested earlier performs the way it should after being interfaced with another software. It is a program development process, which is performed mostly by code testing specialists and involves multiple ...

Read More

Business Continuity Requires a Plan for Data Management and Disaster Recovery BUSINESS CONTINUITY REQUIRES A PLAN FOR DATA MANAGEMENT AND DISASTER RECOVERY

blog article

Oct 23, 2017

A comprehensive data management strategy is becoming more critical as enterprises are recognizing the central role that information plays in business continuity. Data is one of the most important assets a company has, and the protection and management of data can help an enterprise succeed or doom i...

Read More

THE EVOLUTION OF INSIDER THREATS THE EVOLUTION OF INSIDER THREATS

blog article

Oct 23, 2017

October is National Cyber Security Awareness Month, a global campaign run annually to raise awareness about the importance of cybersecurity. We’ve asked some of our leading security experts here at Absolute to chime in on some of the most pressing issues in cybersecurity today. In the fourth a...

Read More

The Next Frontier in Rental Software THE NEXT FRONTIER IN RENTAL SOFTWARE

blog article

Oct 22, 2017

In this month’s cover story we tried to give you a feel for how rental industry software is covering virtually every aspect of a rental operation. Software makes the yard staff more efficient, as well as the service technicians, the sales staff, accounting and other office support, truck drive...

Read More

In the great AI debate, don IN THE GREAT AI DEBATE, DON'T FORGET ABOUT THE PEOPLE WHOSE LIVES IT WILL MOST AFFECT - THAT'S US

blog article

Oct 20, 2017

The government, business, and the tech sector are getting very excited about artificial intelligence (AI). For a government, AI presents an opportunity for a technology where the UK hopes to lead the world – a perfect example for politicians of the innovative, digital, global nation they want ...

Read More

Node4: security comes in NODE4: SECURITY COMES IN 'LAYERS', LIKE ONIONS

blog article

Oct 19, 2017

Cloud, datacentre, and communications software company Node4 has sauced up its security portfolio with a series of upgrades and new security services under the banner of SECaaS (Security as a Service).

Read More

10 TIPS TO LAUNCH A BESPOKE SOFTWARE PROJECT 10 TIPS TO LAUNCH A BESPOKE SOFTWARE PROJECT

blog article

Oct 19, 2017

If you’ve ever said, “I just wish there was a piece of software out there that could do this,” you may in actuality need a piece of bespoke software. Such software that is built specifically for you or your organization by a consulting firm will not only fulfil your wish, but it wi...

Read More

Contrast Security raises $30M for ‘self-protecting’ application software CONTRAST SECURITY RAISES $30M FOR ‘SELF-PROTECTING’ APPLICATION SOFTWARE

blog article

Oct 19, 2017

Application security startup Contrast Security Inc. has raised $30 million in a Series C round led by Battery Ventures that included previous investors General Catalyst and Acero Capital. Founded in 2014, Contrast Security provides “self-protecting” security software that protects enterp...

Read More

Applying some intelligence to Artificial Intelligence APPLYING SOME INTELLIGENCE TO ARTIFICIAL INTELLIGENCE

blog article

Oct 17, 2017

Navigating the turbulent waters of Artificial Intelligence (AI) and Machine Learning (ML) can seem like a daunting task to the uninitiated. In fact even the question of how AI relates to ML is answered differently depending on who you ask, as evidenced by the numerous articles about on these topics....

Read More

OT Meets IT at the IoT Solutions World Congress OT MEETS IT AT THE IOT SOLUTIONS WORLD CONGRESS

blog article

Oct 11, 2017

The worlds of IT and manufacturing have been converging for several years now, and nowhere was this trend more evident than at the IoT Solutions World Congress, held last week in Barcelona, Spain, and attended by ARC analysts. Co-sponsored by the Industrial Internet Consortium (IIC), the event took ...

Read More

IoT Investments Are Set to Jump in 2018 IOT INVESTMENTS ARE SET TO JUMP IN 2018

blog article

Oct 09, 2017

As for the size of companies taking the lead on committing to IoT, a greater percentage of firms with 10,000 or more employees plan to increase spending than is the case among small and medium-sized businesses, the survey finds. Among the biggest IoT spenders are companies that self-identify as &ldq...

Read More

Ford taps Silicon Valley startup to build transportation software FORD TAPS SILICON VALLEY STARTUP TO BUILD TRANSPORTATION SOFTWARE

blog article

Oct 09, 2017

Ford Motor Co. has begun to develop new transportation service applications using a software platform developed by Autonomic Inc., a small Silicon Valley startup. One of the first such businesses is a "microtransit" service called Non-Emergency Medical Transport, launched this summer by Fo...

Read More

Dental Software Market by Technology, Growth, Application & Geography – Analysis & Forecast to 2022 DENTAL SOFTWARE MARKET BY TECHNOLOGY, GROWTH, APPLICATION & GEOGRAPHY – ANALYSIS & FORECAST TO 2022

blog article

Oct 09, 2017

Market Study Report Add New Global Dental Software Market Size, Status and Forecast 2022 to its research database. The report spread across 103 pages with table and figures in it. The report focuses on top key players like LED Dental, Maxident, Navadha Enterprises and many more.

Read More

LEARN TO MODERNIZE LEGACY APPLICATIONS IN THE CLOUD WITH GARTNER RESEARCH LEARN TO MODERNIZE LEGACY APPLICATIONS IN THE CLOUD WITH GARTNER RESEARCH

blog article

Oct 05, 2017

Cloud is a core component of modern business agility. Cloud delivers agility, flexibility, and scale for the development and operations of both new, cloud-native applications, and the traditional applications that enterprises depend on to run their businesses. The problem with the latter group is th...

Read More

Poor software release management creates security nightmares POOR SOFTWARE RELEASE MANAGEMENT CREATES SECURITY NIGHTMARES

blog article

Oct 02, 2017

There are myriad factors that can influence when new software and software updates are released. Often, release schedules are determined in response to software-hungry consumers, competitor strategies, or the increasing pace of hardware development. Whilst some of these pressures are very real, and ...

Read More

As CCleaner illustrates, software security has a ‘systemic problem’ AS CCLEANER ILLUSTRATES, SOFTWARE SECURITY HAS A ‘SYSTEMIC PROBLEM’

blog article

Sep 29, 2017

It’s a truism of the Digital Age that anything can be hacked. It’s also a truism that things aren’t always what they seem. Those notions hold true for CCleaner, which, with 115 million monthly active users, is the most popular Windows system-cleaning and -optimizing software in the...

Read More

The growing role of software in PV systems THE GROWING ROLE OF SOFTWARE IN PV SYSTEMS

blog article

Sep 27, 2017

PV installations are no longer solitary and separate sources of energy. They are becoming an influential and integrated part of a distributed grid that can interact in real time. This transition is similar to how personal computers have become part of a larger network. In the early days of computing...

Read More

How to Implement the File Upload Process in a REST API HOW TO IMPLEMENT THE FILE UPLOAD PROCESS IN A REST API

blog article

Sep 25, 2017

File-sharing is one of the most elementary ways to perform system integration. In the context of web applications, we call “upload” the process in which a user sends data/files from a local computer to a remote computer. This guide will demonstrate one strategy, among many, to implement ...

Read More

88% OF RETAIL ORGANIZATIONS VULNERABLE TO DATA THREATS 88% OF RETAIL ORGANIZATIONS VULNERABLE TO DATA THREATS

blog article

Sep 22, 2017

Target. Kmart. Home Depot. Neiman Marcus. Some of the biggest names in retail have been hit hard by data breaches in past years. Despite increased IT security spending, data breaches across all industries are accelerating. 88% of retail organizations in the US consider themselves vulnerable to data ...

Read More

GSA’s EIS has Feds Thinking About Cloud Unified Communications GSA’S EIS HAS FEDS THINKING ABOUT CLOUD UNIFIED COMMUNICATIONS

blog article

Sep 22, 2017

Federal agencies are increasingly taking a serious look at their existing telecommunications infrastructure now that the General Services Administration (GSA) has awarded its Enterprise Information Services (EIS) telecommunications solutions contract. This contract offers Federal offices significant...

Read More

Part 2: DataWeave 2.0 Syntax Changes in Mule 4 Beta PART 2: DATAWEAVE 2.0 SYNTAX CHANGES IN MULE 4 BETA

blog article

Sep 21, 2017

In my last post, I discussed DataWeave 2.0 header and body (iterative functions) changes in Mule 4 Beta. In this post, I will dive deeper into the topic by discussing operator changes (within the body) as well as other changes.

Read More

How to secure the 7 stages of the sdlc HOW TO SECURE THE 7 STAGES OF THE SDLC

blog article

Sep 18, 2017

Security best practices can be the first thing to slip when your developer team is up against tight deadlines. By integrating security measures into each stage of the software development lifecycle (SDLC) your organisation will save time and money in the long run: it is 30x more expensive to fix a v...

Read More

The Demand for Managed Services Is on the Rise THE DEMAND FOR MANAGED SERVICES IS ON THE RISE

blog article

Sep 18, 2017

Companies are getting more comfortable with managed services. As Everything as a Service (XaaS) becomes more widely adopted by enterprises, there is an increased demand for providers that can offer bundled services that not only address the cloud components, but also tie up loose ends. That’s ...

Read More

Dimensional Modeling and Kimball Data Marts in the Age of Big Data and Hadoop DIMENSIONAL MODELING AND KIMBALL DATA MARTS IN THE AGE OF BIG DATA AND HADOOP

blog article

Sep 17, 2017

Contrary to a common misunderstanding, it is not the only purpose of data models to serve as an ER diagram for designing a physical database. Data models represent the complexity of business processes in an enterprise. They document important business rules and concepts and help to standardise key e...

Read More

Why You Need a VPN Today WHY YOU NEED A VPN TODAY

blog article

Sep 17, 2017

Security is one of the primary concerns of internet users today. Hacking and data theft are among the worst fears of everyday people who work and play online. In addition to concerns over these threats, internet users are often plagued by too many targeted advertisements, restrictions, and bad conne...

Read More

Software QA Testing: Outsourcing vs. Crowdsourcing SOFTWARE QA TESTING: OUTSOURCING VS. CROWDSOURCING

blog article

Sep 15, 2017

Writing code is hard. For some, this may come as a surprise, software quality assurance and testing are not easier. Of course, reporting bugs may not require too much technical skills. But the same cannot be said about evaluating a product from customer's perspective, understanding software prod...

Read More

Best Practices to Secure IT Servers and Infrastructure BEST PRACTICES TO SECURE IT SERVERS AND INFRASTRUCTURE

blog article

Sep 15, 2017

Network infrastructure is known to be the key business asset for organizations that are cloud computing for their critical line-of-business applications. In fact, the backbone of a smooth and sustaining business process is your network technology. The whole security of your system depends on how you...

Read More

The real convergence of IT and OT: How much longer do we have to wait? THE REAL CONVERGENCE OF IT AND OT: HOW MUCH LONGER DO WE HAVE TO WAIT?

blog article

Sep 15, 2017

In the past, information technology (IT) and operational technology (OT) were seen as two distinct domains of a business. The former focused on all the technologies that were necessary to manage the processing of information, whereas the latter supported the devices, sensors and software that were n...

Read More

How to modernize legacy applications with Microsoft Azure? HOW TO MODERNIZE LEGACY APPLICATIONS WITH MICROSOFT AZURE?

blog article

Sep 13, 2017

Today’s organizations face the challenge of building applications for the future while supporting the current environment. They are expected to run the business and build new applications simultaneously for better customer engagement, drive new revenue sources, and develop new products and ser...

Read More

The Incredible Growth of Python THE INCREDIBLE GROWTH OF PYTHON

blog article

Sep 12, 2017

We recently explored how wealthy countries (those defined as high-income by the World Bank) tend to visit a different set of technologies than the rest of the world. Among the largest differences we saw was in the programming language Python. When we focus on high-income countries, the growth of Pyt...

Read More

No Time Outs: 5 Cyber Security Tips to Protect Your Business in the Second Half NO TIME OUTS: 5 CYBER SECURITY TIPS TO PROTECT YOUR BUSINESS IN THE SECOND HALF

blog article

Sep 12, 2017

So you’ve survived the first half of the year with no serious data breaches or other cyber security mishaps. That’s good news. The bad news, however, is that you’ll have to do it all over again to get through the whole year that way, and the second half of the year is a lot rougher...

Read More

Making Multi-Cloud Work for Your Enterprise… Step by Step MAKING MULTI-CLOUD WORK FOR YOUR ENTERPRISE… STEP BY STEP

blog article

Sep 12, 2017

The days of the single cloud are gone. This change is driven by the breadth of technology options, potential cost savings, and the need for business agility.  However, enterprises making the move to multi-cloud face critical choices.  The failure to consider common risks can diminish or ev...

Read More

Equifax data breach — here EQUIFAX DATA BREACH — HERE'S WHAT WE CAN LEARN FROM IT

blog article

Sep 11, 2017

Although data breaches and cyber attacks have flooded the news for several years, the revelation that 143 million Equifax customer records were breached still raises eyebrows and a lot of concern. While it is too early to fully understand the Equifax breach, many people question how, despite thousan...

Read More

The next big thing in hard disks may be glass THE NEXT BIG THING IN HARD DISKS MAY BE GLASS

blog article

Sep 11, 2017

Hard disk makers are in a big of a struggle for survival. As SSDs grow in capacity and shrink in price, hard disk makers are losing business on the low end. Only the cheapest of laptops don’t have a SSD standard any more. And with affordable 1TB SSDs on the market, it’s a good choice for...

Read More

HPE Software Testing Tools Changed Hands: Why It Doesn’t Matter HPE SOFTWARE TESTING TOOLS CHANGED HANDS: WHY IT DOESN’T MATTER

blog article

Sep 08, 2017

By now everyone knows that the Micro Focus-HPE split is a done deal. We’re not going to bore you with yet another vendor-driven blog using this news to stir fear, uncertainty, and doubt in the hearts of the many software testers who’ve become accustomed to using HPE. Why are we holding b...

Read More

Software Development: Do It In-House or Outsource? SOFTWARE DEVELOPMENT: DO IT IN-HOUSE OR OUTSOURCE?

blog article

Sep 08, 2017

We often hear that we live in the world of possibilities. However, how often do you hear what these possibilities are? Besides, when you deal with outsourcing software development companies that have a domain knowledge in your target niche, they can give you more than just developers with the tech s...

Read More

How to “AMP” Your Endpoint Protection HOW TO “AMP” YOUR ENDPOINT PROTECTION

blog article

Sep 07, 2017

Malware is a broad term that encompasses any form of software designed to damage, steal or corrupt data. Ransomware, trojans, worms and rootkits are common malware examples, but the list is far more exhaustive, making fighting malware a normal part of operations for SMBs and corporations alike.

Read More

What Comes Next: Future-Proof Your IT Infrastructure WHAT COMES NEXT: FUTURE-PROOF YOUR IT INFRASTRUCTURE

blog article

Sep 06, 2017

By now, most IT leaders are familiar with the term “digital transformation.” It refers to a company’s ability to capitalize on a range of digital technologies. Across every industry – from financial services to healthcare – businesses can work smarter, serve customers i...

Read More

Veeam for the Microsoft Cloud at Microsoft Ignite VEEAM FOR THE MICROSOFT CLOUD AT MICROSOFT IGNITE

blog article

Sep 06, 2017

Greetings fellow IT professionals! After more than 20 years of TechEd in the late spring and early summer, Microsoft will give us Microsoft Ignite (formerly TechEd) in the fall from Sept. 25 – 29, 2017 in beautiful Orlando, Florida. I am so excited to get together with 10,000 of my closest IT ...

Read More

Common Reasons Companies Avoid a Move to the Cloud COMMON REASONS COMPANIES AVOID A MOVE TO THE CLOUD

blog article

Sep 05, 2017

Many companies recognize that moving to the cloud may be the only option for remaining competitive in a market that caters to the end user. Customers are demanding a personalized, user-friendly experience, and businesses utilizing cloud technology have the ability to meet that demand with frequent u...

Read More

How to decide which software vulnerabilities to fix first HOW TO DECIDE WHICH SOFTWARE VULNERABILITIES TO FIX FIRST

blog article

Sep 04, 2017

Software applications are susceptible to a diverse array of different vulnerabilities. With each vulnerability posing a unique set of problems, it can be difficult for development teams to decide on the right course of action. In order to balance the benefits of fixing a vulnerability with the costs...

Read More

Ransomware payments: Funding the business of cybercrime RANSOMWARE PAYMENTS: FUNDING THE BUSINESS OF CYBERCRIME

blog article

Sep 04, 2017

If you were considering becoming a cybercriminal or were perhaps a traditional villain looking to upgrade your skills for the 21st century, I’m sure your business model of choice would be running a ransomware operation. You would, thanks to the simplicity of platforms like Ransomware as a Serv...

Read More

TWO QUESTIONS TO ASK BEFORE CLOUD MIGRATION TWO QUESTIONS TO ASK BEFORE CLOUD MIGRATION

blog article

Aug 31, 2017

It wasn’t long ago that many believed that public cloud’s benefits were largely limited to greenfield application development. New applications would be developed, tested, and deployed in the cloud, but, traditional applications—due to their size and complexity—remained in ph...

Read More

5 Cloud Backup Myths Debunked 5 CLOUD BACKUP MYTHS DEBUNKED

blog article

Aug 31, 2017

Second only to your people, your data is your organization's most important asset. Backup is crucial, especially since SMBs and large enterprises alike are increasingly requiring constant availability of business-critical data. In the absence of disaster preparedness, organizations face risks as...

Read More

Veeam Support troubleshooting series: Linux FLR appliance deploy fail VEEAM SUPPORT TROUBLESHOOTING SERIES: LINUX FLR APPLIANCE DEPLOY FAIL

blog article

Aug 30, 2017

Veeam Support Team is excited to announce a brand-new way of sharing useful and important information with you. We have prepared a series of advanced-level tech articles based on real support cases. We hope you will like these articles as much as we like to help our customers. Linux FLR appliance de...

Read More

How safe are your passwords? Real life rules for businesses to live by HOW SAFE ARE YOUR PASSWORDS? REAL LIFE RULES FOR BUSINESSES TO LIVE BY

blog article

Aug 30, 2017

Changes to the National Institute of Standards and Technology (NIST) password guidelines were welcomed as long overdue. Security professionals criticized the old guidelines, which recommended a mix of numbers, letters and special characters that are changed periodically. Passwords as a sole authenti...

Read More

THE HBO HACK – COULD TIGHTER CYBER SECURITY HAVE PREVENTED IT? THE HBO HACK – COULD TIGHTER CYBER SECURITY HAVE PREVENTED IT?

blog article

Aug 29, 2017

According to Bruce Schneier, a cryptographer and computer security expert, “The mantra of any good security engineer is: ‘Security is a not a product, but a process.’ It’s more than designing strong cryptography into a system; it’s designing the entire system such that ...

Read More

Okta drives a new trajectory for directories OKTA DRIVES A NEW TRAJECTORY FOR DIRECTORIES

blog article

Aug 29, 2017

Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings forward advancements designed to power a new independent directory standard and integration ecosystem. Befo...

Read More

HDS aims to unify compute for hybrid clouds HDS AIMS TO UNIFY COMPUTE FOR HYBRID CLOUDS

blog article

Aug 29, 2017

Hitachi Data Systems (HDS), is a wholly owned subsidiary of guess who? Yes, Hitachi, Ltd. But the fine folks at HDS do like to remind us of this fact. Now very much a software company (even if you do have a Hitachi television), HDS is now focused on its Hitachi Unified Compute Platform (UCP) RS seri...

Read More

What to do if your public cloud is hacked WHAT TO DO IF YOUR PUBLIC CLOUD IS HACKED

blog article

Aug 29, 2017

It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur. The best way to recover from an attack, aka a hack, is ...

Read More

Deciphering VMware DECIPHERING VMWARE'S APPDEFENSE

blog article

Aug 29, 2017

Of all VMware's new subscription services, AppDefense deserves a bit deeper discussion. AppDefense is the flagship product of an entire new business unit at VMware. With security being one of the only real growth markets left in IT, it's a sensible investment by VMware. AppDefense appears to...

Read More

The Seven Steps to Building a Successful Software Development Company THE SEVEN STEPS TO BUILDING A SUCCESSFUL SOFTWARE DEVELOPMENT COMPANY

blog article

Aug 28, 2017

It has never been more challenging than today to build a successful software development company. Even just a few years ago, companies would offer breakfast at the office or put their people on training to hone and develop their skills. Today, however, we are in a different world. In order to attrac...

Read More

Skills for the world of the future: AI, Big Data, Robotics etc. SKILLS FOR THE WORLD OF THE FUTURE: AI, BIG DATA, ROBOTICS ETC.

blog article

Aug 28, 2017

Over the past few weeks we have had much hype of the effect of Artificial Intelligence, Big Data and Robotics on the world of work and the subjects we should be teaching our chidren. Almost exactly 35 years ago, Donald Michie, the “father” of research into machine intelligence, was given...

Read More

EXTENDING VMWARE’S CAPABILITIES WITH SKYTAP CLOUD EXTENDING VMWARE’S CAPABILITIES WITH SKYTAP CLOUD

blog article

Aug 24, 2017

Skytap is attending VMworld 2017 next week, and we’ll have our largest presence yet at one of IT’s most notable conferences. Looking at the VMworld 2017 agenda, it’s clear attendees understand IT modernization is vital to business success in the digital economy. Skytap Cloud was de...

Read More

Emerging Asia most vulnerable to malware EMERGING ASIA MOST VULNERABLE TO MALWARE

blog article

Aug 24, 2017

Bangladesh and Pakistan have the highest malware encounter rates around the world, followed by two other countries in the ASEAN region – Cambodia and Indonesia, according to Microsoft’s latest Security Intelligence Report. That those countries were most susceptible to malware is hardly s...

Read More

What Makes the Industrial IoT Different from the rest of the IoT? WHAT MAKES THE INDUSTRIAL IOT DIFFERENT FROM THE REST OF THE IOT?

blog article

Aug 22, 2017

It’s amazing how things have changed since then. Nowadays, everyone seems to have heard of the IoT. Turn on the news, and you’ll hear about the IoT and see images of products like health trackers, robot butlers, intelligent cars and smart home appliances.  So, today when I tell peop...

Read More

Artificial Intelligence, Communication, & the Evolution of Software Testing: Interview with Isabel Evans ARTIFICIAL INTELLIGENCE, COMMUNICATION, & THE EVOLUTION OF SOFTWARE TESTING: INTERVIEW WITH ISABEL EVANS

blog article

Aug 22, 2017

At the StarEAST software testing conference in 2017, Isabel walked onto stage during the popular “Lightning Strikes the Keynotes” session, and delivered a presentation on ancient Scottish sheep farming practices. The talk, which could only last 5 minutes, was informative, witty, profound...

Read More

Clover: payments are the next developer frontier CLOVER: PAYMENTS ARE THE NEXT DEVELOPER FRONTIER

blog article

Aug 22, 2017

Software application development engineers (in all forms and guises) will always be interested in monetising the commercial aspects of their creations when and if they want to take them to market, obviously. Moreover, commercial development projects with a market-facing proposition will also need to...

Read More

Is DevOps Helping Feds Put the Pedal to the Metal on Cloud? IS DEVOPS HELPING FEDS PUT THE PEDAL TO THE METAL ON CLOUD?

blog article

Aug 21, 2017

We are starting to hear very different language when federal IT leaders talk about modernization. Our panel at the Federal Focus event explored development and operations, or DevOps, as an approach to modernize and speed new development efforts; shrinking the window between idea and delivery. This i...

Read More

2017 Sees a Change in IT Budgets 2017 SEES A CHANGE IN IT BUDGETS

blog article

Aug 21, 2017

The big trend involving the transition from an on-premise solution to one in the cloud continues to grow. Computer Economics’ highlighted in a benchmark study in their annual report on staffing, and spending for 2017/2018 that this growing trend will continue to rise. Furthermore, the study fo...

Read More

The VCSP opportunity with Veeam Agent for Windows THE VCSP OPPORTUNITY WITH VEEAM AGENT FOR WINDOWS

blog article

Aug 21, 2017

For a good part of the last 18 months of my previous role as Lead Architect at a leading Veeam Cloud & Service Provider (VCSP) partner I was involved in a project to try and come up with an easy way for our clients to perform in-guest backups of their IaaS virtual machines. At that time it invol...

Read More

14 Warning Signs that Your Computer is Malware-Infected 14 WARNING SIGNS THAT YOUR COMPUTER IS MALWARE-INFECTED

blog article

Aug 21, 2017

The increasing number of Internet users worldwide creates an equal (or larger) number of opportunities for cyber criminals to take advantage of our systems. As we become more dependent on the online environment, we can clearly see a massive growth in malware and cyber criminal activities all across ...

Read More

Oracle opens Java EE, any takers? ORACLE OPENS JAVA EE, ANY TAKERS?

blog article

Aug 20, 2017

Oracle bought Sun, for various reasons. Popular commentary on the subject puts the purchase down to Oracle’s desire to have a more credible level of what might be called ‘operational software’ (not to suggest that the Oracle database stack doesn’t ‘operate’ in any...

Read More

FIVE ENTERPRISES RUNNING AIX IN THE CLOUD FIVE ENTERPRISES RUNNING AIX IN THE CLOUD

blog article

Aug 18, 2017

With support steadily growing for multi-cloud, the strategy of using the right cloud for the right workload, enterprises are increasingly turning their focus to specialized cloud providers that can support their unique needs. Simon Sherwood at The Register pointed out this week that these providers ...

Read More

7 Evolving Trends in Software Development 7 EVOLVING TRENDS IN SOFTWARE DEVELOPMENT

blog article

Aug 17, 2017

What’s the difference between a fad and a trend? A fad is ephemeral and burns out shortly after it ignites. For example, every holiday season we witness how some new and novel toy takes the market by storm–remember the Tamagotchi? But soon enough, few people care about these toys anymore...

Read More

Security Alert: Locky Adds the .lukitus Extension, Spreads through Waves of Malspam SECURITY ALERT: LOCKY ADDS THE .LUKITUS EXTENSION, SPREADS THROUGH WAVES OF MALSPAM

blog article

Aug 17, 2017

After infecting computers with recurring malicious email campaigns sent to random recipients in organizations from all over the world, Locky ransomware strikes again. Locky’s persistence is already famous, as cyber criminals use it frequently to exploit vulnerabilities in outdated systems. The...

Read More

Exploratory Testing Cuts the Risk of Software Failures EXPLORATORY TESTING CUTS THE RISK OF SOFTWARE FAILURES

blog article

Aug 16, 2017

Agile development compresses software testing cycles, jeopardizing risk coverage and opening the door for software failures. Here’s what you can do: The adoption of Agile and iterative development processes is forcing testing teams to conduct and complete testing more rapidly than in the past....

Read More

Throwing Away “Bad Software Testing” with Agile and RST: Interview with James Bach, Part 2 THROWING AWAY “BAD SOFTWARE TESTING” WITH AGILE AND RST: INTERVIEW WITH JAMES BACH, PART 2

blog article

Aug 14, 2017

If you have spent any time immersed in the world of software testing, you have probably come across James Bach. James is a noted thought leader, author, blogger, speaker, proponent and developer of exploratory testing, creator of the Rapid Software Testing ™ methodology, and all-around disrupt...

Read More

Ditching Textbooks and Teaching Cybersecurity via News Headlines: Modern Times Call for Modern Measures DITCHING TEXTBOOKS AND TEACHING CYBERSECURITY VIA NEWS HEADLINES: MODERN TIMES CALL FOR MODERN MEASURES

blog article

Aug 14, 2017

In a constantly changing field like cybersecurity, nothing stays the same for long. And as Jim Lewis, a senior VP at the Center for Strategic and International Studies, has learned first hand, this makes teaching about cybersecurity a challenge. And why not? When the headlines are dominated by stori...

Read More

WHY AIX IS MOVING TO THE CLOUD WHY AIX IS MOVING TO THE CLOUD

blog article

Aug 11, 2017

One reason that traditional applications have largely remained on-premises, while greenfield applications continue to be migrated to, and born in the cloud, is the technology they’ve run on for decades is tried and true. These applications continue to provide core business functionality that c...

Read More

Seven Kingdoms of IT: ScrumOps as the attempt to revolutionize software delivery SEVEN KINGDOMS OF IT: SCRUMOPS AS THE ATTEMPT TO REVOLUTIONIZE SOFTWARE DELIVERY

blog article

Aug 11, 2017

Loads of great things in software development have been done in the IT world over the course of decades. Along with all the achieved benefits, several self-sufficient kingdoms emerged on the IT arena. Here you can find separate territories with their proponents: Scrum masters, Lean loyalists, Automa...

Read More

User-Based Security Inside Power BI Dashboard USER-BASED SECURITY INSIDE POWER BI DASHBOARD

blog article

Aug 08, 2017

With the wide adaption of Power BI, reports from the data extracted various data sources and was shown at an enterprise level, this gave an important need of reporting model to be at an enterprise level. One of such enterprise level reporting features being providing data security among the users, i...

Read More

Protecting Your Organization From Phishing Schemes: Tips From the FBI PROTECTING YOUR ORGANIZATION FROM PHISHING SCHEMES: TIPS FROM THE FBI

blog article

Aug 08, 2017

It’s not just the bad actors that we at Core Security want to protect you from – we also want to protect you from yourself. It’s all hands on deck when it comes to securing your systems and the systems you interact with on a daily basis. Everyone personally has, on average, four de...

Read More

Emotet and Trickbot Banking Trojans Acquire Internet Worm Capabilities EMOTET AND TRICKBOT BANKING TROJANS ACQUIRE INTERNET WORM CAPABILITIES

blog article

Aug 08, 2017

Emotet and TrickBOT are two, relatively recent banking Trojans that have shot up in popularity in the past couple of years. Recently, researchers discovered that two have developed a new kind of malicious feature, directly inspired by the success of the WannaCry and Petya ransomware. The pair now co...

Read More

A Closer Look at the Ransomware Attacks: Why They Still Work A CLOSER LOOK AT THE RANSOMWARE ATTACKS: WHY THEY STILL WORK

blog article

Aug 08, 2017

Ransomware phenomenon continues to dominate the threat landscape and affect important sectors (hospitals, banks, universities, Government, law firms, mobile users) and various organizations equally worldwide. There are ransomware attacks happening on a daily basis and still have a high rate of succe...

Read More

Session Hijacking Takes Control of Your Accounts. Here’s How SESSION HIJACKING TAKES CONTROL OF YOUR ACCOUNTS. HERE’S HOW

blog article

Aug 04, 2017

Computer session in normal day-to-day speak is a temporary interaction you have with a website. For example, the time between you first log into your bank account, and then log off after your operation, is a session. During a session hijacking, a malicious hacker places himself in between your compu...

Read More

Plexxi offers technical validation for hyperconverged networking PLEXXI OFFERS TECHNICAL VALIDATION FOR HYPERCONVERGED NETWORKING

blog article

Aug 02, 2017

This is a guest post for the Computer Weekly Developer Network written by Mat Mathews in his capacity as co-founder and VP of product management at Plexxi — the firm is a specialist in converged and hyperconverged network infrastructure for public and private cloud deployments. Pressure is mou...

Read More

IoT is Big – Industrial is the Biggest IOT IS BIG – INDUSTRIAL IS THE BIGGEST

blog article

Aug 01, 2017

Without a doubt, there has been a lot of excitement about the impact of the Internet of Things (IoT) in various industries. According to Machina Research (now a part of Gartner), there will be 27 billion devices connected to the Internet by 2025. Frankly, this is one of the more conservative numbers...

Read More

WHY SSL/TLS ATTACKS ARE ON THE RISE WHY SSL/TLS ATTACKS ARE ON THE RISE

blog article

Aug 01, 2017

As enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security (SSL/TLS) game to hide their malicious activities. In the first half of 2017, an average of 60 perc...

Read More

Why is Compatibility Testing at the Core of Digital Transformation? WHY IS COMPATIBILITY TESTING AT THE CORE OF DIGITAL TRANSFORMATION?

blog article

Jul 31, 2017

At the recent Microsoft Inspire conference, CEO Satya Nadella has estimated digital transformation as a $4.5 trillion market. He further stated, “With increasing digitization, where every part of our society and economy has been fundamentally transformed because of digital technology, the oppo...

Read More

Wireless Mesh Networks: Everything you need to know WIRELESS MESH NETWORKS: EVERYTHING YOU NEED TO KNOW

blog article

Jul 31, 2017

You would be forgiven for thinking that wireless mesh networking is just another marketing bullet point for new Wi-Fi routers, a phrase coined to drive up prices without delivering benefits. But we can avoid being cynical for once: mesh technology does deliver a significant benefit over the regular ...

Read More

IOTA: A blockchain for the Internet of Things IOTA: A BLOCKCHAIN FOR THE INTERNET OF THINGS

blog article

Jul 28, 2017

Blockchains haven't had good press recently. Simple word-association connects 'the blockchain' to Bitcoin, Bitcoin to ransomware, ransomware to crime. So the blockchain is, to the uninformed, obviously a bad thing. On the other hand, technology evangelists around the world are touting th...

Read More

Operationalizing Cybersecurity OPERATIONALIZING CYBERSECURITY

blog article

Jul 27, 2017

Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows.  Just like organizations can’t achieve safety; they cannot achieve cybersecurity.  Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping ...

Read More

Basics needed to swerve security apocalypse BASICS NEEDED TO SWERVE SECURITY APOCALYPSE

blog article

Jul 27, 2017

When we last spoke towards the end of 2015, Sophos’ Global Head of Security Research James Lyne predicted a bumpy 2016 and beyond: chiefly that ransomware would continue to grow in popularity, and that the Internet of Things producers would be in for a ‘big wake-up call’ if they di...

Read More

Bluetooth Mesh networks: Is a standards body right for IoT innovation? BLUETOOTH MESH NETWORKS: IS A STANDARDS BODY RIGHT FOR IOT INNOVATION?

blog article

Jul 20, 2017

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the di...

Read More

FBI Warns About Security Risks From IoT-Connected Toys in Your Home FBI WARNS ABOUT SECURITY RISKS FROM IOT-CONNECTED TOYS IN YOUR HOME

blog article

Jul 19, 2017

The idea that a toy presents a real security threat first came to national attention back in 1998, when a small robot disguised as a fanciful animal was banned by the National Security Agency. This critter was known as a Furby. The Furby appeared to learn English by listening to words spoken around ...

Read More

Setting up the Development Environment for Angular 2 SETTING UP THE DEVELOPMENT ENVIRONMENT FOR ANGULAR 2

blog article

Jul 18, 2017

In this article, we will gain understanding on how to setup a local development environment for Angular 2. This blog covers minimum required configuration for creating applications in Angular using Typescript and ES5. Here, I will be providing a step-by-step approach to setup an environment. Angular...

Read More

The Hardware Hacker: Adventures in Making and Breaking Hardware THE HARDWARE HACKER: ADVENTURES IN MAKING AND BREAKING HARDWARE

blog article

Jul 17, 2017

Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product dev...

Read More

Learn How to Integrate in Minutes with TIBCO Cloud Integration LEARN HOW TO INTEGRATE IN MINUTES WITH TIBCO CLOUD INTEGRATION

blog article

Jul 17, 2017

In order to stay competitive, your company needs to become a fully connected or integrated organization. In other words, a digital business.  An organization where technologies offer innovative ways to connect, collaborate, conduct business, and build bridges between people and devices. The rea...

Read More

Critical Vulnerabilities in Microsoft Windows Could Leave Computers Exposed to a New Attack Wave CRITICAL VULNERABILITIES IN MICROSOFT WINDOWS COULD LEAVE COMPUTERS EXPOSED TO A NEW ATTACK WAVE

blog article

Jul 14, 2017

Earlier this week, during Patch Tuesday Update, Microsoft released patches for some critical vulnerabilities that were affecting all versions of Windows operating system, including critical flaws for Windows 10 for enterprises. Researchers at Preempt have analyzed and identified two vulnerabilities ...

Read More

Exploratory Testing for JIRA: Now on Atlassian Marketplace EXPLORATORY TESTING FOR JIRA: NOW ON ATLASSIAN MARKETPLACE

blog article

Jul 12, 2017

If your team uses Atlassian JIRA and wants to jumpstart, scale, or streamline exploratory testing, we’d like to introduce you to the first native exploratory testing add-on for JIRA. Exploratory Testing for JIRA helps you optimize exploratory testing with simplified planning, documentation, an...

Read More

Why Every OEM Developing an Industrial IoT Solution Should Use Wireless Modules WHY EVERY OEM DEVELOPING AN INDUSTRIAL IOT SOLUTION SHOULD USE WIRELESS MODULES

blog article

Jul 10, 2017

The demand for IoT solutions continues to grow at a rapid pace – by 2020, it’s estimated that the number of connected machines will be more than 34 billion – more than four times the human population. For industrial OEMs, delivering a smart connected IoT solution can deliver substa...

Read More

Effective Cyber Security is All About the Benjamins EFFECTIVE CYBER SECURITY IS ALL ABOUT THE BENJAMINS

blog article

Jul 10, 2017

Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ e...

Read More

Software testing must be a boardroom dialog; – But are enterprises doing it? SOFTWARE TESTING MUST BE A BOARDROOM DIALOG; – BUT ARE ENTERPRISES DOING IT?

blog article

Jul 06, 2017

The Twitterati went buzzing on July 3, 2017, when Nasdaq exchange set the stock prices of a list of companies at $123.47; slashing the stock prices for some tech companies and hiking it for others. According to a statement from Nasdaq, the glitch occurred due to ‘improper use of test data&rsqu...

Read More

Software Fail Watch, Q2 2017: Hacking and Cyber Attacks are the New Normal SOFTWARE FAIL WATCH, Q2 2017: HACKING AND CYBER ATTACKS ARE THE NEW NORMAL

blog article

Jul 06, 2017

In the past years, we have observed both an increase in the number of hacks reported, as well as the public attention those hacks gain. In October 2016, an unprecedentedly wide-scale DDoS attack crippled much of North America’s internet for the better part of a day, taking down global power pl...

Read More

How An Insider Threat Operates [True Stories] HOW AN INSIDER THREAT OPERATES [TRUE STORIES]

blog article

Jul 06, 2017

Just over 7 years ago, our former colleague Cristina ran a music blog that had ten thousand daily visitors. On an April night in 2010, someone broke into her Gmail account. He deleted all of the emails saved on the account, and then leveraged it to access three more email addresses. The hacker also ...

Read More

SAP Test Automation: Key Considerations for Selecting an Automated Testing Tool SAP TEST AUTOMATION: KEY CONSIDERATIONS FOR SELECTING AN AUTOMATED TESTING TOOL

blog article

Jul 03, 2017

Even a small SAP update can bring critical business processes to a standstill. Without a fast and trusted way to detect change impacts, upgrading SAP or optimizing processes can expose the business to significant risks. Ultimately, SAP test automation tools are critical for detecting and mitigating ...

Read More

Where Machine Learning Meets Artificial Intelligence WHERE MACHINE LEARNING MEETS ARTIFICIAL INTELLIGENCE

blog article

Jul 03, 2017

The field of artificial intelligence (AI) is one of the most dynamic and disruptive technological revolutions today. This ever-evolving phenomenon gave birth to machine learning, also popularly referred to as ‘Machine Intelligence’ or ‘Deep Learning’. Machine learning enables...

Read More

“Why are big data projects making losses?” “WHY ARE BIG DATA PROJECTS MAKING LOSSES?”

blog article

Jun 30, 2017

This was the title of my article that appeared in IDG Expert Network last year. It was about the lacking profitability of analytics initiatives. After the article got published, I had a lot of discussions with colleagues and clients about the same topic – in the same tenor; big data has to bec...

Read More

Solution guide: Building connected vehicle apps with Cloud IoT Core SOLUTION GUIDE: BUILDING CONNECTED VEHICLE APPS WITH CLOUD IOT CORE

blog article

Jun 30, 2017

With the Internet of Things (IoT), vehicles are evolving from self-contained commodities focused on transportation to sophisticated, Internet-connected endpoints often capable of two-way communication. The new data streams generated by modern connected vehicles drive innovative business models such ...

Read More

HTTP and DNS in a 5G World HTTP AND DNS IN A 5G WORLD

blog article

Jun 30, 2017

The internet has of course been wildly successful over the last thirty years as more and more functionality has moved online. A large part of this success has been due to two key protocols that have allowed the internet to scale relatively gracefully: HTTP which stands for Hypertext Transmission Pro...

Read More

Computer says “No!”: Machines should be accountable for their decisions COMPUTER SAYS “NO!”: MACHINES SHOULD BE ACCOUNTABLE FOR THEIR DECISIONS

blog article

Jun 27, 2017

This summer I was on holiday abroad in a place I’ve never been before. We toured around by car, relying extensively on our sat nav system. One afternoon, I decided to switch off the navigation device and tried to find my way back using an old fashioned technique: my sense of direction. Yes, I ...

Read More

Why Software Testing Tools Fail WHY SOFTWARE TESTING TOOLS FAIL

blog article

Jun 26, 2017

For over two decades now, software testing tool vendors have been tempting enterprises with the promise of test automation. However, the fact of the matter is that most companies have never been able to achieve the desired business results from their automation initiatives. Recent studies report tha...

Read More

How big data is disrupting the oil and gas industry HOW BIG DATA IS DISRUPTING THE OIL AND GAS INDUSTRY

blog article

Jun 23, 2017

The role of CIOs in the success and long term survival of companies in today’s competitive landscape is growing. Technology is the leading differentiator between rival companies, and the next battleground industry could be the biggest one yet. The industry to watch in the coming years is oil a...

Read More

The future is not the cloud or the fog: it is actually the SEA! THE FUTURE IS NOT THE CLOUD OR THE FOG: IT IS ACTUALLY THE SEA!

blog article

Jun 22, 2017

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if...

Read More

How To Improve Your Website Security HOW TO IMPROVE YOUR WEBSITE SECURITY

blog article

Jun 22, 2017

With the WannaCry and Xdata ransomware attacks drawing headlines around the world, maintaining your website’s security is more important than ever. But new survey data by Clutch, a ratings and reviews firm in Washington DC, reveals that too frequently, our knowledge of security features doesn&...

Read More

What is Continuous Testing?—A Crash Course for Software Testers WHAT IS CONTINUOUS TESTING?—A CRASH COURSE FOR SOFTWARE TESTERS

blog article

Jun 20, 2017

Like Lucy and Ethel, many software testers have been scrambling to keep pace with accelerated processes—then along comes the supervisor saying, “You’re doing splendidly…Speed it up!” This ever-increasing pace is just one of 4 aspects of the “perfect storm” ...

Read More

Four Powers of an IT Superhero: No Cape Required FOUR POWERS OF AN IT SUPERHERO: NO CAPE REQUIRED

blog article

Jun 19, 2017

Day after day, the ordinary citizens of Earth remain unaware of the silent guardians that keep watch over the enterprise network. From their shadowy lairs, these brave men and women keep our data safe from the bandits of bandwidth while avoiding downtime destruction.But to be an IT Superhero, you do...

Read More

Custom Email Notification enhancements for communication between Approver, Requester and IT Staff for BMC Remedy CUSTOM EMAIL NOTIFICATION ENHANCEMENTS FOR COMMUNICATION BETWEEN APPROVER, REQUESTER AND IT STAFF FOR BMC REMEDY

blog article

Jun 16, 2017

Email has become a major formal communication platform for all kinds of industry. BMC Remedy, a service desk solution comes with email notification feature for various purposes. Looking at the progress of the email interface and tool capabilities, BMC Remedy email notification feature needs enhancem...

Read More

Two ITIL processes that will protect your existence TWO ITIL PROCESSES THAT WILL PROTECT YOUR EXISTENCE

blog article

Jun 09, 2017

In my recent blog entry, I talked about the future of the traditional IT organization and the need for sound governance and processes in the implementation of IT solutions, especially if they are leveraged through cloud and outsourced solution suppliers. IT service management (ITSM) and IT infrastru...

Read More

SAP Testing Advancements in Tricentis Tosca—Autonomous Testing, Fiori, Solman 7.2 & More SAP TESTING ADVANCEMENTS IN TRICENTIS TOSCA—AUTONOMOUS TESTING, FIORI, SOLMAN 7.2 & MORE

blog article

Jun 08, 2017

With Autonomous SAP Testing, comprehensive business process testing has never been faster or easier. This groundbreaking technology automatically generates and maintains SAP business process tests—without requiring manual intervention at any point in the process.

Read More

Real world challenges between us and the Internet of Things REAL WORLD CHALLENGES BETWEEN US AND THE INTERNET OF THINGS

blog article

Jun 08, 2017

Many a blog line has been penned on the rich topic of the Internet of Things (IoT) but not much has been written about the real world challenges between our today and the many promises of the IoT tomorrow. Technology considerations can easily blind us “techies” to more mundane realities ...

Read More

Cloud Computing for the Win CLOUD COMPUTING FOR THE WIN

blog article

Jun 06, 2017

How fitting that Cloud Computing (the horse) beat favorite Always Dreaming to the finish line at the Preakness this year, particularly for those of us working in Federal IT. Just three days earlier, the Modernizing Government Technology (MGT) Act passed the House, signaling continued momentum for ag...

Read More

7 Tools For Effective DevOps Collaboration 7 TOOLS FOR EFFECTIVE DEVOPS COLLABORATION

blog article

Jun 01, 2017

In the enterprise, DevOps adoption is skyrocketing. From 2015 to 2016, DevOps adoption increased from 66 percent to 74 percent. While the benefits of DevOps are clear, what’s not always as straightforward is arranging collaboration between two formerly independent teams: software development a...

Read More

How My Fear Of IT Outsourcing Services Got Crumpled HOW MY FEAR OF IT OUTSOURCING SERVICES GOT CRUMPLED

blog article

May 26, 2017

We recently interviewed one of our clients, who is the IT Practice Lead at one of the IT solutions companies based in Dallas. In his interview, the client shared how (once upon a time) the word outsourcing freaked him out. But as he worked with ISHIR, one of the best IT outsourcing service providers...

Read More

Big Data will enable better network and application intelligence in 5G BIG DATA WILL ENABLE BETTER NETWORK AND APPLICATION INTELLIGENCE IN 5G

blog article

May 25, 2017

We are fortunate to live in an exciting time where multiple technological leaps are occurring. Specifically, I am thinking of the mobile industry transition from 4G to 5G, and the cross-industry IT paradigm shift to the Big Data approach. The 5G standards community is already planning to support the...

Read More

How Software Quality Engineering Can Help Airlines Stay Successful HOW SOFTWARE QUALITY ENGINEERING CAN HELP AIRLINES STAY SUCCESSFUL

blog article

May 22, 2017

A robust software quality testing approach is crucial for businesses across all industries. For instance, in the aviation industry, we have airlines upgrading mobile applications in order to better connect with their passengers. Technology is creating revolutionary paths, no matter the business, lea...

Read More

Understanding the benefits and threats when building an IoT strategy UNDERSTANDING THE BENEFITS AND THREATS WHEN BUILDING AN IOT STRATEGY

blog article

May 22, 2017

The Internet of Things (IoT) market continues to gain momentum, both growing in total connections and into new business and consumer application segments, but still CIOs and other IT leaders diverge on what are the real benefits of this technologies for the business and, mainly, what are the potenti...

Read More

Neural Networks – How Do They Change Your Business? NEURAL NETWORKS – HOW DO THEY CHANGE YOUR BUSINESS?

blog article

May 22, 2017

It seems like everyone in tech is obsessed with neural networks these days. A neural network works similarly to a human brain, but more on that later. Neural networks are so intriguing in the IT world because they offer real possibilities to change the way software operates in industries like travel...

Read More

How to Secure a Business Network, Servers and Endpoints HOW TO SECURE A BUSINESS NETWORK, SERVERS AND ENDPOINTS

blog article

May 19, 2017

If you’re a company owner or manager, then WannaCry probably made you rethink just how important it is to secure your business network. This is the only upside of this cyberattack. However, WannaCry isn’t the starting point of cyber threats, it’s just the latest evolution. Ransomwa...

Read More

Azure IoT Hub – Connecting your Device to the Cloud AZURE IOT HUB – CONNECTING YOUR DEVICE TO THE CLOUD

blog article

May 16, 2017

One of the biggest challenges facing IoT projects is how to reliably and securely connect devices to the solution back end to enable the device to send telemetry and retrieve commands. IoT devices: Are often embedded systems with no human operator. Can be in remote locations, where physical access i...

Read More

Why Software-as-a-Service (SaaS) will never be the same again? WHY SOFTWARE-AS-A-SERVICE (SAAS) WILL NEVER BE THE SAME AGAIN?

blog article

May 12, 2017

In order to be better prepared for the future, organizations have to work towards making enterprise software accessible from any device. They should be able to access the software as they move throughout their day (while traveling, on their desktop or while out in the field). All this should happen ...

Read More

ARE HACKED MEDICAL IOT DEVICES RANSOMWARE’S NEXT TARGET? ARE HACKED MEDICAL IOT DEVICES RANSOMWARE’S NEXT TARGET?

blog article

May 09, 2017

Shortly after IoT became a mainstream topic, the idea of device access-control falling into the wrong hands also grabbed headlines. Was it possible? What would happen? These are particularly concerning questions for healthcare organizations who deal in life-saving devices. But the notion of hacked m...

Read More

What does the future of cyber security look like? WHAT DOES THE FUTURE OF CYBER SECURITY LOOK LIKE?

blog article

May 09, 2017

As per Computer Business Review, there is astronomical numbers of new devices coming online each year as connectivity is key. With 5G on the horizon, it’s looking more like a double edged sword, sacrificing our security for speed. According to ABI Research, by 2020 there will be 40.9 billion a...

Read More

Forrester: The Internet of Things Propels Product Development Into The Digital Era FORRESTER: THE INTERNET OF THINGS PROPELS PRODUCT DEVELOPMENT INTO THE DIGITAL ERA

blog article

May 05, 2017

Digital is the latest radical shift in the technology world and, apparently, it might be the greatest. Digital technologies are disrupting and changing businesses. Product development is at the forefront of this new technology wave. In a recent report, Forrester states that traditional product devel...

Read More

The Impact of IoT on Businesses THE IMPACT OF IOT ON BUSINESSES

blog article

May 03, 2017

The Internet has been around for a while but it’s only been the product of people – all the images, graphics, videos, data, games, and more were created by the people, for the people, and about the people. Compare the Internet to a well-knit fabric – woven all into us, this interne...

Read More

What Pepsi WHAT PEPSI'S FAILED AD CAN TEACH US ABOUT DATA PRIVACY

blog article

May 02, 2017

By now, you've probably seen the ad that Pepsi released to the world and then quickly withdrew when it became obvious how tone deaf it was. I don't have anything to say about the ad that hasn't been said already, but I do want to examine the conditions that led to an ad of such oblivious...

Read More

How to Transform Big Data Possibilities Into a Commercial Advantage? HOW TO TRANSFORM BIG DATA POSSIBILITIES INTO A COMMERCIAL ADVANTAGE?

blog article

Apr 07, 2017

About 2.5 exabytes of data are generated each day, and that number is doubling every 40 months or so. Big data is exploding and the huge volume of data – both structured and unstructured – inundates organizations every hour. As data is growing, most companies face a real challenge to ove...

Read More

Managing IT contractors: One small change makes a big impact MANAGING IT CONTRACTORS: ONE SMALL CHANGE MAKES A BIG IMPACT

blog article

Apr 03, 2017

If the staffing industry has an Achilles heel, it’s that contractors aren’t always as engaged in a company’s mission and work as full-time employees. But it doesn’t have to be that way. We hear every day from IT consultants that they crave the same feedback as permanent emplo...

Read More

Everything You Need TO WATCH about Artificial Intelligence EVERYTHING YOU NEED TO WATCH ABOUT ARTIFICIAL INTELLIGENCE

blog article

Mar 30, 2017

Artificial Intelligence (AI) is the topic everyone in the world is talking about. It`s already part of our lives, and it doesn’t stay still. From SIRI to self-driving cars, AI is progressing at lightning speed. While AI is invading our being day by day, our anticipations of AI seem to be very ...

Read More

CHOOSING A TOP OUTSOURCING SOFTWARE DEVELOPMENT COMPANY: TIPS & TRICKS CHOOSING A TOP OUTSOURCING SOFTWARE DEVELOPMENT COMPANY: TIPS & TRICKS

blog article

Mar 14, 2017

Many companies decide to outsource their software development to an outside company. While the decision to outsource may be an easy one, choosing the right software development service partner can be a challenge. It is certainly doable, however. Here, we’ll talk about three factors you should ...

Read More

How to avoid falling for the W-2 phishing scam HOW TO AVOID FALLING FOR THE W-2 PHISHING SCAM

blog article

Mar 13, 2017

Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Most recently the hot stories have been about a simple targeted request that avoids links, attachments, and malware, plays friendly with email filt...

Read More

Reaching the cybersecurity tipping point REACHING THE CYBERSECURITY TIPPING POINT

blog article

Feb 22, 2017

Remember that moment when you really committed yourself to solid security and privacy practices? The moment when you committed to never clicking on a link you weren’t sure about, to always checking for badges on people coming in the door, to always using your password manager to create a compl...

Read More

SecureWorks Finds Most Cyber-Threats Involve Phishing, Network Scans SECUREWORKS FINDS MOST CYBER-THREATS INVOLVE PHISHING, NETWORK SCANS

blog article

Feb 03, 2017

The vast majority of successful attacks on companies are conducted by cyber-criminals using phishing, network scans for exploitable systems, and strategic web site compromises, security-services firm SecureWorks found in an analysis of six months of incident-response engagements. The analysis of 163...

Read More

The Influence of Digital Payments and the Need for Software Testing THE INFLUENCE OF DIGITAL PAYMENTS AND THE NEED FOR SOFTWARE TESTING

blog article

Feb 01, 2017

Digital payments are the norm of the day as more businesses break geographic barriers and make a mark globally. In this post, we discuss the various aspects of digital payments for today’s consumers. Digital payments influence customers buying habits immensely, because of the readily available...

Read More

Dropbox Unveils New Tools Designed for Enterprise Teams DROPBOX UNVEILS NEW TOOLS DESIGNED FOR ENTERPRISE TEAMS

blog article

Jan 30, 2017

Dropbox dropped a slew of new features and application improvements into its product line Jan. 30, centered mainly around the trend for enterprises to organize themselves into project teams that report to division heads. Dropbox CEO Drew Houston also announced that the San Francisco-based company no...

Read More

A Few of My Favorite Things A FEW OF MY FAVORITE THINGS

blog article

Jan 27, 2017

The recent holiday season had me in a sharing mood, so I thought I would extend it just a little bit longer than usual and use a holiday theme to share some of the applications and information sources that make work as a Salesforce.com consultant just a little bit better. This list is by no means ex...

Read More

Applying a Phased Approach to Ensure Better SharePoint Business Solution Deployment APPLYING A PHASED APPROACH TO ENSURE BETTER SHAREPOINT BUSINESS SOLUTION DEPLOYMENT

blog article

Jan 26, 2017

The Define phase helps to set the stage for successful solution delivery by outlining the steps necessary to better understand customer requirements, demonstrate and select potential SharePoint capabilities for use in solution, and to lay the foundation for effective communications and project manag...

Read More

Top Software Testing Tools That Accelerate Testing TOP SOFTWARE TESTING TOOLS THAT ACCELERATE TESTING

blog article

Jan 23, 2017

Software testing tools are critical resources for every successful Quality Assurance team. A wide variety of software test tools addressing various aspects of the testing process, can be applied to different types of software, programming languages, and to different types of testing.

Read More

Software liability is coming SOFTWARE LIABILITY IS COMING

blog article

Jan 17, 2017

The New Year started badly for networking multinational D-Link after the US FTC kicked off legal proceedings claiming the company failed to secure a variety of its self-proclaimed un-hackable products. There's a bigger focus on weak device security at the moment given the severity of last year&#...

Read More

Security fatigue—or how I learned to overcome laziness and use a password manager SECURITY FATIGUE—OR HOW I LEARNED TO OVERCOME LAZINESS AND USE A PASSWORD MANAGER

blog article

Jan 11, 2017

I admit it: I sometimes suffer from “security fatigue,” and I bet you do, too. If you’ve ever reused a password for a new site login, thinking the site isn’t that important, you suffer from it. If you’ve clicked on a tempting email offer or social media request, even if...

Read More

Will Speed to Market and Quality Determine the Software Testing Agenda for 2017? WILL SPEED TO MARKET AND QUALITY DETERMINE THE SOFTWARE TESTING AGENDA FOR 2017?

blog article

Jan 03, 2017

Speed is becoming a defining factor for every new venture in the marketplace. Whether it is a financial app, a gaming app, a VR device, or anything that is consumer-centric or enterprise facing; speed is the key to success. The next line of emphasis is on the quality and performance. Aspects such as...

Read More

Reflexions from 2016: Top Software Testing Priorities for 2017 REFLEXIONS FROM 2016: TOP SOFTWARE TESTING PRIORITIES FOR 2017

blog article

Dec 30, 2016

2016 has been a year of successful technology ventures as well as a year of data and security breaches. Interestingly, this has opened up a lot of lucrative opportunities for Big Data and Security professionals. Data is at the core of all innovations, a key enabler for enterprises to plan their next...

Read More

Key Software Testing Best Practices from 2016 KEY SOFTWARE TESTING BEST PRACTICES FROM 2016

blog article

Dec 27, 2016

As experts say, ‘the best (Software Testing) tools are the ones everyone uses, not always the ‘industry’ best’.The year 2016 has witnessed a lot of experimentation around technology and its adoption via various approaches. These approaches have been tried and tested across pr...

Read More

Why is Software Testing Being Outsourced? WHY IS SOFTWARE TESTING BEING OUTSOURCED?

blog article

Dec 23, 2016

2016 has been a year of mashups in the enterprise technology space! The enterprise software market has witnessed some phenomenal upgrades such as Cloud accessibility/SaaS, machine learning, Artificial Intelligence, Smart devices, intelligent systems, intelligent applications, etc. Open Source innova...

Read More

Oracle is cracking down on Java SE users who think it ORACLE IS CRACKING DOWN ON JAVA SE USERS WHO THINK IT'S FREE

blog article

Dec 20, 2016

ORACLE HAS begun an aggressive campaign of chasing licence fees for use of payable elements of its Java software.The company, which acquired Java owner Sun Microsystems in 2010, has already lost a case over the fair use of Java APIs in Google's Android operating system, but as it awaits another ...

Read More

What We Can Learn from Yahoo’s Latest Hack – Plus IT Security Tips for 2017 WHAT WE CAN LEARN FROM YAHOO’S LATEST HACK – PLUS IT SECURITY TIPS FOR 2017

blog article

Dec 20, 2016

With the holidays around the corner, people are using their email more than ever to book flights, order gifts, check shipping statuses and more. But what do you do when your privacy and personal information is taken and exposed? Last week, Yahoo disclosed that a minimum of 1 billion accounts were ha...

Read More

HANA View Prompts in IDT Derived Table HANA VIEW PROMPTS IN IDT DERIVED TABLE

blog article

Dec 16, 2016

Recently, I was on a project that used HANA views as the data source for SAP BusinessObjects 4.0 universes (unx). The HANA views had mandatory input parameters (i.e. prompts) as well as variables which I needed to provide default values for or bypass with a derived table in the Information Design To...

Read More

What WHAT'S IN YOUR CYBERSECURITY ARSENAL? TIERS OF PROTECTION FOR INVESTMENT MANAGERS

blog article

Dec 15, 2016

When it comes to protecting your investment firm from serious cybersecurity threats, it's safe to say that less is definitely not more. In fact, it takes a pretty heavy arsenal of security measures to combat the ever-growing threats targeting your firm from both the inside and the outside. But i...

Read More

Setting animation scale for Android UI tests SETTING ANIMATION SCALE FOR ANDROID UI TESTS

blog article

Dec 12, 2016

Before testing with Espresso, it is highly recommended to disable animations. Tests may be flaky otherwise. The simplest (and only officially mentioned) way to disable animations is to go manually to Settings app and adjust appropriate settings in Developer options. That way is very inconvenient whe...

Read More

Right Size IT Managed Service for Midsize Companies RIGHT SIZE IT MANAGED SERVICE FOR MIDSIZE COMPANIES

blog article

Dec 09, 2016

Today, the U.S. economy counts on our midsize companies to fuel its growth. Midsize companies are not only adding jobs at twice the rate of big business, their sales increased by 7.4 percent in 2015 alone – 4.5 percentage points higher than companies in the S&P 500. As their economic impor...

Read More

HowTo – Custom API Policy with Anypoint Platform HOWTO – CUSTOM API POLICY WITH ANYPOINT PLATFORM

blog article

Dec 08, 2016

As organizations embrace APIs for exchanging information with internal or external customers and partners, it’s critical not to sacrifice visibility or governance.  That’s where API management comes in. API management policies can be layered on top of the implementation of the APIs ...

Read More

10 Considerations When Choosing Flash Storage 10 CONSIDERATIONS WHEN CHOOSING FLASH STORAGE

blog article

Dec 08, 2016

IDC reports that the top pain points IT managers face when it comes to storage are reducing storage-related costs, ensuring data compliance and protecting virtual machine data, all while increasing capacity and performance. Easy enough, right? With the choices between hard disk drive (HDD) and flash...

Read More

2017 Outlook for Hedge Funds: Risk, Regulation and Cybersecurity 2017 OUTLOOK FOR HEDGE FUNDS: RISK, REGULATION AND CYBERSECURITY

blog article

Dec 08, 2016

2017 is already shaping up to be an interesting year. With a new presidential administration taking office and the hedge fund industry coming off the heels of a challenging year, there’s a lot to keep an eye on. We recently hosted a panel with law firm Morgan Lewis to discuss these and many ot...

Read More

An Insight into Data Tap in SQL Server AN INSIGHT INTO DATA TAP IN SQL SERVER

blog article

Dec 07, 2016

Data taps are one of the great significant features in SQL Server in the Data analysis during runtime. In a nutshell, they enable us, at runtime, to choose a given path from a data flow and capture a copy of the data at that specific point of the data flow in a .csv file on a given execution instanc...

Read More

KKR to buy Optiv Security KKR TO BUY OPTIV SECURITY

blog article

Dec 06, 2016

Over the past three years, Optiv has served more than 7,500 clients in 76 countries, including 71 of the Fortune 100 and 604 of the Fortune 1000. Optiv was named to the 2016 Inc. 5000 as one of North America’s fastest-growing private companies with a 97 percent three-year growth rate. The comp...

Read More

Private Equity CTO Survey Explores IT Priorities and CTO Role Evolution PRIVATE EQUITY CTO SURVEY EXPLORES IT PRIORITIES AND CTO ROLE EVOLUTION

blog article

Dec 06, 2016

The tide is changing for private equity firms. They continue to grow in popularity – some say private equity is the new hedge fund – but with increased interest comes amplified speculation and heightened expectations. In technology, private equity firms have found a fierce enabler for co...

Read More

HOW MUCH DOES IT COST TO BUILD A WEBSITE ON RUBY ON RAILS? HOW MUCH DOES IT COST TO BUILD A WEBSITE ON RUBY ON RAILS?

blog article

Dec 06, 2016

Web development with Ruby on Rails could be much easier. It has just one way to go, the shortest way, so you will get to your destination much faster. Most of the ruby on rails developers admit they have got a great boost in productivity. Since they’ve started using this framework. There is a ...

Read More

HOW TO HIRE GOOD SOFTWARE DEVELOPERS HOW TO HIRE GOOD SOFTWARE DEVELOPERS

blog article

Dec 06, 2016

Most IT experts today agree that talented software developers will soon be the most needed type of employee for just about any company, even if that company’s business is not related to software development. Finding and recruiting highly qualified software developers sometimes may be hard. But...

Read More

Meet a Muley: Zoe Nicholson, growing partnerships across Australia and New Zealand MEET A MULEY: ZOE NICHOLSON, GROWING PARTNERSHIPS ACROSS AUSTRALIA AND NEW ZEALAND

blog article

Dec 05, 2016

When I moved back to Sydney from working in Asia for a few years, I decided my next job should be with a company that had new and innovative technology. It would have been easy for me to go back to security or infrastructure, but I liked the idea of learning about a whole new area of IT. So with tho...

Read More

MOST POPULAR TYPES OF APPS MOST POPULAR TYPES OF APPS

blog article

Dec 05, 2016

Mobile apps are compact software solutions designed to help with your preferred tasks on smartphones and tablets. The variety of those programs is immense but they have different designs, working mechanics, and therefore can be divided into different app categories. Today we want to discuss  th...

Read More

Join us at the Gartner Application Strategies & Solutions Summit next week! JOIN US AT THE GARTNER APPLICATION STRATEGIES & SOLUTIONS SUMMIT NEXT WEEK!

blog article

Dec 02, 2016

The theme of next week’s event is, “Step up to a New Business Reality”; a theme quite relevant to all of us planning for 2017 and looking back on the triumphs and challenges of 2016. As we gear up for the new year, MuleSoft is excited to join Gartner at this premiere event to help ...

Read More

Supply Chain API for Agility SUPPLY CHAIN API FOR AGILITY

blog article

Dec 01, 2016

Traditional supply chains are coming under growing pressure as organisations search for growth in increasingly competitive markets. Around the world, changing economic conditions and customer demands mean that organisations need to find a way to be increasingly agile. Those unable to evolve their op...

Read More

Top 6 Hurdles to IT Optimization TOP 6 HURDLES TO IT OPTIMIZATION

blog article

Dec 01, 2016

The need to optimize IT operations is almost universal in business today. According to more than 100 IT executives from large U.S. organizations recently surveyed by IDG Research, just nine-percent of companies have operations that are running optimally. The remaining 91-percent have room for improv...

Read More

Creating subsites and change master page using REST API from SharePoint Designer Workflow CREATING SUBSITES AND CHANGE MASTER PAGE USING REST API FROM SHAREPOINT DESIGNER WORKFLOW

blog article

Dec 01, 2016

SharePoint Server 2013 brings a significant advancement to Workflow: enterprise features such as fully declarative authoring, REST and Service Bus messaging, elastic scalability, and managed service reliability. SharePoint Server 2013 can use a new workflow service built on the Windows Workflow Foun...

Read More

Meet MuleSoft developers near you! MEET MULESOFT DEVELOPERS NEAR YOU!

blog article

Nov 30, 2016

The MuleSoft community keeps growing! Every day, we observe developers from around the globe take initiatives to strengthen their local groups, share business insights and exchange ideas on how APIs contribute to the ongoing digital transformation. In the next ten days, no less than five MuleSoft co...

Read More

Why Don’t The IT Pros Fear The Rise Of Robots? WHY DON’T THE IT PROS FEAR THE RISE OF ROBOTS?

blog article

Nov 30, 2016

Automation has proven itself to be one of the greatest and most consequential job killers of the last few decades. In a wide variety of industries, automation has replaced human labor, as robots and AI programs can process information, learn, and replicate increasingly complicated tasks. We’ve...

Read More

AQuA API with Zuora Connector AQUA API WITH ZUORA CONNECTOR

blog article

Nov 29, 2016

Zuora has been offering three different types of API: REST API, SOAP API and AQuA API. It is believed that majority of Zuora customers use the SOAP API to integrate with Zuora because of the breadth of its API. (MuleSoft is using the SOAP API internally!) While MuleSoft offered the Zuora Connector b...

Read More

Managed Services: Ensuring Enterprise Transformation to Hybrid IT MANAGED SERVICES: ENSURING ENTERPRISE TRANSFORMATION TO HYBRID IT

blog article

Nov 29, 2016

Organizations are continually challenged to align IT initiatives with business goals. While the top business initiatives are centered around the financial metrics of optimizing profits, growing revenue and driving down costs, ensuring innovation, customer satisfaction and market penetration are crit...

Read More

Six Myths about Hedge Fund Cybersecurity SIX MYTHS ABOUT HEDGE FUND CYBERSECURITY

blog article

Nov 29, 2016

The cybersecurity threat landscape continues to evolve, leaving behind significant operational and reputational harm for financial services firms. Cyber-attacks such as those impacting LinkedIn, Talk-Talk, Yahoo and Sony have forced cybersecurity into the limelight via news making headlines, enough ...

Read More

Does Donald Trump mean disruption for the IT Industry or will he get the IT Industry growing? DOES DONALD TRUMP MEAN DISRUPTION FOR THE IT INDUSTRY OR WILL HE GET THE IT INDUSTRY GROWING?

blog article

Nov 26, 2016

During his campaign, President-elect Donald Trump, gave mixed signals that he intends to create more jobs in US (which means lesser work will be outsourced) and, on other hand, stressed that it’s important to retain foreign talent. Given such mixed opinions, what should the IT world and offsho...

Read More

Cybersecurity firm Optiv files for IPO to raise $100M CYBERSECURITY FIRM OPTIV FILES FOR IPO TO RAISE $100M

blog article

Nov 24, 2016

Cybersecurity solutions company Optiv Security Inc. on Friday quietly filed for a $100 million initial public offering. The company is majority-owned by Blackstone Group LP. IPO underwriters include Morgan Stanley, Goldman Sachs & Co., Barclays Capital Inc. and Citigroup Global Markets Inc. Whil...

Read More

How IT Needs to Adapt to the Growing Number of Developers HOW IT NEEDS TO ADAPT TO THE GROWING NUMBER OF DEVELOPERS

blog article

Nov 23, 2016

There is growing pressure for IT to deliver on business demands in real time—but there is often a gap between what they need to do and what they can do. So, how can they close the IT delivery gap? For starters, they should make everyone in the company a developer. This is not to say that all e...

Read More

The Fan Challenge: How Sports Are Embracing Digital to Engage Audiences Worldwide THE FAN CHALLENGE: HOW SPORTS ARE EMBRACING DIGITAL TO ENGAGE AUDIENCES WORLDWIDE

blog article

Nov 23, 2016

To be able to successfully connect with your followers, it’s crucial to understand what they want first. It’s no wonder that the application of big data in sports has expanded beyond tracking athletic performance to include tracking the behavior of the fans. A healthy portion of data poi...

Read More

Algorithm & Analytics: Propel Digitization to Deliver Business Value ALGORITHM & ANALYTICS: PROPEL DIGITIZATION TO DELIVER BUSINESS VALUE

blog article

Nov 22, 2016

While a good number of businesses are dazed over the hype around technology buzzwords like “Big Data” and “IoT” often attributed to the hysteria unleashed by IT vendors and industry, a few have set their eyes on something that is even older than computing—Algorithms. Mo...

Read More

Five Black Friday/Cyber Monday IT Security Scams to Be Aware Of FIVE BLACK FRIDAY/CYBER MONDAY IT SECURITY SCAMS TO BE AWARE OF

blog article

Nov 22, 2016

As we prepare our turkeys for Thanksgiving and retail stores of all shapes and sizes prepare their inventory for Black Friday and Cyber Monday sales, cyber criminals are preparing their attacks. Your inboxes are likely already flooded with the newest and most popular deals for this holiday season, b...

Read More

The Morning Ledger: China Inc.’s Shopping Binge unnerves West THE MORNING LEDGER: CHINA INC.’S SHOPPING BINGE UNNERVES WEST

blog article

Nov 21, 2016

Good morning. For weeks and weeks, we have heard rumors according to which it isn’t just the German government that is concerned about the planned takeover of a German technology company by a Chinese buyer. “It’s the Americans, first and foremost,” people said, in Berlin and ...

Read More

HOW MUCH DOES VR APP DEVELOPMENT COST? HOW MUCH DOES VR APP DEVELOPMENT COST?

blog article

Nov 21, 2016

VR app development is supposed to be the future of tech. Virtual reality technology is being successfully applied in different spheres of our lives. It allows us to play with our imagination and opens the door to the fantastic and imaginary worlds. Without any doubt, this is the place where dreams c...

Read More

Smarter Apps with Application Insights SMARTER APPS WITH APPLICATION INSIGHTS

blog article

Nov 21, 2016

Application Insights is an Application Performance Management (APM) tool by Microsoft. It is an extensible analytics service that monitors live web applications and services – hosted on Azure, other cloud services or on-premises servers. It provides rich and comprehensive information on the pe...

Read More

Android Fundamentals: Working with the RecyclerView, Adapter, and ViewHolder Pattern ANDROID FUNDAMENTALS: WORKING WITH THE RECYCLERVIEW, ADAPTER, AND VIEWHOLDER PATTERN

blog article

Nov 18, 2016

In the mobile development world, regardless of the platform, lists that display data to the user are commonly used in many projects. The Android platform gives us two different types of views that can be leveraged to display lists of data—the  ListView and the RecyclerView. My fri...

Read More

Don’t Stay in the ‘Shu’ box: Agile is not a Recipe DON’T STAY IN THE ‘SHU’ BOX: AGILE IS NOT A RECIPE

blog article

Nov 17, 2016

The way we humans learn things is a progressive process that goes from less to more, little by little. Shu Ha Ri is a way to explain this from the Japanese martial arts (Aikido to be exact). A rough translation for this would be something like ‘learn, detach and transcend’. In order to u...

Read More

Weaving it with Dataweave expression WEAVING IT WITH DATAWEAVE EXPRESSION

blog article

Nov 16, 2016

We all know how powerful Dataweave Transform Message component is. This is such a powerful template engine that allows us to transform data to and from any format (XML, CSV, JSON, Pojos, Maps, etc. basically ). So if we need to transform we need a Dataweave component in our flow. But wait! Dataweave...

Read More

4 tips to have the most successful Corporate Intranet 4 TIPS TO HAVE THE MOST SUCCESSFUL CORPORATE INTRANET

blog article

Nov 16, 2016

Are you planning to implement a Corporate Intranet or a Knowledge Management Portal but skeptical that it won’t work? Well, you are right! Social Collaboration has a great impact everywhere. Even in the way professionals work. The Corporate Intranet has made the ‘workplace’ possibl...

Read More

UX/UI RETROSPECTIVE: MOBILE APP DESIGN TRENDS IN 2016 UX/UI RETROSPECTIVE: MOBILE APP DESIGN TRENDS IN 2016

blog article

Nov 16, 2016

Minimalism is always on trend in mobile app design. 2016 is not an exception from the rule, as users are being enchanted by the blend of subtle and simple colors in backgrounds, easy access to navigation, innovative scrolling and predominance of bold and big fonts. Due to the result of marketing res...

Read More

Getting Your Test Tool Right is Key to Releasing Quality Software GETTING YOUR TEST TOOL RIGHT IS KEY TO RELEASING QUALITY SOFTWARE

blog article

Nov 15, 2016

Choosing and investing in a software testing tool or a test automation framework is like fitting into the right sports shoes – you need to run with them, walk with them, and if on an expedition climb with them. While you want the testing tool to work for you, you have multiple objectives to ac...

Read More

Durable Streaming API with MuleSoft Salesforce Connector DURABLE STREAMING API WITH MULESOFT SALESFORCE CONNECTOR

blog article

Nov 15, 2016

Salesforce introduced the Streaming API with its Spring ‘16 release (API v36). It was a neat feature since Salesforce users don’t have to poll or periodically call Salesforce to check any updates in their objects. One important limitation with API v36 was that the Streaming API (API v36)...

Read More

Key ERP Support Strategies for Midsize Enterprises KEY ERP SUPPORT STRATEGIES FOR MIDSIZE ENTERPRISES

blog article

Nov 15, 2016

Though smaller in scale, the ERP needs of a midsize organization are similar in scope to those of the enterprise organization. The problem is that the smaller IT teams at these organizations are already stretched thin without managing a complex ERP system that is a challenge for even well-staffed en...

Read More

Build a Better UX Process BUILD A BETTER UX PROCESS

blog article

Nov 15, 2016

What does a UX Process really look like? Honestly, depending on the project, it can look many different ways. I personally prefer to use a combination of in-depth process techniques, rather than just focusing on one specific area. It is critical to understand that UX is made up of several different ...

Read More

10 BEST TEST MANAGEMENT TOOLS FOR QA ENGINEERS 10 BEST TEST MANAGEMENT TOOLS FOR QA ENGINEERS

blog article

Nov 15, 2016

The idea implementation starts with a clear planning of the whole process. Product owner or Project manager has to select the best team, grant the responsibilities and assign tasks, and choose test management tools to be used for the entire software development life cycle. A tool selection begins wi...

Read More

MANAGE PROJECTS WITH EASYQA TO IMPROVE SOFTWARE QUALITY MANAGE PROJECTS WITH EASYQA TO IMPROVE SOFTWARE QUALITY

blog article

Nov 11, 2016

To manage projects with EasyQA you have to create them within your organization. Let’s take a look what is a project. Project – is a temporary endeavor which might have a certain beginning and finishing date, and might be determined by certain financing or achievement of certain goals, t...

Read More

Navigating Today’s Cybersecurity Landscape Is Tricky NAVIGATING TODAY’S CYBERSECURITY LANDSCAPE IS TRICKY

blog article

Nov 10, 2016

Cisco’s 2016 Midyear Cybersecurity Report provides an unfiltered look into the current cybersecurity landscape. It’s not a rosy picture, as the report reveals the growing threat of cyberattacks, and most notably, ransomware. The report, though, isn’t all doom and gloom and reveals ...

Read More

Preventing Cybersecurity Threats with Email Phishing Simulations PREVENTING CYBERSECURITY THREATS WITH EMAIL PHISHING SIMULATIONS

blog article

Nov 10, 2016

Social engineering schemes continue to grow in their sophistication, and phishing campaigns, in particular, are causing concern as they make their way to employee inboxes. These fraudulent email campaigns (and phone calls too!) appear legitimate and take advantage of employees who are often too busy...

Read More

PowerApps and Microsoft Flow is now available on Microsoft SharePoint POWERAPPS AND MICROSOFT FLOW IS NOW AVAILABLE ON MICROSOFT SHAREPOINT

blog article

Nov 10, 2016

On 31st October 2016, Microsoft SharePoint announced the availability of PowerApps and Microsoft Flow. Both the tools enable users to automate workflows and build custom apps quickly, and it is also suitable for specific needs of SharePoint users. PowerApps is meant to help users who can’t cod...

Read More

HOW TO BECOME A MILLIONAIRE WITH GAME DEVELOPMENT HOW TO BECOME A MILLIONAIRE WITH GAME DEVELOPMENT

blog article

Nov 10, 2016

There are dozens of ways how to be a millionaire. But definitely one of the most pleasant options is to build a game which can conquer the world. What? You don’t believe that game development can be such a rewarding thing? We are here to convince you! In fact, game development is one of the mo...

Read More

How to speak to developer — Designers’ Cheatsheet HOW TO SPEAK TO DEVELOPER — DESIGNERS’ CHEATSHEET

blog article

Nov 09, 2016

Communication between designer and developer is essential to the project success — so far, so obvious and we all know it, right? But the reality very often challenges us with communication issues that nobody’s expected because we’re all focusing on the natural flow of work and the ...

Read More

Android Auto: Now Everywhere! ANDROID AUTO: NOW EVERYWHERE!

blog article

Nov 09, 2016

Smartphones are crucial to modern life. They are our communications platform, our entertainment hub, and our most-used utility. They are our constant companions. Until recently, smartphones have missed out on deep integration into what is usually our second biggest investment: Cars. The big trend in...

Read More

Android Auto: Now Everywhere! ANDROID AUTO: NOW EVERYWHERE!

blog article

Nov 09, 2016

Smartphones are crucial to modern life. They are our communications platform, our entertainment hub, and our most-used utility. They are our constant companions. Until recently, smartphones have missed out on deep integration into what is usually our second biggest investment: Cars. The big trend in...

Read More

Today’s Healthcare Demands Always-on Mobility TODAY’S HEALTHCARE DEMANDS ALWAYS-ON MOBILITY

blog article

Nov 08, 2016

Today’s healthcare organizations face unique challenges to provide a high standard of care, all while protecting sensitive patient data. The delivery of quality healthcare requires technology that provides physicians and medical staff with “anytime, anywhere” access to view patient...

Read More

What’s the Difference Between Next-Generation Firewalls and Traditional Firewalls? WHAT’S THE DIFFERENCE BETWEEN NEXT-GENERATION FIREWALLS AND TRADITIONAL FIREWALLS?

blog article

Nov 08, 2016

Due to changes in the cyber security landscape, traditional firewalls on the port level are no longer effective at managing traffic. Malicious traffic has the capacity to enter any open port, which provides great risk to firm security. Next generation firewalls work further than port-based firewalls...

Read More

What are the top 10 web security risks? WHAT ARE THE TOP 10 WEB SECURITY RISKS?

blog article

Nov 08, 2016

Web applications have increased vulnerability to malicious attacks. If you have a web application for your business, should you be worried? Most definitely. Attackers don’t single out web applications. They seek loopholes in a business web application to invade one. If you have a web applicati...

Read More

Continuous Integration with Jenkins and GitHub CONTINUOUS INTEGRATION WITH JENKINS AND GITHUB

blog article

Nov 08, 2016

Continuous Integration (CI) and Continuous Delivery (DC) are rapidly becoming an integral part of software development. These disciplines can play a significant role in building stable release processes that help ensure project milestones are met. And in addition to simply performing compilation tas...

Read More

Azure Pricing Receives an Overhaul In 2016 AZURE PRICING RECEIVES AN OVERHAUL IN 2016

blog article

Nov 08, 2016

Microsoft has made substantial changes to the Azure pricing model across the channel effective October 2016.  One of the major reasons for this change was an effort to eliminate the discount complexity across various programs which were often difficult and cumbersome to explain and calculate.&n...

Read More

Verge Shows Startups How to Piece Together an Effective Startup Pitch VERGE SHOWS STARTUPS HOW TO PIECE TOGETHER AN EFFECTIVE STARTUP PITCH

blog article

Nov 08, 2016

There are few things more important in the process of establishing a startup than the pitch. With millions of apps in the app store and substantial funding on the line, the stakes are high to ensure you are crafting a pitch that will ensure your startup not only has a right-now, but a future. A new ...

Read More

4 IT HR Challenges Affecting Your Business 4 IT HR CHALLENGES AFFECTING YOUR BUSINESS

blog article

Nov 07, 2016

For many businesses outside of the IT sector, creating and/or hiring for an IT Department can be extremely confusing. Domain Management, Development, Up-Time and VoIP can sound like a foreign language to non-technical people. Don’t worry, though, because you’re not alone. A significant n...

Read More

What’s new in Angular JS 2.0? WHAT’S NEW IN ANGULAR JS 2.0?

blog article

Nov 07, 2016

AngularJS has become one of the most popular open source JavaScript frameworks in the world of web application development. Angular 2.0 is five times faster as compared to Angular 1.x. Angular 2.0 written entirely in Typescript and meets the ES6 specification. And it’s not an update for Angula...

Read More

The demand for custom applications is exploding. What’s going on? THE DEMAND FOR CUSTOM APPLICATIONS IS EXPLODING. WHAT’S GOING ON?

blog article

Nov 06, 2016

Our clients are requiring more custom applications than ever before, and our experience seems to reflect an industry trend.

According to Forrester Research’s report of global tech spending, investment in software for the enterprise grew 43% over the last five years, going from $...

Read More

App of the week: Sales Forecast Accuracy APP OF THE WEEK: SALES FORECAST ACCURACY

blog article

Nov 04, 2016

The Domo Appstore gives you all the tools you need to customize our business intelligence platform exactly as you like it. With around 1,000 unique applications available, the Appstore allows you to pick and choose the software that best helps you solve your company’s individual business probl...

Read More

How to Find the Perfect Color Scheme for Your App HOW TO FIND THE PERFECT COLOR SCHEME FOR YOUR APP

blog article

Nov 04, 2016

Color is an important part of our human experience, so it’s an incredibly useful tool for visual communication. A clashing color scheme can ruin an incredible concept, but working with the right palette will optimize a mobile app experience. People perceive color in different ways, with differ...

Read More

EASYQA: NEW WEB-BASED TEST MANAGEMENT TOOL TO IMPROVE SOFTWARE QUALITY EASYQA: NEW WEB-BASED TEST MANAGEMENT TOOL TO IMPROVE SOFTWARE QUALITY

blog article

Nov 04, 2016

Using test management tool is one of the most important aspects of a successful project. Quality makes a significant part in case of market’s overload of different software. Even if a group of developers comes up with and realizes a brand new and extremely useful idea, other developers will wo...

Read More

Create a New Space to Build Agile Testing Process with EasyQA CREATE A NEW SPACE TO BUILD AGILE TESTING PROCESS WITH EASYQA

blog article

Nov 04, 2016

Creating and managing agile testing process is always frightening as you never know what to start with and what you have to deal with. That’s why one always wants to begin with something comprehensible and easy to work with. Our test management tool EasyQA gives an opportunity to create and ma...

Read More

VIRTUAL REALITY APPLICATIONS IN MEDICINE TRANSFORMING HEALTHCARE WE ONCE KNEW VIRTUAL REALITY APPLICATIONS IN MEDICINE TRANSFORMING HEALTHCARE WE ONCE KNEW

blog article

Nov 04, 2016

Virtual reality is rapidly entering our lives. It is changing the way we interact, entertain and even how we are cured. This is the unique case when some tech invention is becoming that deeply implemented in healthcare as VR is. Virtual reality applications in medicine do the job any other kind of t...

Read More

The growth of ‘mHealth’, mobile for the healthcare industry THE GROWTH OF ‘MHEALTH’, MOBILE FOR THE HEALTHCARE INDUSTRY

blog article

Nov 03, 2016

‘mHealth’ is no longer just another buzzword but is predicted to gain a lot of momentum in the coming years. For the uninitiated, ‘mHealth’ is a term used to address any medical care accessed with the help of a mobile device. As per a report from World Health Organization (WH...

Read More

App Promo Videos – Unbeatable Strategy to Boost Conversion Rate APP PROMO VIDEOS – UNBEATABLE STRATEGY TO BOOST CONVERSION RATE

blog article

Nov 03, 2016

App Store Video is one of the latest and hottest trends in the sphere of app marketing. However, publishing a right app video on Play Store Video (Android) and App Preview Video (iOS) is a challenge to achieve. Primarily, very few people actually play the entire video while they land on an app store...

Read More

Tips for building better map-enabled mobile apps TIPS FOR BUILDING BETTER MAP-ENABLED MOBILE APPS

blog article

Nov 03, 2016

The Google Maps Library for Android allows you to show geographic locations in a graphical and interactive way giving a clear and simple interpretation of the information displayed in a map. However, displaying thousands of markers, the performance and user experience could be affected. In some case...

Read More

MICROSOFT PLANNER ROLLED OUT: COMPARISON WITH TRELLO AND ASANA MICROSOFT PLANNER ROLLED OUT: COMPARISON WITH TRELLO AND ASANA

blog article

Nov 03, 2016

Microsoft Planner, a new project management tool that helps teams track and collaborate on projects, has been recently launched for the Office 365 suite. The new app has been in the works since the last fall and is now available to all Office subscribers. The sweetener here is that Microsoft Planner...

Read More

DJI Mavic Pro Drone Offers Strong Competition To The Go Pro Karma DJI MAVIC PRO DRONE OFFERS STRONG COMPETITION TO THE GO PRO KARMA

blog article

Nov 02, 2016

Drone technologies are on a high today and at this point of time, there are currently quite a number of good and affordable drones on the market for anyone willing to give this latest technology a first-hand try. Chinese technology company Dà-Jiāng Innovations Science and Technology Co. Ltd o...

Read More

“Agile development methodology is not a choice anymore, it has become the only way to continuously improve” “AGILE DEVELOPMENT METHODOLOGY IS NOT A CHOICE ANYMORE, IT HAS BECOME THE ONLY WAY TO CONTINUOUSLY IMPROVE”

blog article

Nov 02, 2016

We used to, in the past, follow what is known as the traditional methodologies. We have come a long way since. Waterfall was one of the most popular methodologies wherein we first defined and documented the client requirements, then the architecture of the software is conceptualized and coding is do...

Read More

Managing development team – Useful tips for Project managers MANAGING DEVELOPMENT TEAM – USEFUL TIPS FOR PROJECT MANAGERS

blog article

Nov 02, 2016

If you’re a project manager and you don’t have the much technical experience yourself, you might be wondering how to avoid becoming that nightmare PM so many developers seem to disregard. The fact is that you don’t need to know how to code to understand how the people on your team ...

Read More

Android app shortcuts ANDROID APP SHORTCUTS

blog article

Nov 02, 2016

While I was exploring my new Pixel XL, one of the things I noticed while setting up the perfect home screen was a pop-up menu when long pressing on certain apps. This immediately piqued my curiosity so I went looking to see what this mystery menu was; and then I discovered app shortcuts. App shortcu...

Read More

Android app shortcuts ANDROID APP SHORTCUTS

blog article

Nov 02, 2016

While I was exploring my new Pixel XL, one of the things I noticed while setting up the perfect home screen was a pop-up menu when long pressing on certain apps. This immediately piqued my curiosity so I went looking to see what this mystery menu was; and then I discovered app shortcuts. App shortcu...

Read More

Secure Productive Enterprise: A Bundled Solution for the Digital Age SECURE PRODUCTIVE ENTERPRISE: A BUNDLED SOLUTION FOR THE DIGITAL AGE

blog article

Nov 02, 2016

We create content on desktop computers, share it with coworkers and partners across internal and external networks, and send it to our team members via messaging and collaboration tools. Employees regularly connect to enterprise information systems and databases from anywhere, at any time, via table...

Read More

Automating Infrastructure in Azure Government AUTOMATING INFRASTRUCTURE IN AZURE GOVERNMENT

blog article

Nov 01, 2016

This is an overview of a solution built by AIS with Microsoft for a federal client in the DC area. The client’s goal was to be able to automate the setup and takedown of virtual machine sandboxes on the fly. These sandboxes are used by the client’s developers to do security testing of th...

Read More

Mobile UI: Should You Follow the Guidelines? MOBILE UI: SHOULD YOU FOLLOW THE GUIDELINES?

blog article

Nov 01, 2016

High-quality mobile apps are rare and mobile games show the same trend. A survey shows that an app loses 77% of its DAUs on average within the first three days after installation. There are many factors  that determine success or a fiasco of an app and UI is one of them.Other research revealed ...

Read More

Hello Again – Apple Event Recap HELLO AGAIN – APPLE EVENT RECAP

blog article

Nov 01, 2016

The Apple event last week featured a major update for the Apple TV and introduced long-awaited hardware updates for the MacBook Pro line. The Apple TV’s got a new app – it’s called “TV”. It aggregates content from other apps to bring a more conventional television exper...

Read More

The end of apps? Multimodal UI and the future of mobile THE END OF APPS? MULTIMODAL UI AND THE FUTURE OF MOBILE

blog article

Oct 31, 2016

Every day people ask me questions like, “Where is mobile going?” “Aren’t apps a fad?” “Will everything go to the browser?” “Aren’t chatbots the future?” Humans interact with technology to do something better or faster. It’s that simpl...

Read More

The end of apps? Multimodal UI and the future of mobile THE END OF APPS? MULTIMODAL UI AND THE FUTURE OF MOBILE

blog article

Oct 31, 2016

Every day people ask me questions like, “Where is mobile going?” “Aren’t apps a fad?” “Will everything go to the browser?” “Aren’t chatbots the future?” Humans interact with technology to do something better or faster. It’s that simpl...

Read More

What You Need to Know to Put Your App in the App Store or Google Play? WHAT YOU NEED TO KNOW TO PUT YOUR APP IN THE APP STORE OR GOOGLE PLAY?

blog article

Oct 31, 2016

Let's imagine for a moment that your dream has come true: your app has been created, the development process is left behind as well as sleepless nights, everyday work, gallons of coffee and piles of cigarettes. The app that until recently used to live only in your imagination is now in your hand...

Read More

Top Money-Sharing Services and Apps TOP MONEY-SHARING SERVICES AND APPS

blog article

Oct 31, 2016

Take a look at our list of the best money-sharing solutions you can use to send money to your relatives and friends.

Read More

How We Built a Cross-Platform Event App…In Less Than a Week HOW WE BUILT A CROSS-PLATFORM EVENT APP…IN LESS THAN A WEEK

blog article

Oct 28, 2016

It all started with an email from a customer: They wanted an event app for an upcoming regional sales summit. The requirements fit the mold of a typical event app (session schedule and downloadable documents, photo sharing, surveys, sync with Outlook, etc.), but there was one small problem. The app ...

Read More

App of the Month: Anchor “Radio by the People” APP OF THE MONTH: ANCHOR “RADIO BY THE PEOPLE”

blog article

Oct 28, 2016

Are you fond of podcast recording and sharing of soundbites of your own talking? Seriously… then we are sure you didn’t miss Anchor. Or did you? Anyway, it’s never too late to plan out your next podcast by reaching out through a new app or platform. Undoubtedly, Anchor is one of t...

Read More

Why Apple’s MacBook Touch Bar was the right thing to do WHY APPLE’S MACBOOK TOUCH BAR WAS THE RIGHT THING TO DO

blog article

Oct 28, 2016

People love a Greek tragedy. Icarus has flown too close to the sun and tumbled to Earth. Apple has forgotten its core users and been eclipsed by Microsoft. The Touch Bar is a compromise between adding a touch screen on a MacBook and ignoring touch entirely.
These narratives are easy to sketch...

Read More

How to Pick the Right Name for Your Mobile App HOW TO PICK THE RIGHT NAME FOR YOUR MOBILE APP

blog article

Oct 28, 2016

What’s in a name? Everything. An app’s name is the central pillar on which all your other branding efforts are built, plays a key role in App Store optimization, and is often the first “test” your app has to pass with potential users. The name of your app needs to instantly c...

Read More

Everything You Need to Know About App Install Campaigns EVERYTHING YOU NEED TO KNOW ABOUT APP INSTALL CAMPAIGNS

blog article

Oct 28, 2016

It requires almost 7,000 downloads a day to get App Store ranked in the top 25 within the popular social networking category. To break into the top 25 apps overall, you’re looking at more than 35,000. Per day. Paid app install campaigns help mobile apps get over the initial nearly impossible h...

Read More

7 Reasons Why Your Association Needs a Mobile App 7 REASONS WHY YOUR ASSOCIATION NEEDS A MOBILE APP

blog article

Oct 27, 2016

Your association strives to bring great value to its members–news and information resources, community management, social networking, opinion research, fundraising, public relations, and so much more. But, if your association is like most, it is delivering its value via email and website at be...

Read More

Top-Notch Video Streaming in Your Unity Mobile App TOP-NOTCH VIDEO STREAMING IN YOUR UNITY MOBILE APP

blog article

Oct 27, 2016

Today’s audiences are increasingly seeking better options for more immersive entertainment experiences. By providing this kind of viewer involvement, VR and AR are quickly becoming one of the hottest technologies of the decade, with the projected revenues expected to reach as much as $150B by ...

Read More

What are IT Pros scared of? WHAT ARE IT PROS SCARED OF?

blog article

Oct 27, 2016

Just before the Halloween, we have surveyed Ciklum’s employees on their hopes & fears. The answers on “What are IT pros scared of?” by the most demanded tech specialists may surprise you. IT geeks are not afraid of the things the other human beings are normally scared of. Tech ...

Read More

Boo! 10 Apps That Celebrate the Halloween Spirit BOO! 10 APPS THAT CELEBRATE THE HALLOWEEN SPIRIT

blog article

Oct 27, 2016

Four days to go…. Halloween’s just creeping around the corners!

Festive season is ON!

What have you planned to make a big bash? Lemme me guess. Ummm… Creepy costume? Or spooky make-up? Or scary decorations at home and office? Or maybe a horror-themed...

Read More

When Toasters Crashed the Internet: What You Should Know About the Recent DDoS Attack WHEN TOASTERS CRASHED THE INTERNET: WHAT YOU SHOULD KNOW ABOUT THE RECENT DDOS ATTACK

blog article

Oct 26, 2016

As the dust settles around last week’s distributed denial of service (DDoS) attack, IT experts and many affected companies will note Friday, October 21, 2016 as the date of a watershed event. It is the first time that the Internet of Things (IoT) was used in a widespread cyberattack. Where are...

Read More

Blackstone Awarded Contract to Drive Digital Transformation at DHS BLACKSTONE AWARDED CONTRACT TO DRIVE DIGITAL TRANSFORMATION AT DHS

blog article

Oct 26, 2016

Blackstone Technology Group is proud to announce that it has been awarded a professional services contract to support the Department of Homeland Security’s Office of the Chief Technology Officer (OCTO) to engineer the digital transformation of the department. “This represents a significa...

Read More

Facebook launches standalone app for Events FACEBOOK LAUNCHES STANDALONE APP FOR EVENTS

blog article

Oct 25, 2016

Every morning I wake up, the first thing that I check on my smartphone is if Facebook has announced a new feature/ app. I know of the various hazards of being addicted to smartphones but blame it on Facebook to launch something new after every few days. It came as no surprise when Facebook launched ...

Read More

UserTesting.com, I think we should see other people: our criteria for a useful usability tool USERTESTING.COM, I THINK WE SHOULD SEE OTHER PEOPLE: OUR CRITERIA FOR A USEFUL USABILITY TOOL

blog article

Oct 25, 2016

Our user-centered focus is paramount here at WillowTree. What good is an app, after all, if it doesn’t serve and delight its users? That’s why our testing process is designed with a series of user checkpoints. We want to make sure we’re delivering a product that results in satisfac...

Read More

How to sell more: 7 handy tips for e-shops’ owners HOW TO SELL MORE: 7 HANDY TIPS FOR E-SHOPS’ OWNERS

blog article

Oct 25, 2016

Are you an online store owner finding ways to increase sales? Have a look at our valuable advice and learn which mistakes you should avoid.Nowadays, online shopping is one of the fastest growing and most thriving industries. In 2015, e-commerce sales worldwide amounted to $1.55 trillion, and revenue...

Read More

Google Assistant Vs. Siri: Who Will Lead the Future of AI? GOOGLE ASSISTANT VS. SIRI: WHO WILL LEAD THE FUTURE OF AI?

blog article

Oct 24, 2016

Almost before a week, my system got crashed at the office. And I needed to switch to a Mac system from Windows. It was an awful moment for me! As I never used Mac system. Honestly speaking, while using Mac system, I realized actually it is not so difficult to use. Of course! It was tough for me to g...

Read More

5 ways sales software turns more leads into deals 5 WAYS SALES SOFTWARE TURNS MORE LEADS INTO DEALS

blog article

Oct 24, 2016

Data’s nothing new to the sales landscape. In fact, sales teams have more information at their disposal than ever before, using data to do everything from identifying opportunities to improving performance. Yet even with all that data, so many sales teams still struggle to close deals and hit ...

Read More

How to Market Your Mobile App? HOW TO MARKET YOUR MOBILE APP?

blog article

Oct 21, 2016

You can develop the world’s greatest mobile app, but it will never succeed unless you introduce it to users. Obviously, that will require marketing and advertising expertise, which can be extremely costly, especially if your app is creating new markets or radically innovating existing markets....

Read More

The surprising answer to managing your project timelines better – Don’t manage time THE SURPRISING ANSWER TO MANAGING YOUR PROJECT TIMELINES BETTER – DON’T MANAGE TIME

blog article

Oct 21, 2016

Do you use a task management software and still fail at managing project timelines? The reality is, the emails will keep flowing. The client will keep requesting changes. The meetings will always be there and the to-do list will keep expanding! As a result, your project management schedule will keep...

Read More

How to develop a bot HOW TO DEVELOP A BOT

blog article

Oct 21, 2016

Developing a bot is a challenging but worthwhile endeavor. If done properly, users will be delighted with your bot and the incredible convenience it offers. The two most critical pieces of developing a bot are the conversational architectures and the language understanding models. Getting these two ...

Read More

How to develop a bot HOW TO DEVELOP A BOT

blog article

Oct 21, 2016

Developing a bot is a challenging but worthwhile endeavor. If done properly, users will be delighted with your bot and the incredible convenience it offers. The two most critical pieces of developing a bot are the conversational architectures and the language understanding models. Getting these two ...

Read More

Sites across the internet suffer outage after cyberattack SITES ACROSS THE INTERNET SUFFER OUTAGE AFTER CYBERATTACK

blog article

Oct 21, 2016

A massive cyberattack hindered access to many major websites across the internet on Friday. On Friday morning, Dyn — a company that hosts domain name systems — announced it has been the subject of a cyberattack that caused major problems for numerous websites. People reported issues with...

Read More

App of the week: Campaign Scorecard APP OF THE WEEK: CAMPAIGN SCORECARD

blog article

Oct 21, 2016

The Domo Appstore allows you to tailor our industry-leading business intelligence platform to the specific set of challenges facing your company. With roughly 1,000 unique applications available for purchase, the Appstore provides all the tools you need to ask and answer your most pressing business ...

Read More

How do I Patent My Mobile App Idea? HOW DO I PATENT MY MOBILE APP IDEA?

blog article

Oct 20, 2016

So, you have come up with a great mobile app idea and you want to protect your idea with a patent. What do you need to know? First, you need to know that applying for a patent is a very detailed, often tedious process. However, you can make it easier by knowing some key things about the patenting pr...

Read More

Engaging Digital Employees ENGAGING DIGITAL EMPLOYEES

blog article

Oct 20, 2016

With time technology has driven the evolution in the world and same is true for employee behavior. But irrespective of time it is valid that, employees are the most valuable assets and stakeholders for organizations.The ‘Baby Boomers’ generation employees used to work in a single organiz...

Read More

Highlights of Microsoft Ignite 2016 HIGHLIGHTS OF MICROSOFT IGNITE 2016

blog article

Oct 19, 2016

The Microsoft Ignite 2016, the mega conference and the most awaited event from Microsoft, took place in Atlanta, GA from 26th September – 30th September. The event has been known, over the years, for key announcements, new developments and exciting plans as far as Microsoft products are concer...

Read More

DO WINNING AWARDS LIKE ORACLE PARTNER OF THE YEAR REALLY MATTER?!? ABSOLUTELY AND HERE IS WHY… DO WINNING AWARDS LIKE ORACLE PARTNER OF THE YEAR REALLY MATTER?!? ABSOLUTELY AND HERE IS WHY…

blog article

Oct 19, 2016

A customer recently asked me about the value of awards partners receive from IT vendors like Oracle.  I shared with them that Mythics puts a great deal of emphasis on being recognized as the “first”, “most” or “best” at what we do, as this motivates us to mai...

Read More

Getting your next mobile app connected with Azure Mobile Apps GETTING YOUR NEXT MOBILE APP CONNECTED WITH AZURE MOBILE APPS

blog article

Oct 19, 2016

New to Azure? Need a backend for your mobile app? Here here are key considerations and tips for start developing mobile apps with Azure Mobile Apps. In a world of mobile-connected devices, one of the primary components for your app is a backend, which provides security, availability and scalability ...

Read More

HOW MUCH DOES VR APPLICATION DEVELOPMENT COST? HOW MUCH DOES VR APPLICATION DEVELOPMENT COST?

blog article

Oct 19, 2016

VR application development is supposed to be the future of tech. The market is just about to explode. With long expected Oculus Rift, HTC Vive and Gear VR finally shipping as well as the markets old-timer Google Cardboard the year 2016 is going to be critical. VR technology is being successfully app...

Read More

6 Challenges That Drive IT Outsourcing 6 CHALLENGES THAT DRIVE IT OUTSOURCING

blog article

Oct 18, 2016

When it comes to deciding what technology expertise to develop and staff internally and which can be trusted to a managed service provider, however, there are no one-size-fits-all answers. Some of the top IT challenges that affect outsourcing strategies include: Balancing In-house Resources with Out...

Read More

Eyes On the Prize: Focus Your DevOps Investments EYES ON THE PRIZE: FOCUS YOUR DEVOPS INVESTMENTS

blog article

Oct 18, 2016

Make no mistake, most organizations and government agencies are—at least in part—software companies. The backbone of the services and products they sell, the internal business processes they use, and the customer feedback mechanisms they rely on are all built on software. Even in the age...

Read More

Google open sources the code that powers its domain registry GOOGLE OPEN SOURCES THE CODE THAT POWERS ITS DOMAIN REGISTRY

blog article

Oct 18, 2016

Google today release Nomulus, the Java-based registry platform that powers Google’s own .google and .foo top level domains (TLDs). Google says it started working on the technology behind Nomulus after the companyapplied to operate a number of generic TLDs itself back in 2012. Until then, domai...

Read More

U.S. Presidential Elections And 7 Apps To Pick Your Candidate U.S. PRESIDENTIAL ELECTIONS AND 7 APPS TO PICK YOUR CANDIDATE

blog article

Oct 18, 2016

Hope you all have registered to vote! Or are you still just enjoying the absolute drama surrounding this year’s elections? Every American is eagerly waiting for the moment when the next President of the country will be declared. Scratch that! Not only Americans. In fact, the entire world, even...

Read More

MOBILE LEARNING APPS: LEARN & GO MOBILE LEARNING APPS: LEARN & GO

blog article

Oct 18, 2016

We are living in the information technology age. Digital innovations change the way we do usual things. And it is not a big surprise that traditional education is being replaced with the digital education. One form of the digital learning are m-learning or mobile learning apps. Using your mobile pho...

Read More

WORDPRESS PLUGIN DEVELOPMENT – BEGINNER’S GUIDE WORDPRESS PLUGIN DEVELOPMENT – BEGINNER’S GUIDE

blog article

Oct 18, 2016

Every fourth website on the internet is powered by WordPress. Even now you are on a WordPress site! This content management system became incredibly popular among both bloggers and businesses. The reason is its flexibility and extensibility. Though WordPress itself has a limited bunch of features, i...

Read More

Exadata Disk Layers and Architecture EXADATA DISK LAYERS AND ARCHITECTURE

blog article

Oct 18, 2016

Exadata has a different disk structure in comparison to a normal database disk and it can often confuse the Oracle DBAs when they start working on Exadata. In Exadata, there are four layers of disks I will discuss each one of them in this blog. In this blog we will be discussing about Exadata disk l...

Read More

Introduction to Azure Resource Manager INTRODUCTION TO AZURE RESOURCE MANAGER

blog article

Oct 17, 2016

Have you experienced an escalation issue or sent a response to the client’s mail indicating “You have not installed it correctly” or “Your hardware is not configured properly? he Conflict between software development teams and IT operations is not new to us. Even when an appl...

Read More

Switching Gears: Enhanced Management for Enterprise Customers SWITCHING GEARS: ENHANCED MANAGEMENT FOR ENTERPRISE CUSTOMERS

blog article

Oct 17, 2016

For over three years, I have been helping customers make sense of Adobe’s subscription offering. I have acted as a guide in navigating the Value Incentive Plan (VIP) Portal as well as specific products like the Adobe Creative Cloud All Apps license and most recently, Adobe Stock. Having listen...

Read More

Why Brands Should Optimize for Google Assistant WHY BRANDS SHOULD OPTIMIZE FOR GOOGLE ASSISTANT

blog article

Oct 17, 2016

Google’s Pixel Event heavily focused on hardware. They announced Pixel (the first phone designed by Google), an updated Chromecast supporting 4K UHD video, Google Home, and more. What do all of these devices have in common? Google Assistant. So, where there’s new hardware, there’s ...

Read More

TOP 3 AI DEVICES THAT MAKE YOUR LIFE EASIER TOP 3 AI DEVICES THAT MAKE YOUR LIFE EASIER

blog article

Oct 17, 2016

Augmented reality and machine learning are often portrayed in sci-fi TV shows and movies as being a major part of our future. If the integration of these technologies signal that we’ve entered a new era, we may be at the start of that journey. AI is making our lives easier each day, and it&rsq...

Read More

Case Closed - It CASE CLOSED - IT'S TIME TO GET SERIOUS ABOUT INFORMATION SECURITY

blog article

Oct 17, 2016

For law firms, ensuring the security of information has become tantamount in importance to winning cases. Perhaps even more so. That’s because just one misstep where information is breached can lead to firm-crushing fines and loss of client confidence. Firms with clients in healthcare, banking and i...

Read More

What’s new in AVFoundation in iOS 10 WHAT’S NEW IN AVFOUNDATION IN IOS 10

blog article

Oct 14, 2016

In iOS 10 we are getting some new interesting features of AVFoundation which can improve camera usage in our apps. But before that let’s start with AVCaptureOutput class which is AVCapturePhotoOutput. Finally, we are getting easy to use a capturing function called capturePhoto. This function n...

Read More

Modern App Development: What MODERN APP DEVELOPMENT: WHAT'S FRESH, WHAT'S TRENDY?

blog article

Oct 14, 2016

Do you know what you are going to do in 10 years' time? How will your music tastes change? What phone will you buy next? What will your future house or children look like? No matter how much data you gather and how closely you analyze it, how many professionals you involve in your research, it i...

Read More

Going Above and Beyond: An Example of a Happy SAP Compliance Client GOING ABOVE AND BEYOND: AN EXAMPLE OF A HAPPY SAP COMPLIANCE CLIENT

blog article

Oct 14, 2016

SAP Best Practices for SAP Security encourage the PRODUCTION systems to keep only Security roles that are used for executing job duties in that system. SAP Roles that are provided during an ‘Upgrade’ or a new installation are to be copied and re-named with the customer’s naming con...

Read More

The Challenge of a Digital Strategy for Today THE CHALLENGE OF A DIGITAL STRATEGY FOR TODAY'S GOVERNMENT LEADERS

blog article

Oct 13, 2016

State and local governments are continually called on to do more with less. Not only must they strive to satisfy a constituency that expects self-service, on-demand services, and to always be connected, they must do so in the face of a reduced staff and constrained budgets. A 2015 Gartner report sta...

Read More

Finding candidates’ closet skeletons with help of artificial intellect FINDING CANDIDATES’ CLOSET SKELETONS WITH HELP OF ARTIFICIAL INTELLECT

blog article

Oct 13, 2016

Linguistic tools can become really useful in searching for the right candidate for the company, as they deal with Big Data management.Today, we can witness a rapid growth of headhunting practices, as any company, a mid-size or a large-size one, wants to attract to their team savvy experts who will b...

Read More

Ask a recruiter ASK A RECRUITER

blog article

Oct 13, 2016

Stop wondering. Stop Googling. If you want to unveil the shroud of mystery surrounding tech hiring, we can help. Our skill-specific tech recruiters know what employers look at first in your resume, whether they care about where you went to school and what types of questions you can expect in a devel...

Read More

Automation of Standard CRM System for Medical Company AUTOMATION OF STANDARD CRM SYSTEM FOR MEDICAL COMPANY

blog article

Oct 12, 2016

A disability has become a quite common problem which everyone has heard about or faced. In the USA alone, there are several dozen million people who have difficulties in physical functioning. According to estimates of the National Center for Health Statistics, the number of adults unable (or very di...

Read More

Enterprise Software Market Returns to Growth in Second Quarter ENTERPRISE SOFTWARE MARKET RETURNS TO GROWTH IN SECOND QUARTER

blog article

Oct 12, 2016

ARC Advisory Group (www.arcweb.com) monitors and analyzes the enterprise software market on a quarterly basis. We track the revenues of thirteen prominent publicly traded enterprise software companies and translate financial results reported in foreign currencies to US dollars using an average excha...

Read More

Customers talk to each other—and everyone wins CUSTOMERS TALK TO EACH OTHER—AND EVERYONE WINS

blog article

Oct 12, 2016

Most customer panels are conversations between the moderator and the customer. Not in Cara Capretta’s HCM session at OpenWorld 2016. Two minutes into the conversation, the HR and IT leaders from Kaiser Permanente, SGS, Siemens Corporation, MoneyGram, and IPSOS were laughing and joking with each othe...

Read More

Balancing EBS JRE Requirements With Other Java Apps BALANCING EBS JRE REQUIREMENTS WITH OTHER JAVA APPS

blog article

Oct 12, 2016

Customers frequently ask me, "What's the best way of handling JRE requirements when I have other Java applications in addition to Oracle E-Business Suite?" The short answer: you should always try to use the latest JRE release, but before you do that, you need to review your enterprise JRE requiremen...

Read More

Top Seven Features of ECMAScript 6 TOP SEVEN FEATURES OF ECMASCRIPT 6

blog article

Oct 11, 2016

The first edition of ECMAScript was brought to life approximately twenty years ago in 1997, but the first successful edition of it—ECMAScript 3 (ES 3)—was released two years later. ES 3 introduced a number of features that turned into part and parcel of the language, namely regular expre...

Read More

TIPS FOR A SUCCESSFUL IT STRATEGY TIPS FOR A SUCCESSFUL IT STRATEGY

blog article

Oct 11, 2016

For company owners and managers who do not have much IT or technical knowledge, their IT Departments or needs can be confusing and daunting to manage. If a network crashes, how does IT get it up and running again? Why is it taking that long? Does it really have to cost that much to fix the problem? ...

Read More

UI Component Extensions for ABCS with Oracle JET UI COMPONENT EXTENSIONS FOR ABCS WITH ORACLE JET

blog article

Oct 11, 2016

Once you're comfortable with Oracle JET, consider taking the next step: Application Builder Cloud Service (ABCS). No, ABCS isn't simply a drag-and-drop development environment for citizen developers. Instead, it's an architecture for software developers to establish a drag-and-drop development envir...

Read More

Oracle Fusion PPM Knowledge Zone and Specialization - Retiring ORACLE FUSION PPM KNOWLEDGE ZONE AND SPECIALIZATION - RETIRING

blog article

Oct 09, 2016

Oracle Project Portfolio Management: Oracle Fusion Project Portfolio Management Solutions Knowledge Zone has been decommissioned. Please subscribe to Oracle PPM Cloud Knowledge Zone until December 31st, 2016 to receive OPN communications and stay updated with the latest partner-specific training, re...

Read More

Google Event Recap: Chromecast Ultra, Daydream View Headset, Pixel, and Google Home GOOGLE EVENT RECAP: CHROMECAST ULTRA, DAYDREAM VIEW HEADSET, PIXEL, AND GOOGLE HOME

blog article

Oct 07, 2016

While these are compelling product options for consumers, they also present some stand out opportunities for content and service providers. Google’s Chromecast Ultra will be released soon and will support 4K resolution content. At $69, it will be one of the cheapest options available to consum...

Read More

#WAT-Up9.0 #WAT-UP9.0

blog article

Oct 07, 2016

/topic Each week, the Web Applications Team (WAT) at WillowTree uses Slack to post interesting articles, share development tricks, and discuss technologies used in our world. Here’s a breakdown of what we talked about this week. @vue: Vue 2.0 Has Arrived! Now one of the fastest frameworks avai...

Read More

#WAT-Up9.0 #WAT-UP9.0

blog article

Oct 07, 2016

topic Each week, the Web Applications Team (WAT) at WillowTree uses Slack to post interesting articles, share development tricks, and discuss technologies used in our world. Here’s a breakdown of what we talked about this week. @vue: Vue 2.0 Has Arrived! Now one of the fastest frameworks avail...

Read More

Instagram Stories has 100 million daily active users after just 2 months INSTAGRAM STORIES HAS 100 MILLION DAILY ACTIVE USERS AFTER JUST 2 MONTHS

blog article

Oct 07, 2016

Instagram Stories is benefitting from the large active user base Instagram itself enjoys, and now has 100 million daily active viewers. That’s two-thirds of the daily active user population for Snapchat, which reported 150 million global active users across its entire platform in late Septembe...

Read More

Python in a 1000 words PYTHON IN A 1000 WORDS

blog article

Oct 07, 2016

I remember the day when my kid came back home after his first day in school. He asked me just one question : “Dad, why didn’t you tell me that it’s going to be a 10 years prison?”. It seems like Python was designed with a great will to avoid such questions. It has simple synt...

Read More

Tackling the Device Mesh TACKLING THE DEVICE MESH

blog article

Oct 06, 2016

The next major technology trend is emerging – the device mesh is said will merge the physical and virtual worlds. Thanks to the Internet of Things (IoT), more and more devices are connecting. Worldwide, there are now a total of 1.2 billion LTE subscriptions—and that number is constantly ...

Read More

How to Setup an On-Prem SharePoint Hosted App HOW TO SETUP AN ON-PREM SHAREPOINT HOSTED APP

blog article

Oct 06, 2016

Sharepoint Hosted Apps are one of the two app models available in SP 2013, the other being provider hosted apps. Although any SharePoint component that can be in a SharePoint-hosted app can also be in a provider-hosted app, the basic difference between these models is that a provider hosted app has ...

Read More

SOCIAL MEDIA STRATEGY HACKS: BEST PRACTICES TO FOLLOW RIGHT AWAY SOCIAL MEDIA STRATEGY HACKS: BEST PRACTICES TO FOLLOW RIGHT AWAY

blog article

Oct 06, 2016

How often do you check your Facebook profile? Posting photos on Instagram? Scanning Twitter? Well, I’d better not count my own social media accounts. What is more – I’d better not think about how much time I spend there. Each of us is totally addicted to his phone, as well as to li...

Read More

G suite (formerly Google Apps) Payment issue with Credit Card G SUITE (FORMERLY GOOGLE APPS) PAYMENT ISSUE WITH CREDIT CARD

blog article

Oct 05, 2016

Credit card payment issues with G Suite started when RBI included two step verification process while making online payments. This extra step was included to avoid the misuse of credit card. However these enhanced security measures created issues for some users, wherein they faced authorization prob...

Read More

Comparison of Linguistic APIs - Named Entity Recognition - Persons, Locations, Organizations COMPARISON OF LINGUISTIC APIS - NAMED ENTITY RECOGNITION - PERSONS, LOCATIONS, ORGANIZATIONS

blog article

Oct 05, 2016

EffectiveSoft experts carried out a research of 10 leading linguistic APIs on how they perform named entity recognition. Read more about the results.

Read More

Artificial Intelligence: A Rising Star of Mobile Technology ARTIFICIAL INTELLIGENCE: A RISING STAR OF MOBILE TECHNOLOGY

blog article

Oct 05, 2016

“We are evolving for a mobile-first to AI first world. Computing will be available everywhere in the context of a human’s daily life” Sundar Pichai, CEO of Google, rightly glimpsed the future at the Google hardware event yesterday. Flow of innovation is never switched off in the te...

Read More

SiriKit, a hands-on experience SIRIKIT, A HANDS-ON EXPERIENCE

blog article

Oct 05, 2016

“SiriKit enables your iOS 10 apps to work with Siri, so users can get things done with your content and services using just their voice.” Recently I took on the task of implementing a SiriKit proof of concept. The goal was to research and explore what can be achieved with this new API. I...

Read More

Building Desktop App with Electron BUILDING DESKTOP APP WITH ELECTRON

blog article

Oct 05, 2016

Currently, in the Web we can do almost everything using HTML/CSS/JS. There is a lot of libraries, frameworks, debug tools, test frameworks, articles and training resources. Also, do not forget about StackOverflow, where you can find the answers to questions almost instantly and some of them with rea...

Read More

Oracle Financial Services Software allots equity shares ORACLE FINANCIAL SERVICES SOFTWARE ALLOTS EQUITY SHARES

blog article

Oct 05, 2016

Oracle Financial Services Software announced that the ESOP Allotment Committee of the Company at its meeting held on 05 October 2016 allotted 4,998 equity shares of face value of Rs.5/- each to the eligible Employees of the Company who have exercised their stock options under the Employee Stock Opti...

Read More

ERP Solutions AvaTax-to-JDE eONE Interface Achieves Oracle Validated Integration with Oracles JD Edwards EnterpriseOne ERP SOLUTIONS AVATAX-TO-JDE EONE INTERFACE ACHIEVES ORACLE VALIDATED INTEGRATION WITH ORACLES JD EDWARDS ENTERPRISEONE

blog article

Oct 05, 2016

Smart ERP Solutions, Inc., a Platinum-level member of Oracle PartnerNetwork (OPN), today announced that it has achieved Oracle Validated Integration of its AvaTax-to-JDE eONE Interface. This designation means that AvaTax from Avalara, which can help reduce the efforts and costs for its customers by ...

Read More

K-Rise Systems EASYProcess Achieves Oracle Validated Integration with Oracle’s JD Edwards EnterpriseOne K-RISE SYSTEMS EASYPROCESS ACHIEVES ORACLE VALIDATED INTEGRATION WITH ORACLE’S JD EDWARDS ENTERPRISEONE

blog article

Oct 05, 2016

K-Rise Systems, Inc., a provider of enterprise business solutions and a Gold-level member of Oracle PartnerNetwork (OPN), today announced that it has achieved Oracle Validated Integration for EASYProcess 4.8 with Oracle’s JD Edwards EnterpriseOne 9.2. The EASYProcess platform for enterprise developm...

Read More

Got Bot? Building A Conversational UX With the Bot Framework GOT BOT? BUILDING A CONVERSATIONAL UX WITH THE BOT FRAMEWORK

blog article

Oct 04, 2016

In an earlier blog I gave an overview of the Microsoft Bot Framework. Today we’ll take a look at the developer experience, building a starter bot, and integrating LUIS. Next we’ll create a new LUIS App and start building our model for this application (you’ll need to sign up with a...

Read More

Not Every IT Staffing Agency Can Meet the Needs of the “Gig” Economy NOT EVERY IT STAFFING AGENCY CAN MEET THE NEEDS OF THE “GIG” ECONOMY

blog article

Oct 04, 2016

In the era of the digital and service-oriented business, organizations are dealing with rapid changes in technology to accommodate ever-more critical business processes that must be agile and responsive. As these changes drive workforce management to the top of the business agenda, the IT staffing a...

Read More

Bottle Rocket’s Journey Into Quality Assurance Automation BOTTLE ROCKET’S JOURNEY INTO QUALITY ASSURANCE AUTOMATION

blog article

Oct 04, 2016

In today’s mobile world, quality assurance automation is a new necessary in successful testing. It allows us to be hyper-focused on the quality of our client’s work by checking overlooked things without using team resources. At Bottle Rocket, we’ve defined a formal process for it t...

Read More

RMAN ACTIVE Database Duplication RMAN ACTIVE DATABASE DUPLICATION

blog article

Oct 04, 2016

Oracle Database 11g offers clone source DB without requiring backup. Prior to 11g you had to take physical backup on disk/tape, however now you can create a clone DB over the network without prior backup. In 11g, a new feature called RMAN Active database duplication has been introduced to clone a da...

Read More

Divide and Conquer Approach to Quality Assurance DIVIDE AND CONQUER APPROACH TO QUALITY ASSURANCE

blog article

Oct 04, 2016

Quality analyst is a high risk, low rewards role of any project. Nobody says that product is of top quality due to QA. On the other hand everybody pounces upon the QA team when the issues are found while using the application.The waterfall model had given an advantage to QA team to ensure that the p...

Read More

Face tracking with AVFoundation FACE TRACKING WITH AVFOUNDATION

blog article

Oct 03, 2016

Face tracking is an interesting feature which is available on iOS since it’s 5th version. In this tutorial, I would like to show you how to implement it in Swift 3.0. The biggest issue with the implementation of this feature is a fact that you have to implement camera support by using AVFounda...

Read More

Android Gradle configurations ANDROID GRADLE CONFIGURATIONS

blog article

Oct 03, 2016

Configurations are used here to group dependencies, they are defined using pattern configurationName dependencyNotation. In the example above compile, testCompile and so on are all configuration names and 'com.jakewharton:butterknife:8.4.0', project(':api') are dependency notations. ...

Read More

IT’s new role: From supporting business to enabling it IT’S NEW ROLE: FROM SUPPORTING BUSINESS TO ENABLING IT

blog article

Oct 03, 2016

In the 1990s, the founder of one of the world’s leading overnight shipping companies reportedly said, “We’re a technology company that just happens to ship boxes to pay for all our technology.” In fact, his company pioneered such groundbreaking applications as customer web portals for tracking pack...

Read More

Atomic is like Google Docs for interface prototyping ATOMIC IS LIKE GOOGLE DOCS FOR INTERFACE PROTOTYPING

blog article

Sep 30, 2016

Meet Atomic, a prototyping service for your next mobile app or website. It works in your browser, but it’s a lot more powerful than you’d expect. Atomic handles animations and lets you make interactive designs. And you can collaborate on your designs with your team in real time. The star...

Read More

Craft vs. Mass Production: Vivid Advantages of Custom Software Development CRAFT VS. MASS PRODUCTION: VIVID ADVANTAGES OF CUSTOM SOFTWARE DEVELOPMENT

blog article

Sep 30, 2016

Certain work requires specific tools, as people say. If you want to dig a hole - use a spade, a nail can be battered down with a hammer, a tree can be cut with an axe, etc. But there will always be tasks, for which using a standard tool won't be enough - you will have to enhance and customize it...

Read More

3 Steps to Confidence in Your IT Security 3 STEPS TO CONFIDENCE IN YOUR IT SECURITY

blog article

Sep 30, 2016

IT security is often an invisible problem for the typical business manager. If you are feeling that way about your IT infrastructure, consider these 3 steps to gain confidence in your security. If you’re not a cybersecurity expert, it’s hard to know if your company’s digital information is secure. T...

Read More

Technology and the future of community TECHNOLOGY AND THE FUTURE OF COMMUNITY

blog article

Sep 30, 2016

Will new technology change us back to a village a community society, even if those communities are virtual? The defining feature of homo sapiens is our ability to communicate ideas at scale and organize around those ideas (Ref 1). The next wave of technologies creates the ability for distributed com...

Read More

How IT financing can help your business grow and thrive HOW IT FINANCING CAN HELP YOUR BUSINESS GROW AND THRIVE

blog article

Sep 30, 2016

As the leader of Dell’s in-house financing provider, every day I see businesses grapple with the difficulty of keeping up with rapidly evolving technology trends while managing tight IT budgets. In fact, a recent Techaisle survey showed that budget constraints are the top IT challenge for small and...

Read More

Planning migration of your ecommerce website? Here are some tips to help you with a smooth migration PLANNING MIGRATION OF YOUR ECOMMERCE WEBSITE? HERE ARE SOME TIPS TO HELP YOU WITH A SMOOTH MIGRATION

blog article

Sep 29, 2016

If you have decided to migrate your ecommerce site from one to platform to another, you are obviously aware of the challenges that you are likely to face. There are a number of issues and roadblocks that you might face while planning a migration of an ecommerce website. Some of the key reasons for y...

Read More

App of The Month: Google Allo, Super Kid of M-Town! APP OF THE MONTH: GOOGLE ALLO, SUPER KID OF M-TOWN!

blog article

Sep 29, 2016

Messenger-Town (M-Town) has had enough of residents. The big giants ruled the king down and the rest followed suit. When we though the competition was done for good for a while, the know-it-all daddy of internet, Google, just surprised us with an amazing new messenger that is blowing minds across th...

Read More

HOW TO ESTIMATE TIME FOR SOFTWARE TESTING – PITFALLS AND CORNERSTONES HOW TO ESTIMATE TIME FOR SOFTWARE TESTING – PITFALLS AND CORNERSTONES

blog article

Sep 29, 2016

Estimating software testing time is difficult to get right. You can overestimate it and slow down your time-to-market. Or you can underestimate it and leave your customers dissatisfied. Here are factors you need to consider in your estimation and a walk-through of a tried-and-true strategy, so you c...

Read More

Key Takeaways from SAP TechEd 2016 KEY TAKEAWAYS FROM SAP TECHED 2016

blog article

Sep 29, 2016

SAP TechEd 2016 recently occurred from September 19 – 23 and I had the pleasure of attending the event’s 20th anniversary in Las Vegas. As mentioned in my previous blog post, SAP TechEd is known for being extremely informative and all-around educational. This year in particular did not d...

Read More

Higher education IT recruiting: Small changes that make a big difference HIGHER EDUCATION IT RECRUITING: SMALL CHANGES THAT MAKE A BIG DIFFERENCE

blog article

Sep 29, 2016

If you’re struggling to attract qualified IT workers—and worried you can’t compete in the compensation race—you’re not alone. Higher education IT institutions often struggle to recruit IT talent, and the problem is getting worse as the labor market tightens and salaries...

Read More

Apple’s Search Ads Is Here. Get $100 Credits Towards Your First Ad Campaign! APPLE’S SEARCH ADS IS HERE. GET $100 CREDITS TOWARDS YOUR FIRST AD CAMPAIGN!

blog article

Sep 29, 2016

Apple launches Search Ads for iOS apps today which was formally rolled out at the event of WWDC 2016. Beta-tested after the announcement, Search Ads will showcase all the user’s search results ads at the top of the App Store depending on its bidding and relevancy. Search Ads is a proficient and simp...

Read More

Oracle, FCC, IP-intensive industries report, biosimilars, PTAB, Scotch Whisky- The week in IP ORACLE, FCC, IP-INTENSIVE INDUSTRIES REPORT, BIOSIMILARS, PTAB, SCOTCH WHISKY- THE WEEK IN IP

blog article

Sep 29, 2016

Judge William Alsup of the Northern District of California has refused oracle’s request for a retrial of its long-running copyright dispute with Google over Java Software, reports techdirt. Oracle argued that Google withheld information about planning to expand the Android operating system to laptop...

Read More

Mainframe Cost Optimization MAINFRAME COST OPTIMIZATION

blog article

Sep 29, 2016

In today’s competitive IT world, the Mainframe System still maintaining its legacy power since most of the business critical applications are under its radar coverage and moreover it proves to be the most secured and a reliable source for storing the Client sensitive data. In spite of that strong vi...

Read More

What makes a successful software factory? WHAT MAKES A SUCCESSFUL SOFTWARE FACTORY?

blog article

Sep 29, 2016

The following is an excerpt from my book Digitally Remastered, which outlines how to successfully build a software factory to support your digital transformation efforts now and into the future. Today, your customers may be your biggest disruptors and are increasingly your most important partners i...

Read More

Oracle buys San Mateo Marriott ORACLE BUYS SAN MATEO MARRIOTT

blog article

Sep 29, 2016

Oracle Corp. has purchased the 476-room Marriott Hotel in San Mateo for $132 million, in part to use for training its direct-sales staff.The hotel will continue to operate as a Marriott and be open to the public, even during an extensive renovation that the Redwood City software company plans to und...

Read More

Programmatic Direct: Drivers and Challenges PROGRAMMATIC DIRECT: DRIVERS AND CHALLENGES

blog article

Sep 28, 2016

Direct ad buying has been there since the dawn of the advertising industry. Yet, in the digital age, it’s having a hard time keeping up with the coming of programmatic, which in the minds of many publishers and brands is still reduced to real-time bidding only. Historically, direct ad buys res...

Read More

AGILE METHODOLOGY IN APP DEVELOPMENT CUTS BUSINESS COSTS AGILE METHODOLOGY IN APP DEVELOPMENT CUTS BUSINESS COSTS

blog article

Sep 28, 2016

Software development has now become a necessary part of starting and running a business successfully. Considering that businesses can hardly survive without a web presence, there is always a need in a properly designed and planned mobile application. Agile methodology in software development is a so...

Read More

App development cost: Android vs iOS APP DEVELOPMENT COST: ANDROID VS IOS

blog article

Sep 28, 2016

Every decision has its cost. It doesn’t matter if you decide what car to buy or what girl to marry or what platform to choose for your brand new mobile app. There is always some kind of inner fight between the investments you are planning to make and the expected result. That is normal and pre...

Read More

TriCore TRICORE'S IT TRENDS, TALENT AND OUTSOURCING SURVEY: ARE YOU PREPARED FOR THE FUTURE, IT LEADERS?

blog article

Sep 28, 2016

What are companies’ most pressing IT needs? More importantly, what can they take on in house, and what are they looking to outsource? Environments are more complex than ever, as companies move specific workloads to the public cloud while maintaining on premise infrastructure. It can seem daunt...

Read More

Notifications in iOS 10 NOTIFICATIONS IN IOS 10

blog article

Sep 27, 2016

With iOS 10, tvOS 10 and watchOS 3 launch Apple introduced the new UserNotifications framework. It supports the delivery and handling of local and remote notifications. Cool, but you can say that it was already possible through UIKit and classes like UILocalNotification or dictionaries for remote no...

Read More

Addressing Compliance Challenges in a Non-Compliant World ADDRESSING COMPLIANCE CHALLENGES IN A NON-COMPLIANT WORLD

blog article

Sep 27, 2016

The scale, scope and complexity of regulatory compliance rules continue to increase – for good reason. Compliance mandates exist to hold companies accountable, mitigate risk and protect employees and customers from fraud, unfair practices and increasingly against malicious cyber activity. Toda...

Read More

Microsoft Azure API Management Essentials MICROSOFT AZURE API MANAGEMENT ESSENTIALS

blog article

Sep 27, 2016

AIS’ CTO and noted Azure expert Vishwas Lele has a brand new course available at Pluralsight: Microsoft Azure API Management Essentials. Application Programming Interfaces (APIs) are increasingly considered “engines of growth” and are already fundamentally changing the way organiza...

Read More

Apple Launches iOS 10. What’s New For The Developers! APPLE LAUNCHES IOS 10. WHAT’S NEW FOR THE DEVELOPERS!

blog article

Sep 27, 2016

The article gives an in-depth overview, pertaining to the iOS developers about the crucial features that have been introduced in iOS 10 which is running on the current iOS devices. The Worldwide Developers Conference (WWDC) 2016 which was held between June 13th and 17th, 2016 at San Francisco witnes...

Read More

The broken promise of open-source Big Data software – and what might fix it THE BROKEN PROMISE OF OPEN-SOURCE BIG DATA SOFTWARE – AND WHAT MIGHT FIX IT

blog article

Sep 27, 2016

Standing amid the clamor of the Hadoop Summit trade show in San Jose in June, Rakesh Kant couldn’t conceal his annoyance. As head of enterprise data management and analytics technology for U.S. Bank, Kant wanted to use some of the many emerging Big Data technologies hawked at the show — such as Hado...

Read More

The Biggest OpenWorld 2016 Takeaway THE BIGGEST OPENWORLD 2016 TAKEAWAY

blog article

Sep 27, 2016

What an amazing conference, full of crazy energy and excitement fueled by music from Gwen Stefani and Sting. Ha! Try to top that! All the billboards and buildings surrounding Moscone Conference Center were covered in Oracle Cloud posters with quotes from Oracle Cloud customers. For Oracle SaaS, the ...

Read More

How to build software into your business DNA HOW TO BUILD SOFTWARE INTO YOUR BUSINESS DNA

blog article

Sep 27, 2016

We all know a new world is taking shape. It’s a world dominated by apps. It’s a world where competitive differentiation is determined by a business’s ability to embrace software-driven business models and advanced development methods. It’s a place where disruption is the norm and where long-establis...

Read More

Dell Unveils Two New Thin Clients DELL UNVEILS TWO NEW THIN CLIENTS

blog article

Sep 27, 2016

Dell recently launched two thin client devices designed for mobile use and the extension of Dell's Data Protection, designed to protect customers against advanced persistent threats and malware. Here's how the company describes its new products: The Dell Latitude E7270 mobile thin client is de...

Read More

PrimeRevenue Congratulates Volvo Cars on its Adam Smith Award PRIMEREVENUE CONGRATULATES VOLVO CARS ON ITS ADAM SMITH AWARD

blog article

Sep 27, 2016

PrimeRevenue, Inc., the global leader in working capital finance solutions, recognizes its longtime customer, Volvo Cars and Head of Trade and Financing Solutions Kamol Khodjaev, as a Treasury Today Adam Smith award winner. Earlier this summer, Volvo Cars was named an Overall Winners 2016 - Best Tra...

Read More

3D Touch in Swift 3.0 3D TOUCH IN SWIFT 3.0

blog article

Sep 26, 2016

With the introduction of iPhone 6S, Apple presented new feature called 3D Touch. It is a new layer on device’s screen that can detect the force of our touch. 3D Touch allows developers to provide users with the bunch of new experiences when using the app. As you can see on the image above, in ...

Read More

Azure DocumentDB – A Deep Dive AZURE DOCUMENTDB – A DEEP DIVE

blog article

Sep 26, 2016

Azure DocumentDB offers rich query and transactional processing over schema-free data. It helps in delivering configurable and reliable performance and enables rapid development through a self-managed platform, powered by Azure. DocumentDB is undeniably the right solution for the web and mobile appl...

Read More

How Feature Toggles Can Enable A/B Testing in Mobile Apps HOW FEATURE TOGGLES CAN ENABLE A/B TESTING IN MOBILE APPS

blog article

Sep 26, 2016

At Überconf 2016, Neal Ford gave a great presentation titled “Hypothesis-driven Development using Feature Toggles.” In his talk, Ford explained how a simple, yet powerful, technique called feature toggles can be used to achieve true agility in software development. While these ideas...

Read More

How Feature Toggles Can Enable A/B Testing in Mobile Apps HOW FEATURE TOGGLES CAN ENABLE A/B TESTING IN MOBILE APPS

blog article

Sep 26, 2016

At Überconf 2016, Neal Ford gave a great presentation titled “Hypothesis-driven Development using Feature Toggles.” In his talk, Ford explained how a simple, yet powerful, technique called feature toggles can be used to achieve true agility in software development. While these ideas...

Read More

4 Key factors to successful IT Solution implementation 4 KEY FACTORS TO SUCCESSFUL IT SOLUTION IMPLEMENTATION

blog article

Sep 26, 2016

In the early 2000s, many major B2C groups were lured with the promise of CRM web based solution, which claimed to generate huge and quick profit. Many of them implemented these plug-and-play CRM solutions, but they got disappointing results. As per the statistics, the success rate was barely 30% for...

Read More

Riding the Social Media Wave: Earned Media, Frictionless Sharing & “Here-now” Social Network RIDING THE SOCIAL MEDIA WAVE: EARNED MEDIA, FRICTIONLESS SHARING & “HERE-NOW” SOCIAL NETWORK

blog article

Sep 26, 2016

Abstract: Earned media is a subset of social branding wherein companies try hard to get favorable publicity through promotional efforts rather than paid advertisements. According to a study by Nielsen, 92% of consumers around the world mentioned that they trust earned media such as word of mouth and...

Read More

Report: Oracle to End Use of GSA’s IT Schedule 70 Contract Vehicle, Third-Party Software Resellers REPORT: ORACLE TO END USE OF GSA’S IT SCHEDULE 70 CONTRACT VEHICLE, THIRD-PARTY SOFTWARE RESELLERS

blog article

Sep 26, 2016

Oracle will no longer use the General Services Administration’s Information Technology Schedule 70 acquisition vehicle and third-party resellers to directly sell its software platforms to government agencies, Federal News Radio reported Monday. Oracle’s decision seeks to reduce litigation risks a...

Read More

Analyst says early adopters love their Oracle T7 servers ANALYST SAYS EARLY ADOPTERS LOVE THEIR ORACLE T7 SERVERS

blog article

Sep 26, 2016

The Oracle T7 server with M7 technology baked in is a good deal for heavy Oracle users, providing much higher performance at a significantly lower cost than the T5 generation, writes Wikibon CTO David Floyer (@DLfloyer). Early adopters extolled the advantages of the T7 for its high security and hig...

Read More

Acetti Software Joins Cloud Foundry Foundation to Support Cloud Scale-Out ACETTI SOFTWARE JOINS CLOUD FOUNDRY FOUNDATION TO SUPPORT CLOUD SCALE-OUT

blog article

Sep 26, 2016

SAN JOSE, Calif., Sept. 26, 2016 /PRNewswire/ -- Acetti Software, the intelligent solution that boosts performance by making cloud infrastructure application-aware, today announced that it has joined the Cloud Foundry Foundation, home of the industry-standard platform for cloud applications, as a si...

Read More

Bottle Rocket at 360iDev: CoreAnimation Using Swift Playgrounds BOTTLE ROCKET AT 360IDEV: COREANIMATION USING SWIFT PLAYGROUNDS

blog article

Sep 25, 2016

Recently, iOS Developer Russell Mirabelli spoke at 360iDev, a four-day iOS developers conference in Denver. During the event, Russell hosted a session titled “200: Better CoreAnimation Using Swift Playgrounds.” The session covered using Swift playgrounds to quickly iterate through ideas,...

Read More

The 5 technologies that are going to define the next decade in cities THE 5 TECHNOLOGIES THAT ARE GOING TO DEFINE THE NEXT DECADE IN CITIES

blog article

Sep 23, 2016

Cities have always been hubs of technological experimentation, shaped by the people who inhabit them and the tools they use. We can still see the marks, both charming and garish, from technologies of years past — from old aqueducts to telephone booths to the damage done by cars. The next wave ...

Read More

Coca-Cola Freestyle App Renovates for iOS 10 With Tasteful iMessage Extension COCA-COLA FREESTYLE APP RENOVATES FOR IOS 10 WITH TASTEFUL IMESSAGE EXTENSION

blog article

Sep 23, 2016

Fans of Coca-Cola Freestyle are drinking up the latest features of their newly updated iOS app. Apple’s iOS 10 features extensions for maps, iMessage, and Siri that allow brands to add new touchpoints for their new or established apps. In Version 5.7.1 of the Coca-Cola Freestyle app, users can...

Read More

Wikibon trip report from OpenWorld 2016: Oracle stakes its cloud claim WIKIBON TRIP REPORT FROM OPENWORLD 2016: ORACLE STAKES ITS CLOUD CLAIM

blog article

Sep 23, 2016

That is the fundamental question that executives at most of the Global 2000 should ask themselves as they make cloud decisions over the next few years. Here’s the trade-off: On the one hand, Oracle OpenWorld this week in San Francisco dramatically pushed the cloud state-of-the-art forward. New tech...

Read More

5 Key Reasons to Outsource Your Application & Database Management 5 KEY REASONS TO OUTSOURCE YOUR APPLICATION & DATABASE MANAGEMENT

blog article

Sep 22, 2016

To be competitive, enterprises need to deliver new products, update processes and improve services that will drive new business, increase profits, and cut costs – all while asking IT to do more with less. As the pace of innovation increases, many IT organizations find themselves stretched impo...

Read More

What Is a Web Framework? WHAT IS A WEB FRAMEWORK?

blog article

Sep 22, 2016

Web framework is a set of components designed to simplify your web development process. It has basic structuring tools in it, which serve as a solid base for your project. It allows you to focus on the most important details and project’s goals instead of creating things, that you can simply p...

Read More

Securing the application economy over the next… SECURING THE APPLICATION ECONOMY OVER THE NEXT…

blog article

Sep 22, 2016

“In the new cyber threat environment, Identity and Access Management (IAM) and Application Programming Interface (API) management technologies are central to protecting systems, networks, devices and data, and to enabling secure interactions with customers and citizens.” This is the key point CA Te...

Read More

Nutanix IPO: Lower Price, Good Buy NUTANIX IPO: LOWER PRICE, GOOD BUY

blog article

Sep 22, 2016

Nutanix, a software “unicorn” which uses hyper-converged technology, is moving towards an IPO after delaying for about nine months. The company boasts strong revenue and customer growth and has made acquisitions to boost its technological prowess. Nutanix has never been profitable, does not antici...

Read More

The Value of Software Design THE VALUE OF SOFTWARE DESIGN

blog article

Sep 21, 2016

Have you heard this phrase before? ‘We need to put less effort on quality so we can build more features for our next release’. The idea is to sacrifice absolute quality in order to produce a finished product more quickly under strict time constraints.
The truth is that the quality...

Read More

Beyond Music, AirPods, and UX BEYOND MUSIC, AIRPODS, AND UX

blog article

Sep 21, 2016

We’ve had some time to think about the event, and we’ve noticed something interesting about Apple’s new focus. We already know they’re working to create a seamless user experience across their suite of products, but now there are new opportunities to engage with users when th...

Read More

Deep Linking: An Essential Tool for Mobile App Marketers DEEP LINKING: AN ESSENTIAL TOOL FOR MOBILE APP MARKETERS

blog article

Sep 21, 2016

Before diving deep into the mobile app deep linking it’s very important to know what does deep linking actually means? a deep link is a link that takes you to the content page rather than the landing or home page of the website. Mobile app deep linking is the process of using Uniform Resource Identi...

Read More

Oracle Wins $46M In Fees, Costs After IP Win Over Rimini ORACLE WINS $46M IN FEES, COSTS AFTER IP WIN OVER RIMINI

blog article

Sep 21, 2016

Law360, Los Angeles (September 21, 2016, 10:09 PM EDT) -- Oracle USA Inc. is entitled to $46.2 million in attorney’s fees and costs against software support firm Rimini Street Inc. following its substantial $50 million jury win on copyright infringement and other claims, a Nevada federal judge ruled...

Read More

Being Agile: It BEING AGILE: IT'S A MATTER OF PERSPECTIVE

blog article

Sep 20, 2016

A young couple moves into a new neighborhood. The next morning while they are eating breakfast, the young woman sees her neighbor hanging the wash outside. "That laundry is not very clean", she said. "She doesn't know how to wash correctly. Perhaps she needs better laundry soap.&r...

Read More

Top Smart City IoT Applications TOP SMART CITY IOT APPLICATIONS

blog article

Sep 20, 2016

While we were arguing with strangers in comment sections and looking at memes, the internet has been evolving. It has been subtlety encroaching into other parts of our daily lives and expanding the amount of data that can be collected by individual users. As nearly everyone now owns multiple smart d...

Read More

Is SharePoint 2016 Migration on your mind? Consider some tips before you take the plunge IS SHAREPOINT 2016 MIGRATION ON YOUR MIND? CONSIDER SOME TIPS BEFORE YOU TAKE THE PLUNGE

blog article

Sep 20, 2016

We are already aware of some of the new and exciting features of SharePoint 2016. In our blog Microsoft SharePoint 2016 – what’s in it for me?, we extensively covered the main highlights of Microsoft’s new release like Enhanced user experience, Hybrid OneDrive for business, enhance...

Read More

Bridging the Divide With DevOps BRIDGING THE DIVIDE WITH DEVOPS

blog article

Sep 20, 2016

DevOps is the latest catchphrase that everyone claims to be doing. Gartner recommends that “leaders wishing to create a significant, lasting impact on IT performance should look to move beyond the Bimodal paradigm in the space of months rather than years.” Leading and executing on this c...

Read More

QA Guide to Android Nougat Regression Testing QA GUIDE TO ANDROID NOUGAT REGRESSION TESTING

blog article

Sep 20, 2016

So a new version of Android is out and your boss says to you, “Make sure our app works on Nougat!” If you have automation frameworks in place those can get you some of the way, but wouldn’t it be nice to have a complete guide to the changes in Nougat and how they affect your existi...

Read More

THANK YOU - 2016 ORACLE LINUX & VIRTUALIZATION PARTNER OF THE YEAR - ORACLE OPENWORLD16 #OOW16 THANK YOU - 2016 ORACLE LINUX & VIRTUALIZATION PARTNER OF THE YEAR - ORACLE OPENWORLD16 #OOW16

blog article

Sep 20, 2016

Mythics was proud to accept the 2016 Oracle Linux and Virtualization North America Partner of the Year Award during a wonderful reception last night at Oracle OpenWorld16 in San Francisco.  Thank you to all our friends and colleagues on the Oracle Linux and Virtualization Teams for this tremend...

Read More

QA Guide to Android Nougat Regression Testing QA GUIDE TO ANDROID NOUGAT REGRESSION TESTING

blog article

Sep 20, 2016

So a new version of Android is out and your boss says to you, “Make sure our app works on Nougat!” If you have automation frameworks in place those can get you some of the way, but wouldn’t it be nice to have a complete guide to the changes in Nougat and how they affect your existi...

Read More

Google Play Early Access – An Exclusive Platform for Beta App Testing GOOGLE PLAY EARLY ACCESS – AN EXCLUSIVE PLATFORM FOR BETA APP TESTING

blog article

Sep 20, 2016

Google’s September gift is unveiled. Excited to know what it is? The tech giant has introduced a unique concept named “Early Access”. This program is available on Google Play to make the beta testing process of the apps more simplified for Android developers and beta testers. Beta ...

Read More

Get Ready for the Hottest, New Machine Learning and Data-Powered Apps GET READY FOR THE HOTTEST, NEW MACHINE LEARNING AND DATA-POWERED APPS

blog article

Sep 20, 2016

Have you ever wondered how Pandora, Netflix, and Uber make it possible for you to create personalized music sets, find movies worth watching, or get from point A to B? These services are all powered by sophisticated machine learning algorithms that continuously learn about you—delivering what you ne...

Read More

Oracle pact calls for big state money ORACLE PACT CALLS FOR BIG STATE MONEY

blog article

Sep 20, 2016

PORTLAND, Ore. (PORTLAND TRIBUNE) — Oregon’s settlement of its long-running legal war with Oracle last week comes with a hidde