RESOURCES


   
Helping Enterprises Scale IoT Deployments with Secure Computing at the Edge HELPING ENTERPRISES SCALE IOT DEPLOYMENTS WITH SECURE COMPUTING AT THE EDGE

blog article

Jun 20, 2018

After an exciting week at Cisco Live in Orlando with hundreds of customer meetings we came away excited to see IT and Operational teams partnering together to move Industrial IoT deployments from Proof of Concept (PoC) to production.  Customers, channel and alliance partners want to ensure they...

Read More

Is Open Source Testing influencing Digital Transformation efforts? IS OPEN SOURCE TESTING INFLUENCING DIGITAL TRANSFORMATION EFFORTS?

blog article

Jun 18, 2018

Years ago, a very few would have believed that a software application could help to conceptualize an entire global business idea, and become a corporate sensation. Brands such as Amazon, Uber, AirBnB, Ola, Flipkart, and Alibaba have reinvented the way businesses could ever apply and harness Digital ...

Read More

Firewall Management Maturity Stage 3: Advanced Firewall Management FIREWALL MANAGEMENT MATURITY STAGE 3: ADVANCED FIREWALL MANAGEMENT

blog article

Jun 13, 2018

From enabling external intelligence to following a co-managed strategy, firewall management continues evolving to protect organizations from cyber threats. The firewall technology evolution continues. Today finds us at a place where firewalls provide vast capabilities, in particular when it comes to...

Read More

IoT Discussion at the Leidos Supplier Innovation & Technology Symposium IOT DISCUSSION AT THE LEIDOS SUPPLIER INNOVATION & TECHNOLOGY SYMPOSIUM

blog article

Jun 12, 2018

Coalfire was asked to participate on a technical panel about the Internet of Things (IoT) at the Leidos Supplier Innovation & Technology Symposium on June 6. This event is a dynamic day enabling Leidos’ largest suppliers as well as targeted start-ups to showcase their offerings and capabil...

Read More

6 Recommendations for Driving Business Value from Test Automation 6 RECOMMENDATIONS FOR DRIVING BUSINESS VALUE FROM TEST AUTOMATION

blog article

Jun 11, 2018

Cloud-BaseThe rapid demand for IT organizations to deliver high-quality software at a progressively faster rate has necessitated the shift to agile development and DevOps methodologies. As applications under development become more complex in nature, continuously changing to include new technologies...

Read More

More Details on an ActiveX Vulnerability Recently Used to Target Users in South Korea MORE DETAILS ON AN ACTIVEX VULNERABILITY RECENTLY USED TO TARGET USERS IN SOUTH KOREA

blog article

Jun 11, 2018

Recently, an ActiveX zero-day was discovered on the website of a South Korea think tank that focuses on national security. Whilst ActiveX controls are disabled on most systems, they are still enabled on most South Korean machines due to mandates by the South Korean government. These attacks have bee...

Read More

Key Elements in Your Cybersecurity Response Plan KEY ELEMENTS IN YOUR CYBERSECURITY RESPONSE PLAN

blog article

Jun 07, 2018

As cyber-attacks become more sophisticated, and numerous, CIOs and CISOs need to up their ability to quickly respond to an attack. Data from Alert Logic’s Threat Hunting Report found that 56% of companies experienced an increase in cyber-attacks last year.

Read More

Citrix SD-WAN Dynamic NAT explained CITRIX SD-WAN DYNAMIC NAT EXPLAINED

blog article

Jun 06, 2018

Lets face it, the hottest topic in any customer conversation today is SD-WAN. Gone are the days of a customer being tied into an expensive MPLS network, managed by a single provider with lengthy contracts. Customers are now using multiple, carrier agnostic internet links to build a highly resilient ...

Read More

VPNFilter: a global threat beyond routers VPNFILTER: A GLOBAL THREAT BEYOND ROUTERS

blog article

Jun 06, 2018

When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known that the list of router brands was probably not complete, little did we know that the malware has the ability to infect...

Read More

Securing with NSX – Beyond the DevSecOps Paradigm SECURING WITH NSX – BEYOND THE DEVSECOPS PARADIGM

blog article

Jun 04, 2018

The good news is technology is keeping pace and is a step ahead in helping the business achieve their goals. These business imperatives are forcing software iterations to be faster and be more efficient. This is leading to newer innovative models around people/processes/tools that we collectively ca...

Read More

New research shows 75% of ‘open’ Redis servers infected NEW RESEARCH SHOWS 75% OF ‘OPEN’ REDIS SERVERS INFECTED

blog article

Jun 01, 2018

Since our initial report on the RedisWannaMine attack that propagates through open Redis and Windows servers, we’ve been hearing about more and more attacks on Redis servers. Redis is a great tool, it can serve as in-memory distributed database, cache or a message broker and is widely popular....

Read More

Digging in with Azure IoT: Our interactive developer guide DIGGING IN WITH AZURE IOT: OUR INTERACTIVE DEVELOPER GUIDE

blog article

May 30, 2018

The Internet of Things (IoT) presents many compelling opportunities for developers With the right tools and guidance, it doesn’t need to be intimidating. The conceptual and technical differences between IoT and traditional web and application are relatively easy to grasp. Plus, Microsoft offer...

Read More

Gain application insights for Big Data solutions using Unravel data on Azure HDInsight GAIN APPLICATION INSIGHTS FOR BIG DATA SOLUTIONS USING UNRAVEL DATA ON AZURE HDINSIGHT

blog article

May 30, 2018

We are pleased to announce Unravel on Azure HDInsight Application Platform. Azure HDInsight is a fully-managed open-source big data analytics service for enterprises. You can use popular open-source frameworks (Hadoop, Spark, LLAP, Kafka, HBase, etc.) to cover broad range of scenarios such as ETL, D...

Read More

New Cyber Threat Intelligence Shows Growing Malware Volume, Encrypted Attacks NEW CYBER THREAT INTELLIGENCE SHOWS GROWING MALWARE VOLUME, ENCRYPTED ATTACKS

blog article

May 29, 2018

The latest cyberattack data from SonicWall shows increases across the board for global malware, ransomware, TLS/SSL encrypted attacks and intrusion attempts. Highlighting these new findings, the SonicWall Capture Advanced Threat Protection sandbox, with Real-Time Deep Memory Inspection (RTDMITM), di...

Read More

The ‘Dreadpool’ of Software Testing Challenges THE ‘DREADPOOL’ OF SOFTWARE TESTING CHALLENGES

blog article

May 21, 2018

Customers across the globe are getting digital – online transactions, social media updates, new technology updates, and much more. While the empowerment happens, there are a lot of grey areas that need to get filled up to ensure compatibility, accessibility, and security of digital application...

Read More

How to migrate to Amazon RDS for SQL Server using transactional replication HOW TO MIGRATE TO AMAZON RDS FOR SQL SERVER USING TRANSACTIONAL REPLICATION

blog article

May 17, 2018

You can migrate your databases into Amazon RDS for Microsoft SQL Server in multiple ways. Typically, you perform a simple backup and restore of the databases (along with scripting system objects such as logins). If you want a higher availability or lower downtime option, you might use the AWS Databa...

Read More

2018 SD-WAN Survey: What Enterprises Want From Their SD-WAN Vendor 2018 SD-WAN SURVEY: WHAT ENTERPRISES WANT FROM THEIR SD-WAN VENDOR

blog article

May 16, 2018

SD-WAN adoption is seeing rapid growth as companies look to streamline their WAN infrastructure and move toward more cloud-based applications. Much of the growth in SD-WAN adoption is from companies looking for ways to reduce the number of physical devices required to support applications as well as...

Read More

One Year Later: WannaCry, The Dawn Of A New Generation Of Cyber-Attacks ONE YEAR LATER: WANNACRY, THE DAWN OF A NEW GENERATION OF CYBER-ATTACKS

blog article

May 15, 2018

A year ago today, after multiple days of digital bombardment, the cyber-security world changed forever. Over one weekend, the notorious ransomware attack that would become widely known as WannaCry infected more than 200,000 machines around the world, causing billions of dollars in damages. Ransomwar...

Read More

Empowering Security in the CSP’s IoT Infrastructure and Services EMPOWERING SECURITY IN THE CSP’S IOT INFRASTRUCTURE AND SERVICES

blog article

May 15, 2018

CSPs are well-positioned to benefit from the continuing growth of Internet of Things (IoT) devices and related systems—but only as long as the infrastructure can support some IoT-specific challenges, including of course security.

Read More

Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember MULTI-CLOUD SECURITY CHECKLIST: 8 THINGS CISOS NEED TO REMEMBER

blog article

May 14, 2018

Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organizations now adopting multi-cloud environments, the breadth and depth of the attack surface has expanded rapidly. This has increased the complexity of both deploying and managing security — from...

Read More

Biggest Cloud Security Threats are Self-Inflicted BIGGEST CLOUD SECURITY THREATS ARE SELF-INFLICTED

blog article

May 09, 2018

As organizations of all sizes and across all industries continue migrating servers, applications and data to the cloud, cloud security remains a persistent and growing concern. Alert Logic sponsored the 2018 Cloud Security Spotlight, a cloud security report from Cybersecurity Insiders and Crowd Rese...

Read More

True Freedom of Cloud TRUE FREEDOM OF CLOUD

blog article

May 08, 2018

Enterprise IT is increasingly hybrid and multi-cloud with companies looking to tap into the business benefits different cloud platforms are offering them. Without platform-independent solutions for every new platform, the administrative burden can increase to the extent it can annihilate the busines...

Read More

Secure the Access and Use of SaaS & Web Apps in Your Digital Workspace SECURE THE ACCESS AND USE OF SAAS & WEB APPS IN YOUR DIGITAL WORKSPACE

blog article

May 08, 2018

As enterprises embrace hybrid cloud, SaaS, and web apps, they face challenges ensuring a consistent end user experience, and guaranteeing security and compliance across their SaaS, hybrid, and multi-cloud application delivery environments. Citrix’s differentiated approach to security with secu...

Read More

DevOps and The Cloud are the Much-Needed Pillars of Digital Transformation DEVOPS AND THE CLOUD ARE THE MUCH-NEEDED PILLARS OF DIGITAL TRANSFORMATION

blog article

Apr 30, 2018

Digital transformation has become the new age mantra in this fast-paced tech equipped world. The Cloud has become synonymous with such modern age developments. One would ideally relate the development of the Cloud with digital transformation. However, the current situation could not be further from ...

Read More

Multi-Segment Optimization: How Cato Cloud Modernizes WAN Optimization for Today’s SD-WAN MULTI-SEGMENT OPTIMIZATION: HOW CATO CLOUD MODERNIZES WAN OPTIMIZATION FOR TODAY’S SD-WAN

blog article

Apr 30, 2018

WAN optimization was designed to overcome the limitations of MPLS-based networks. Bandwidth was expensive, which made every bit of performance essential (and, yes, pun intended). WAN optimization compensated for the latency and limited bandwidth of MPLS. Appliances deployed in branch offices and the...

Read More

How can Software Quality Engineering improve API Testing? HOW CAN SOFTWARE QUALITY ENGINEERING IMPROVE API TESTING?

blog article

Apr 28, 2018

Businesses are getting highly creative to reach out effectively to their target groups and make the much needed impact. This has made application development and software product development much more complex. Application Program Interface (API) is a set of processes, protocols, and tools that help ...

Read More

Can a Collaborative DevTest Strategy boost your QA Plans? CAN A COLLABORATIVE DEVTEST STRATEGY BOOST YOUR QA PLANS?

blog article

Apr 26, 2018

Can we possibly state here that DevTest Solutions can help you to pace up your efforts towards adopting enterprise DevOps? DevTest Solutions are a bunch of applications that help you to shorten your dev/test cycles, enhance test coverage, ensure quality, reduce infrastructure costs, and effectively ...

Read More

What is AI-as-a-Service? AIaaS Explained WHAT IS AI-AS-A-SERVICE? AIAAS EXPLAINED

blog article

Apr 25, 2018

We’ve all heard of IaaS and SaaS before. These terms have become ubiquitous for infrastructure-as-a-service and software-as-a-service. Another variant is PaaS, short for platform-as-a-Service. Today, most companies are using at least one type of “as a service” offering as a way to ...

Read More

Moving to the Cloud: 5 Challenges, Countless Benefits MOVING TO THE CLOUD: 5 CHALLENGES, COUNTLESS BENEFITS

blog article

Apr 25, 2018

While IDC forecasts tremendous payback from cloud investments and spending is estimated to grow at more than six times (17%) the rate of general IT spending (4%) through 2020, adoption forecasts are a little less clear — McKinsey reports that it hovers around 20 percent.

Read More

A Look Behind the SD-WAN Scenes: How Do Cloud Security Integrations Work? A LOOK BEHIND THE SD-WAN SCENES: HOW DO CLOUD SECURITY INTEGRATIONS WORK?

blog article

Apr 24, 2018

The rapid rise in SD-WAN deployments this decade shouldn't be surprising. It's the logical result of growing reliance on SaaS and IaaS solutions. Gartner has predicted $3.7 trillion in IT spending for 2018, with enterprise software seeing the highest year-over-year growth rate (9.5 percent) ...

Read More

Using Security Groups to protect your IBM Cloud Virtual Servers USING SECURITY GROUPS TO PROTECT YOUR IBM CLOUD VIRTUAL SERVERS

blog article

Apr 20, 2018

This blog provides an overview and a simple example use case for Security Groups, which are an effective and versatile way to provide access protection for your virtual servers in the IBM Cloud.

Read More

Optimization and Agility are Top Hybrid Networking Goals for IT Executives OPTIMIZATION AND AGILITY ARE TOP HYBRID NETWORKING GOALS FOR IT EXECUTIVES

blog article

Apr 19, 2018

Most IT leaders aren’t particularly happy with the state of their WANs. What’s troubling them? Here are a few things: The lag in performance of critical cloud applications that companies need; The increases in WAN traffic and data that accelerate bandwidth consumption issues; The ongoing...

Read More

Accelerating value in the API economy with mainframe ACCELERATING VALUE IN THE API ECONOMY WITH MAINFRAME

blog article

Apr 19, 2018

The modern API enables frictionless access to new business ecosystems through simple, self-defining interfaces, without the need for extensive inter-company negotiation or customization of systems. More significantly, this “API economy” means organizations can tap into an unprecedented d...

Read More

The latest on IBM Z and LinuxONE: Learn more at IBM TechU THE LATEST ON IBM Z AND LINUXONE: LEARN MORE AT IBM TECHU

blog article

Apr 19, 2018

The market is abuzz with the latest IBM Z and LinuxONE announcements.  The new single frame 19-inch z14 and LinuxONE are here, with air flow, storage and system integrated into a standard rack. That means the ability to process over 850 million fully encrypted transactions in a single system th...

Read More

Is your cloud GDPR compliant? IS YOUR CLOUD GDPR COMPLIANT?

blog article

Apr 18, 2018

If cloud service providers follow DevOps and DevSecOps can help reduce the data breaches and improve code quality. Automation is also known to reduce the exploits and vulnerabilities. With a single platform to manage multiple cloud services can help reduce the complexity of managing security.

Read More

Pace of Healthcare Digital Transformation Accelerates, Increasing Demands on the WAN PACE OF HEALTHCARE DIGITAL TRANSFORMATION ACCELERATES, INCREASING DEMANDS ON THE WAN

blog article

Apr 13, 2018

The healthcare industry is undergoing a digital transformation in which the pace of technology innovation is accelerating, increasingly advancing the patient experience. Chances are you’ve witnessed the digital dynamic firsthand in your own interactions with the medical profession: You woke up...

Read More

New Virtual Firewalls: SonicWall NSv Provides Robust Security for Public, Private or Hybrid Cloud Environments NEW VIRTUAL FIREWALLS: SONICWALL NSV PROVIDES ROBUST SECURITY FOR PUBLIC, PRIVATE OR HYBRID CLOUD ENVIRONMENTS

blog article

Apr 12, 2018

To keep pace with innovations and modernize data center operations and services, businesses are embracing today’s application-centric, virtualized world. Virtualization and cloud can cut costs and increase efficiency and operational agility.

Read More

Can You Detect Fileless Malware? CAN YOU DETECT FILELESS MALWARE?

blog article

Apr 11, 2018

Fileless malware does not imply there aren't any files utilized within an attack. What is does mean is that the files simply are not used after the attack. They are usually removed or moved to another file altogether.  Though this type of malware is not new, there has been an increase seein...

Read More

MIMECAST LAUNCHES NEW API DEVELOPER PORTAL MIMECAST LAUNCHES NEW API DEVELOPER PORTAL

blog article

Apr 11, 2018

What processes millions of requests a day and has been around for years? That’s right, the Mimecast API (Application Programming Interface). Now we’re opening the goodness of our API to customers, partners and anyone else really, who can use it to take advantage of application data, inte...

Read More

SD-WAN Enables a New Cloud-first Branch Strategy SD-WAN ENABLES A NEW CLOUD-FIRST BRANCH STRATEGY

blog article

Apr 11, 2018

AWS prefers enterprises to use its Direct Connect service (a dedicated private connection to directly connect an enterprise’s data center to one of AWS’s data centers). This works in theory provided you have a solid connection to the internet. It also requires your service provider to ha...

Read More

5 key reasons to opt for hyperconverged infrastructure 5 KEY REASONS TO OPT FOR HYPERCONVERGED INFRASTRUCTURE

blog article

Apr 11, 2018

Let’s face it—traditional design for data center infrastructure doesn’t always meet today’s needs. Analytics, transaction processing, high-volume web serving and other data-intensive and mission-critical workloads place new and increased demands on the IT infrastructure. At t...

Read More

Keeping the pace of innovation for mainframe KEEPING THE PACE OF INNOVATION FOR MAINFRAME

blog article

Apr 10, 2018

Business demands for trusted digital experiences and greater agility are two of the strongest currents driving business transformation and modernization these days, especially in the mainframe arena. This week, IBM is announcing a single-frame IBM Z built on an industry-standard 19” form facto...

Read More

The Basics of IT Virtualization THE BASICS OF IT VIRTUALIZATION

blog article

Apr 09, 2018

IT virtualization is the creation of a virtual—rather than a physical—version of an IT device or resource. Many people think of virtualization only in terms of virtual machines (VMs), where one physical machine hosts many VMs running different operating system implementations. It’s...

Read More

Oracle Cloud Infrastructure and the GDPR ORACLE CLOUD INFRASTRUCTURE AND THE GDPR

blog article

Apr 09, 2018

The EU GDPR is a new, comprehensive data protection law that goes into effect on May 25, 2018. It applies broadly to organizations based in the EU and elsewhere that collect and process the personal information of individuals residing in the EU. Oracle Cloud Infrastructure is an Infrastructure as a ...

Read More

ScyllaDB 2.0.3 with TLS now available on the IBM Cloud SCYLLADB 2.0.3 WITH TLS NOW AVAILABLE ON THE IBM CLOUD

blog article

Apr 09, 2018

We introduced ScyllaDB at the end of 2016. It already stood out as a plug-compatible version of Cassandra at the time. The developers had taken Cassandra’s wide-column database design and built from the ground up a whole C++ framework and database on top of that. This meant the ideas behind Ca...

Read More

Scale massive SAP HANA database capacity in the cloud SCALE MASSIVE SAP HANA DATABASE CAPACITY IN THE CLOUD

blog article

Apr 05, 2018

Many organizations facing the challenges associated with supporting large, concurrent SAP HANA workloads may have wanted to move to managed cloud options because of speed, cloud consumption model and skills, but they have lacked those options. Moreover, speed is critical for the analysis and action ...

Read More

Rethink Networking for a Hybrid Cloud World RETHINK NETWORKING FOR A HYBRID CLOUD WORLD

blog article

Apr 04, 2018

The move to SaaS, hybrid, and multi- cloud environments has major implications for your network, security infrastructure and policies. You need new ways to provide secure, reliable access to apps and data no matter how or where people work or how they connect.

Read More

BUILDING A MODERN CYBERSECURITY SYSTEM TO MEET GDPR COMPLIANCE BUILDING A MODERN CYBERSECURITY SYSTEM TO MEET GDPR COMPLIANCE

blog article

Apr 03, 2018

For things that are dearest, most important and valuable to us, we come up with ways to protect them. Insurance policies, laws, to even safe deposit boxes and the hiring of security guards are all means to safeguard whatever deemed precious to us.

Read More

Improved Security & More: The latest for IBM Cloud Load Balancer IMPROVED SECURITY & MORE: THE LATEST FOR IBM CLOUD LOAD BALANCER

blog article

Apr 03, 2018

Our IBM Cloud Load Balancer is an infrastructure layer (IaaS) load balancer that distributes traffic “locally,” and can be configured via an API or a web UI. With high availability (HA) by default, it provides on-demand scalability, as well as usage-based billing for a fresh way to manag...

Read More

Store Terraform states in Cloud Object Storage STORE TERRAFORM STATES IN CLOUD OBJECT STORAGE

blog article

Apr 03, 2018

Terraform enables users to automatically provision and apply changes to infrastructure. We have several tutorials in our documentation highlighting how to use Terraform with IBM Cloud. As I was writing one of these tutorials, I was looking at the options to persist the Terraform state. Not finding e...

Read More

What’s all the buzz about new tech on IBM Cloud Private? WHAT’S ALL THE BUZZ ABOUT NEW TECH ON IBM CLOUD PRIVATE?

blog article

Apr 03, 2018

IBM Cloud Private is an application platform based on the containerized concept of the Docker open source project. Kubernetes and Docker Swarm are two of the most used orchestration tools to manage Docker containers, and they support IBM Cloud Private too. IBM Cloud Private is compatible with leadin...

Read More

Is It Time for Another IT Methodology Update? IS IT TIME FOR ANOTHER IT METHODOLOGY UPDATE?

blog article

Apr 03, 2018

Cloud computing offers so many opportunities, services, features and benefits that specialist consultants are usually required to help organizations navigate the choices and make sound business decisions. Too much complexity and the need for specialist expertise is not good. It slows down business d...

Read More

Infrastructure as Code: Accelerating Software Deployment INFRASTRUCTURE AS CODE: ACCELERATING SOFTWARE DEPLOYMENT

blog article

Apr 02, 2018

The next-generation infrastructure management technologies are transforming the way we manage IT infrastructure. The extensive implementation of virtualization and cloud infrastructure has shifted the bottleneck from allocating servers to configuring them. The arduous process where it used to take a...

Read More

Top 12 Tools, Frameworks, and Libraries for Software Development in 2018 TOP 12 TOOLS, FRAMEWORKS, AND LIBRARIES FOR SOFTWARE DEVELOPMENT IN 2018

blog article

Apr 01, 2018

As the programming ecosystem proliferates, a number of frameworks, libraries, and tools are being introduced to simplify the software development cycle. They are not just trimming the lines of code, but, are reducing the time from prototype to production. While there are plethora of options availabl...

Read More

Why you must consider DevOps for your Microservices Testing? WHY YOU MUST CONSIDER DEVOPS FOR YOUR MICROSERVICES TESTING?

blog article

Mar 29, 2018

Microservices or Microservices architecture (MSA) has been considered as an asset, especially, in the current phase of Digital Transformation. As applications get complex, Microservices architecture breaks down massive applications into smaller fragments that are much more manageable.

Read More

The Malicious Use of Artificial Intelligence in Cyber Security THE MALICIOUS USE OF ARTIFICIAL INTELLIGENCE IN CYBER SECURITY

blog article

Mar 28, 2018

Artificial intelligence (AI) is the use of computers to perform the analytical functions normally only available to humans – but at machine speed. ‘Machine speed’ is described by Corvil’s David Murray as, “millions of instructions and calculations across multiple softwa...

Read More

Leveraging Cloud-based Infrastructure for Testing of Mobile Applications LEVERAGING CLOUD-BASED INFRASTRUCTURE FOR TESTING OF MOBILE APPLICATIONS

blog article

Mar 26, 2018

The velocity of mobile applications deployment is increasing each day. Organizations are striving to get those new applications/ features to market ahead of their competition. For this, testing the application quickly is crucial than ever.

Read More

Monitor Data for XenApp and XenDesktop in Citrix Cloud Now Available through OData MONITOR DATA FOR XENAPP AND XENDESKTOP IN CITRIX CLOUD NOW AVAILABLE THROUGH ODATA

blog article

Mar 23, 2018

The XenApp and XenDesktop environment on Citrix Cloud gathers a large amount of historical data in the Monitoring Database. Until now, you could access some of this data via the Director Trends and Custom reports. Creating customized queries to directly access the db has been a much sought-after fea...

Read More

A Quick Guide to Analyzing Apache Logs on Alibaba Cloud Log Service A QUICK GUIDE TO ANALYZING APACHE LOGS ON ALIBABA CLOUD LOG SERVICE

blog article

Mar 23, 2018

With Alibaba Cloud Log Service, there are several methods available for you to collect upstream data. You can use the built-in LogSearch and LogAnalytics functions, or you can deploy the more familiar ElasticSearch, Logstash, and Kibana (ELK) stack. In this article, we will discuss how you can build...

Read More

Three Reasons to Add Alibaba Cloud to Your Multi-Cloud Strategy THREE REASONS TO ADD ALIBABA CLOUD TO YOUR MULTI-CLOUD STRATEGY

blog article

Mar 21, 2018

From the minute you chose one of the world’s most popular cloud computing companies as your strategic cloud services provider, your world became multi-cloud. In a multi-cloud world, there’s now every reason to consider and embrace the relative newcomer, Alibaba Cloud.

Read More

Bringing Sophisticated Security and AI to the IBM Cloud BRINGING SOPHISTICATED SECURITY AND AI TO THE IBM CLOUD

blog article

Mar 20, 2018

There are two major themes that bookend the enterprise conversation about cloud adoption. On one hand, businesses are compelled to move more workloads to the cloud to seize the new opportunities presented by AI, Machine Learning, IoT or even next-generation quantum computing or risk getting left beh...

Read More

How SD-WAN Simplifies Cloud Connectivity HOW SD-WAN SIMPLIFIES CLOUD CONNECTIVITY

blog article

Mar 19, 2018

My empathy for network engineers who manage cloud connectivity without SD-WAN (software-defined wide area networking) increased last week. A service provider informed me that settings had to be changed in all of my devices to ensure ongoing access to an email account. Sounds like a simple and quick ...

Read More

Top 6 fundamentals of Cloud-based Application Security Testing TOP 6 FUNDAMENTALS OF CLOUD-BASED APPLICATION SECURITY TESTING

blog article

Mar 19, 2018

Millennials with new technology interfaces are shifting the entertainment zones from television to mobile-based or device-based applications. Preferences are changing, which is impacting the overall application development cycle. There is no scope for any downtime or hiccups in customer experience.

Read More

How to successfully take on the DevOps Adoption Wave within QA? HOW TO SUCCESSFULLY TAKE ON THE DEVOPS ADOPTION WAVE WITHIN QA?

blog article

Mar 15, 2018

Let us begin with acknowledging the fact that riding the DevOps Adoption Wave requires you to have a team of ‘rockstars’ who are ready to take that leap of faith with you. They are ready to face all troubles – such as hitting the wall of scalability, but in the end, deliver data-dr...

Read More

A 3-step Guide to Simplify Your Journey to the Cloud A 3-STEP GUIDE TO SIMPLIFY YOUR JOURNEY TO THE CLOUD

blog article

Mar 15, 2018

Moving to the cloud can be one of the best things you can ever do for your business, your workforce, and your customers. And as CIO, you hold the reins to map the course for a comprehensive cloud strategy — and transition plan — that fits the unique needs of your organization. You’...

Read More

Who do you trust with your IT security? WHO DO YOU TRUST WITH YOUR IT SECURITY?

blog article

Mar 13, 2018

Security is a word that’s used to cover many aspects of IT, and it’s a top concern for organizations today, but there’s another important word related to the vendors of IT security products and solutions that safeguard your business: trust. Securing your business data and applicati...

Read More

The Best Network Design for SaaS and Web Apps THE BEST NETWORK DESIGN FOR SAAS AND WEB APPS

blog article

Mar 08, 2018

There are plenty of shiny new technologies available to enterprise IT teams today. The network underpins business infrastructure, and it’s key to making all these new applications and tools work smoothly. But most businesses don’t have the luxury of starting over with an entirely cloud-d...

Read More

Enter the world of quantum computing at Think 2018 ENTER THE WORLD OF QUANTUM COMPUTING AT THINK 2018

blog article

Mar 07, 2018

Classical computers have been and will continue to be a driving problem-solving force, but many of the world’s biggest mysteries and potentially greatest opportunities remain beyond their grasp. To continue the pace of progress, we need to augment the classical approach to computing with a new...

Read More

From SD-WAN to Secure Multi-Cloud FROM SD-WAN TO SECURE MULTI-CLOUD

blog article

Mar 07, 2018

If you haven’t already noticed, the workspace of tomorrow looks very different from the workspace of 20 years ago. Desktops have given way to laptops, smartphones, and tablets; data is increasingly stored in remote locations and in the cloud, and people can now do work at the times and places ...

Read More

Introducing Citrix XenApp Service: The Simplest Way to Move to a Hybrid Cloud Solution INTRODUCING CITRIX XENAPP SERVICE: THE SIMPLEST WAY TO MOVE TO A HYBRID CLOUD SOLUTION

blog article

Mar 06, 2018

At Citrix, we understand that cloud transformation doesn’t happen overnight. Moving to the cloud is a journey and customers must go at their own business pace. We also recognize that making the transition from traditional software-based XenApp and XenDesktop to the cloud may not happen overnig...

Read More

The Critical Need for Automation Testing in the Software Ecosystem THE CRITICAL NEED FOR AUTOMATION TESTING IN THE SOFTWARE ECOSYSTEM

blog article

Mar 05, 2018

Adoption of agile methodologies and best practices indicate that the organizations are constantly challenging themselves to get services and products to market faster. Automation testing is just one way to accelerate your project delivery and in doing so building up a regression pack of test scripts...

Read More

Top Software Glitches and Growing Significance of Software Testing TOP SOFTWARE GLITCHES AND GROWING SIGNIFICANCE OF SOFTWARE TESTING

blog article

Mar 01, 2018

Software glitch, system breakdown and data breach incidents have been threatening the brand value and survival of global enterprises. As a result, today organizations are building a much more proactive outlook towards security of enterprise applications and business-critical data. Gartner estimates ...

Read More

Why You Should Use HybridDB for MySQL for Online and Offline Data Separation WHY YOU SHOULD USE HYBRIDDB FOR MYSQL FOR ONLINE AND OFFLINE DATA SEPARATION

blog article

Feb 27, 2018

You may choose to opt for online and offline data separation to ensure the performance and capacity of the operational database. Additionally, this will help you to reduce the overall data storage cost and avoid the impact of offline data usage on online data utilization.

Read More

The Cloud is Not New; Figuring Out How to Use It May Be THE CLOUD IS NOT NEW; FIGURING OUT HOW TO USE IT MAY BE

blog article

Feb 27, 2018

For decades, businesses have been connecting to remote networks to serve their needs. Before the explosion in popularity of the World Wide Web, we relied on mainframe computers that we connected to via modems at a ridiculously slow data rate. Next, businesses moved to client-server models and then, ...

Read More

5 best practices for web application testing 5 BEST PRACTICES FOR WEB APPLICATION TESTING

blog article

Feb 26, 2018

Web applications are more than just simple information-based websites. The increase in size and complexities together with shorter development cycles in Agile and recurrent changes in requirements present numerous QA and testing challenges. With all the impending issues, web application testing hold...

Read More

Why Is Predictive Analytics Imperative for Software Testing? WHY IS PREDICTIVE ANALYTICS IMPERATIVE FOR SOFTWARE TESTING?

blog article

Feb 26, 2018

Predictive Analytics as a concept has been widely applied across industries and businesses to derive the required inferences and take informed business decisions. Traditional Software Quality Assurance (QA) is shifting gears and taking on new responsibilities. Hence, there is an increasing need for ...

Read More

Securing SD-WAN in Distributed Healthcare Environments SECURING SD-WAN IN DISTRIBUTED HEALTHCARE ENVIRONMENTS

blog article

Feb 16, 2018

Organizations are becoming increasingly reliant on digital capabilities across industries, and this is no different in the healthcare space. New technology has enabled patients to take a more hands-on role in their care, simplified patient/physician communication, and improved the ability of patient...

Read More

Can DevOps Really Add Value in a World of Digital Transformation? CAN DEVOPS REALLY ADD VALUE IN A WORLD OF DIGITAL TRANSFORMATION?

blog article

Feb 15, 2018

Software development and Testing methodologies have changed and evolved. There is increased collaboration between teams to develop applications that are very much consumer-centric. Collaboration is needed to ensure that the applications are developed faster and quality is monitored constantly. DevOp...

Read More

Evolve Your WAN to Be Truly Software Defined: The Hybrid Approach to SD-WAN EVOLVE YOUR WAN TO BE TRULY SOFTWARE DEFINED: THE HYBRID APPROACH TO SD-WAN

blog article

Feb 12, 2018

IT leaders recognize the value of software-defined wide-area networks (SD-WAN), and when it comes to implementation, 80 percent of executives are opting to augment rather than replace their network technologies, according to a new IDG Market Pulse survey. This is called a hybrid SD-WAN approach, and...

Read More

How to Ensure Seamless Salesforce Implementation for Enterprises? HOW TO ENSURE SEAMLESS SALESFORCE IMPLEMENTATION FOR ENTERPRISES?

blog article

Feb 12, 2018

The initial and important point to consider is to create an implementation blueprint. It can help in the longer run to ensure effective and seamless implementation. After the blueprint is sketched, teams would be in a better position to identify the organization’s goals, pain points, and succe...

Read More

SD-WAN OVERCOMES THE CHALLENGES OF MANAGING EDGE-TO-CLOUD CONNECTIVITY SD-WAN OVERCOMES THE CHALLENGES OF MANAGING EDGE-TO-CLOUD CONNECTIVITY

blog article

Feb 02, 2018

A top concern when adopting the cloud, particularly for mission-critical applications, is WAN reliability and performance. Ultimately, the Internet provides only “best-effort” data transmission. Data packets will be dropped or arrive out of order, and it might take 15 to 20 milliseconds ...

Read More

8 Things to Monitor During a Software Deployment 8 THINGS TO MONITOR DURING A SOFTWARE DEPLOYMENT

blog article

Feb 02, 2018

As software developers, our ultimate goal is to get our hard work deployed to production. Thanks to agile development, DevOps, and continuous deployment tools, that process is quicker than ever! It is important to remember that a software deployment is more of a process and not a single event. As pa...

Read More

The New Age of ITSM – What to Expect and How to Prepare THE NEW AGE OF ITSM – WHAT TO EXPECT AND HOW TO PREPARE

blog article

Feb 01, 2018

The contribution of ITSM towards business value is significant, and is slowly witnessing a resurgence with the adoption of exciting new technologies. This is good news, considering that ITSM was slowly finding itself being nudged to the sidelines. Adoption of Agile, DevOps, Cloud, Automation, Machin...

Read More

The Pressing IT Challenges in an Enterprise THE PRESSING IT CHALLENGES IN AN ENTERPRISE

blog article

Feb 01, 2018

Enterprises which run legacy platforms face major challenges to make their IT environment agile and competitive to support their business needs. To bring in agility, flexibility and scalability to meet the growing demands of an enterprise is always a catch up game for the IT leadership.

Read More

The most common causes of cloud data breaches THE MOST COMMON CAUSES OF CLOUD DATA BREACHES

blog article

Feb 01, 2018

When organizations decide to move their data to the cloud, many assume that the responsibility for securing that data moves with it, to the cloud provider. On the surface, this assumption isn’t entirely unreasonable. After all, by transferring sensitive information into a third-party environme...

Read More

Accelerate and streamline AI and HPC workloads with new NVIDIA GPUs on IBM Cloud ACCELERATE AND STREAMLINE AI AND HPC WORKLOADS WITH NEW NVIDIA GPUS ON IBM CLOUD

blog article

Jan 31, 2018

Each day, data scientists around the world are using artificial intelligence (AI) and high performance computing (HPC) to solve complex challenges and create new business value from data. Whether they are training a chatbot to provide better customer service, creating reservoir simulations for new o...

Read More

Cisco adds new capabilities to its IBN infrastructure CISCO ADDS NEW CAPABILITIES TO ITS IBN INFRASTRUCTURE

blog article

Jan 30, 2018

Cisco has advanced its intent-based networking gear so now it can both verify that networks are actually running according to the intentions set by admins and also so it can help to find and resolve network problems faster on both wired and wireless networks.

Read More

Information management is going mainstream – at last! INFORMATION MANAGEMENT IS GOING MAINSTREAM – AT LAST!

blog article

Jan 29, 2018

Some assumptions have been held by IT pros for so long that they have almost become articles of faith. One of these is the idea that content management, particularly for files, semi-structured and unstructured content, is so difficult that only the foolhardy attempt to tackle it for anything other t...

Read More

We just raised a Series B. Now it’s time to tackle the QA problem. WE JUST RAISED A SERIES B. NOW IT’S TIME TO TACKLE THE QA PROBLEM.

blog article

Jan 22, 2018

The way we build software has changed; the way we do QA hasn’t. At Rainforest we’re changing that by helping companies rethink QA and bring it into the era of continuous delivery. Our focus is solely QA, and we have spent the last six years helping hundreds of companies hit their busines...

Read More

When to use WebClient vs. HttpClient vs. HttpWebRequest WHEN TO USE WEBCLIENT VS. HTTPCLIENT VS. HTTPWEBREQUEST

blog article

Jan 22, 2018

You have three different choices for consuming REST APIs when working in the .Net Framework: WebClient, HttpClient, and HttpWebRequest. In this post we will look at these three ways we can access REST APIs from within the managed environment, i.e., without resorting to third-party libraries. In the ...

Read More

New Feature: Payments Testing on Web & Mobile Applications NEW FEATURE: PAYMENTS TESTING ON WEB & MOBILE APPLICATIONS

blog article

Jan 18, 2018

We’re excited to release our new feature that will help eCommerce teams and anyone who needs to test credit card payments on their web or mobile app: virtual credit cards. Testing credit cards can be a challenge for many organizations. Many websites use 3rd party software integrations to proce...

Read More

7 Key Requirements for Multi-Cloud Discovery 7 KEY REQUIREMENTS FOR MULTI-CLOUD DISCOVERY

blog article

Jan 17, 2018

The cloud adds incredible value to the business: scalability, flexibility, cost-effectiveness, the list goes on. But while we talk about cloud as a singular entity, these days it’s anything but. Most businesses run a wide variety of services and applications on multiple types of cloud – ...

Read More

4 Test Data Management Techniques That Empower Software Testing 4 TEST DATA MANAGEMENT TECHNIQUES THAT EMPOWER SOFTWARE TESTING

blog article

Jan 16, 2018

Online gaming applications get launched with variations and modifications to attract gaming enthusiasts. Every gaming application or any software launch is backed by rigorous software testing and quality assurance. However, when versions are checked it is highly critical for teams to look at the ear...

Read More

Does Diversity Matter in Software Testing? DOES DIVERSITY MATTER IN SOFTWARE TESTING?

blog article

Jan 16, 2018

Beyond the massive discussions regarding “bro culture” at Uber or “biological differences” at Google, diversity in the Software Engineering community is a huge topic. It’s time to go beyond the hype and turn gender equality into something real. Accenture’s goal of...

Read More

React Vs Angular JS REACT VS ANGULAR JS

blog article

Jan 16, 2018

For any business, choosing the right framework for a new Javascript implementation is crucial. This will have a direct impact on scalability of the app or website, further code maintainability, and project’s durability and ability to fit in deadlines. While choosing a framework, React & An...

Read More

Coverity: Setting the standard for better software COVERITY: SETTING THE STANDARD FOR BETTER SOFTWARE

blog article

Jan 15, 2018

There is a general awareness that software complexity has been growing immensely over time. Starting a few decades ago with special-purpose tasks, such as calculating equations to send a man to the moon, we are now at a stage where our world and much of our lives depend intrinsically on software. No...

Read More

Turning Cryptography into a Service - Part 2 TURNING CRYPTOGRAPHY INTO A SERVICE - PART 2

blog article

Jan 15, 2018

With the increase in e-commerce and electronic communications on the one hand, and the growing challenges of cybercrime and data protection regulation on the other hand, cryptography is becoming an increasingly important business enabler.

Read More

The art of finding (and fixing) cloud faults THE ART OF FINDING (AND FIXING) CLOUD FAULTS

blog article

Jan 15, 2018

There is no doubt that cloud computing offers huge benefits to organisations, but CIOs must accept and manage the potential barriers to realising its value. Service faults and latency issues can prove problematic, for example, when the application in question is business-critical. They can also cost...

Read More

The Express Route to a hybrid Azure platform THE EXPRESS ROUTE TO A HYBRID AZURE PLATFORM

blog article

Jan 15, 2018

Cloud computing is promising much – but is failing in many areas as users get to grips with some of its more complex areas.  An example here is when organisations start to look at how best to use multiple cloud platforms across a private and public environment – what is known as a &...

Read More

SD-WAN: The Backbone of Hybrid Cloud for the Enterprise SD-WAN: THE BACKBONE OF HYBRID CLOUD FOR THE ENTERPRISE

blog article

Jan 11, 2018

Software-Defined WAN (SD-WAN) is, quite simply, the backbone of hybrid cloud for enterprise applications. It’s the backbone of a secure digital perimeter. Simply said, it’s the foundation of modern networking requirements.

Read More

Continuous Exploratory Testing: Expanding Critical Testing Across the Delivery Cycle CONTINUOUS EXPLORATORY TESTING: EXPANDING CRITICAL TESTING ACROSS THE DELIVERY CYCLE

blog article

Jan 11, 2018

Exploratory Testing has gained momentum in recent years. Testing thought-leaders such as Michael Bolton, James Bach, and Ingo Philipp are the names most frequently cited with Exploratory Testing, but the truth is that the real driver of the movement is need. Agile methodologies have championed a tho...

Read More

Choosing the right public cloud provider: A checklist CHOOSING THE RIGHT PUBLIC CLOUD PROVIDER: A CHECKLIST

blog article

Jan 11, 2018

It is common knowledge that moving to the cloud can cut business costs, streamline workflows, eliminate the need for hardware and reduce requirements for in-house IT personnel. The cloud can also make it easier for people to work remotely, collaborate, backup their data and ensure business continuit...

Read More

Meltdown & Spectre – What you Need to Know about Protecting your Keys MELTDOWN & SPECTRE – WHAT YOU NEED TO KNOW ABOUT PROTECTING YOUR KEYS

blog article

Jan 10, 2018

A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” , have recently been discovered in a broad range of CPUs from Intel, ARM and AMD (some up to 20 years old) that are commonly used in servers, PCs and even mobile devic...

Read More

Chef: The DevOps tools arms race is over, time for application-centrism CHEF: THE DEVOPS TOOLS ARMS RACE IS OVER, TIME FOR APPLICATION-CENTRISM

blog article

Jan 10, 2018

Technical community manager for the EMEA at Chef Software Mandi Walls thinks that DevOps itself is approaching the point of mainstream monetisation. So much is this the case that she suggests we are at the point of seeing the monetisation of [DevOps] buzzwords and certifications, which happens when ...

Read More

Accelerating the Multi-Cloud Migration with SD-WAN ACCELERATING THE MULTI-CLOUD MIGRATION WITH SD-WAN

blog article

Jan 09, 2018

A multi-cloud solution provides enterprises with an integrated environment to migrate workloads between multiple public clouds or between private and public clouds, depending on the compute services required and application hosting requirements.

Read More

5 Hot AI & Machine Learning Trends for 2018 5 HOT AI & MACHINE LEARNING TRENDS FOR 2018

blog article

Jan 09, 2018

The mantra for technology evolution has been to replace or minimize human assistance with machines. Traditionally human support systems are rapidly being replaced by machines & by automation. The dependence on human decision-making is shrinking fast. First, let’s look at what these fancy t...

Read More

Three SD-WAN Architectures You Should Know THREE SD-WAN ARCHITECTURES YOU SHOULD KNOW

blog article

Jan 08, 2018

As previously discussed, software-defined wide area network (SD-WAN) is a software approach in managing wide area networks (WAN). Using such software will have numerous benefits for businesses, one of which is reduced costs. The apparent benefits surely enticed businesses to deploy SD-WAN. In fact, ...

Read More

How to Strategically Implement a Mobile Application Security Testing Tool? HOW TO STRATEGICALLY IMPLEMENT A MOBILE APPLICATION SECURITY TESTING TOOL?

blog article

Jan 04, 2018

When the last WannaCry Ransomware virus attacked global enterprises and institutional systems, it almost panicked every mobile application user. What if the virus hijacks the mobile software via some application? Designing a mobile application with the required security protocols and ensuring that i...

Read More

What Is A Software Defined Data Center? WHAT IS A SOFTWARE DEFINED DATA CENTER?

blog article

Dec 28, 2017

An increasing number of enterprises are realizing the benefits of utilizing cloud platforms to support employee productivity, collaboration and business innovation. The benefits of switching to the cloud are far-reaching and can include reduced operational costs, higher accessibility and lower maint...

Read More

3 Essential Steps for Migrating to AWS or Azure Public Cloud 3 ESSENTIAL STEPS FOR MIGRATING TO AWS OR AZURE PUBLIC CLOUD

blog article

Dec 14, 2017

Organizations are relying on the public cloud for a successful digital transformation. Many organizations have established a cloud strategy and business plan for moving workloads and applications to public cloud infrastructure, but are still working to determine the migration plan to support that st...

Read More

ROBOT: For When the Metal Ones Decide to Come for You ROBOT: FOR WHEN THE METAL ONES DECIDE TO COME FOR YOU

blog article

Dec 13, 2017

Dust off your Old Glory Insurance policy, ROBOT attack is now a real thing that can happen to you.  Researchers Hanno Böck, Juraj Somorovsky, and Craig Young have a new attack to tell you about, and they have named it Return of Bleichenbacher’s Oracle Threat (ROBOT). Their main findi...

Read More

Software Testing in the World of Big Data, AI, Smart Machines, IoT, & Robotics SOFTWARE TESTING IN THE WORLD OF BIG DATA, AI, SMART MACHINES, IOT, & ROBOTICS

blog article

Dec 07, 2017

Emerging Technologies are no more a foresight, they are a reality even in terms of our routine activities. Businesses are busy leveraging these technologies to enable digital transformation for achieving the desired consumer experience. Every sector, in teall possible ways, is empowering themselves ...

Read More

OWASP – The Superhero of AppSec OWASP – THE SUPERHERO OF APPSEC

blog article

Dec 07, 2017

The security industry needs unbiased sources of information who share best practices with an active membership body who advocates for open standards. In the AppSec world, one of the best is the Open Web Application Security Project (or OWASP).

Read More

Agile Testing Is Really Helpful For Enterprises To Stay Innovative & Competent AGILE TESTING IS REALLY HELPFUL FOR ENTERPRISES TO STAY INNOVATIVE & COMPETENT

blog article

Dec 04, 2017

Google has recently published its annual list of top applications of the year, which are not necessarily the most downloaded ones, but are also some of the most popular ones. Why do some applications click so well and some just go unnoticed. There could be many factors responsible for it, such as, u...

Read More

7-Point Checklist for Selecting a Managed Security Services Provider 7-POINT CHECKLIST FOR SELECTING A MANAGED SECURITY SERVICES PROVIDER

blog article

Nov 28, 2017

A mixed bag of services: Your business risks are unique, as is your budget. In order to deliver the most in-depth security coverage, you should look for providers that offer a wide range of services, provide multiple service levels, give you the ability to mix and match and have prepackaged offering...

Read More

Top 8 Things To Consider When Transforming To Agile Testing TOP 8 THINGS TO CONSIDER WHEN TRANSFORMING TO AGILE TESTING

blog article

Nov 23, 2017

In the traditional waterfall methodology of software development, the process starts with detailed requirement gathering, and moves from design phase to final development, wherein test planning and execution comes in the last phase. The testing team verifies the requirement and design documents whil...

Read More

A lot has changed in 20 years, especially when it comes to technology A LOT HAS CHANGED IN 20 YEARS, ESPECIALLY WHEN IT COMES TO TECHNOLOGY

blog article

Nov 21, 2017

Just as technology has greatly changed in the last 20 years, so has the world of IT. John and Steve can attest to that as they continually position customers’ IT needs for the future. Like Steve, John and the 550 OneNeck employees, the company is constantly looking ahead, surveying the IT land...

Read More

Why Enterprises Seem Obsessed With Cost When It Comes to Cloud Computing WHY ENTERPRISES SEEM OBSESSED WITH COST WHEN IT COMES TO CLOUD COMPUTING

blog article

Nov 20, 2017

Embarking on a digital transformation usually begins with the important goals of improving the customer experience and creating a cohesive, integrated environment for business processes. Rounding out the motivation to move to cloud computing is the expected cost savings that come with subscription-b...

Read More

TrustSec: The Cybersecurity Enforcer TRUSTSEC: THE CYBERSECURITY ENFORCER

blog article

Nov 16, 2017

So many newsworthy hacks in recent years have had a staggering impact on literally millions of consumers and businesses. While these hacks have perhaps made us numb to their effects, the reality is these breaches represent the new normal in today’s digitized world. And given that attackers are...

Read More

7 Ways IoT is Reshaping the Internet 7 WAYS IOT IS RESHAPING THE INTERNET

blog article

Nov 15, 2017

Two decades ago, the Internet was the shiny new object in the room. The Worldwide Web was just emerging as a new paradigm for communication and commerce, and the world brimmed with possibilities. Today, not only has the Internet fulfilled those nascent dreams, it has become the undisputed foundation...

Read More

Cisco Email Security is Top Solution CISCO EMAIL SECURITY IS TOP SOLUTION

blog article

Nov 15, 2017

Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware,...

Read More

WHAT ARE THE OPTIONS WHEN IT COMES TO OUTSOURCING CUSTOM SOFTWARE DEVELOPMENT? WHAT ARE THE OPTIONS WHEN IT COMES TO OUTSOURCING CUSTOM SOFTWARE DEVELOPMENT?

blog article

Nov 14, 2017

The digital transformation processes require service providers to offer new options for how the Application Development and Delivery Leaders and service providers structure their engagement. In addition to the traditional staff augmentation and fixed-price models, there are various new partnership m...

Read More

What executives can learn from future technology WHAT EXECUTIVES CAN LEARN FROM FUTURE TECHNOLOGY

blog article

Nov 14, 2017

Future technology is rapidly changing the way we live and work, and IT professionals who keep abreast of these innovations will be rewarded. Here’s a look at 15 technologies that are going to have major impacts on how people work and live by 2020. Artificial intelligence (AI) is a hot topic in...

Read More

Outsourcing IT Can Be A Winning Master Plan OUTSOURCING IT CAN BE A WINNING MASTER PLAN

blog article

Nov 13, 2017

These days, many businesses lack the internal resources to run effective internal IT operations. Outsourcing IT gives organizations access to deep expertise and saves on employment costs, among many other benefits.

Read More

Exploring Anti-Malware Testing Methodologies EXPLORING ANTI-MALWARE TESTING METHODOLOGIES

blog article

Nov 09, 2017

The simple objective in testing an anti-malware product is to verify that it stops execution of malware on the endpoint. Testing in this case is not about features and functions, it’s about preventing the malware from executing.

Read More

Keep Nutanix Calm and carry on cloud computing KEEP NUTANIX CALM AND CARRY ON CLOUD COMPUTING

blog article

Nov 08, 2017

In addition to its core product updates released in line with the European leg of its.NEXT conference and exhibition series, enterprise cloud company Nutanix has added to its set of cloud tools, services and operating system components with some additional items. These would be CPU-intensive applica...

Read More

Why the Cloud Doesn’t Always Appeal to Enterprises Seeking Unified Communications WHY THE CLOUD DOESN’T ALWAYS APPEAL TO ENTERPRISES SEEKING UNIFIED COMMUNICATIONS

blog article

Nov 06, 2017

While you may hear a lot about the benefits of cloud adoption for unified communications (UC), the reality is that cloud adoption for UC is just as complicated and messy as it is when it comes to data storage or networks. Enterprises see the appeal of the cloud, but the transition is often limited b...

Read More

Cloud native series: Avi Networks defines pros & cons CLOUD NATIVE SERIES: AVI NETWORKS DEFINES PROS & CONS

blog article

Nov 03, 2017

Cloud native applications are capturing the hearts and minds of strategic IT leaders by changing the narrative around how applications are developed and consumed. The growth in container and microservices adoption frees developers from the shackles of the underlying infrastructure so they can consum...

Read More

DBS Bank shows off API platform in fintech gold rush DBS BANK SHOWS OFF API PLATFORM IN FINTECH GOLD RUSH

blog article

Nov 03, 2017

DBS Bank, Southeast Asia’s largest bank by market cap, has claimed the honour of having the world’s biggest banking API (application programming interface) platform with over 155 APIs that developers can plug into to create a variety of services. These APIs run the gamut, from mortgage l...

Read More

Top Black Friday Fiascos Your Software Should Be Tested For TOP BLACK FRIDAY FIASCOS YOUR SOFTWARE SHOULD BE TESTED FOR

blog article

Nov 02, 2017

Software Glitches and high-traffic choke ups are some of the major scares that websites can face during peak shopping seasons. In the past, retailers have also taken required action to tackle these issues. Walmart, in 2016, built software called OneOps that helped handle peak traffic on Walmart.com ...

Read More

AT&T open sources Acumos AI via Linux Foundation AT&T OPEN SOURCES ACUMOS AI VIA LINUX FOUNDATION

blog article

Oct 31, 2017

American telecommunications mainstay AT&T is working with Indian multinational IT and networking technology firm Tech Mahindra to build an open source Artificial Intelligence (AI) platform named Acumos. Hosted by The Linux Foundation, the platform is hoped to provide a marketplace for accessing,...

Read More

Security startup silences chatty networks to thwart attacks SECURITY STARTUP SILENCES CHATTY NETWORKS TO THWART ATTACKS

blog article

Oct 31, 2017

The internet was never designed to be secure; a fact that has given information technology organizations fits for more than 20 years. The TCP/IP protocol behind the internet assumes a high level of trust for devices that are on an internal network and willingly shares information about other devices...

Read More

GARTNER TOOLKIT: IDENTIFY THE RIGHT COMPANY FROM 80+ AGILE/DEVOPS SERVICE PROVIDERS GARTNER TOOLKIT: IDENTIFY THE RIGHT COMPANY FROM 80+ AGILE/DEVOPS SERVICE PROVIDERS

blog article

Oct 30, 2017

The growth of digital business and the need for innovative projects is driving the increase of agile software development methodologies as well as DevOps adoption. Gartner Toolkit is listing the 80 most recommendable vendors in the world to help end-users selecting vendors in agile and DevOps areas....

Read More

Partner Spotlight: CDK Global PARTNER SPOTLIGHT: CDK GLOBAL

blog article

Oct 30, 2017

CDK Global is a leading global provider of integrated IT solutions to the automotive retail industry. In fact, they’re the only IT provider that understands the unique needs of auto dealers and dealerships. With 20 years of experience in networking, they use that knowledge to build the best ne...

Read More

Rising Online Sales will Contribute to Green Information Technology (IT) Services Market Growth By 2021 RISING ONLINE SALES WILL CONTRIBUTE TO GREEN INFORMATION TECHNOLOGY (IT) SERVICES MARKET GROWTH BY 2021

blog article

Oct 30, 2017

Green IT involves the practices related to information technology (IT) optimization and environmentally sustainable computing. It involves uses, manufacturing, design and disposing of servers, computers and associated subsystems such as communication system, networking systems, storage devices, prin...

Read More

The 4 Steps Your Organization Can Take to Boost Cybersecurity THE 4 STEPS YOUR ORGANIZATION CAN TAKE TO BOOST CYBERSECURITY

blog article

Oct 27, 2017

Cybersecurity investments are set to soar in the next few years, and there are plenty of reasons why. As smart cities evolve and more devices get connected to the Internet of Things, the threat vectors across the country multiply. According to IDC, worldwide revenues for security-related hardware, s...

Read More

The Future of IT Demands Simplicity THE FUTURE OF IT DEMANDS SIMPLICITY

blog article

Oct 26, 2017

The speed of change in technology requires manufacturers to deal with increasing complexity as well as the challenge of security. As technology evolves, the complexity it creates is challenging even the savviest IT professionals to keep pace — and the challenge is only getting steeper. When yo...

Read More

The Need of Regression Testing in the Agile World THE NEED OF REGRESSION TESTING IN THE AGILE WORLD

blog article

Oct 25, 2017

Regression testing is a software testing process that validates whether the software developed and tested earlier performs the way it should after being interfaced with another software. It is a program development process, which is performed mostly by code testing specialists and involves multiple ...

Read More

Business Continuity Requires a Plan for Data Management and Disaster Recovery BUSINESS CONTINUITY REQUIRES A PLAN FOR DATA MANAGEMENT AND DISASTER RECOVERY

blog article

Oct 23, 2017

A comprehensive data management strategy is becoming more critical as enterprises are recognizing the central role that information plays in business continuity. Data is one of the most important assets a company has, and the protection and management of data can help an enterprise succeed or doom i...

Read More

THE EVOLUTION OF INSIDER THREATS THE EVOLUTION OF INSIDER THREATS

blog article

Oct 23, 2017

October is National Cyber Security Awareness Month, a global campaign run annually to raise awareness about the importance of cybersecurity. We’ve asked some of our leading security experts here at Absolute to chime in on some of the most pressing issues in cybersecurity today. In the fourth a...

Read More

The Next Frontier in Rental Software THE NEXT FRONTIER IN RENTAL SOFTWARE

blog article

Oct 22, 2017

In this month’s cover story we tried to give you a feel for how rental industry software is covering virtually every aspect of a rental operation. Software makes the yard staff more efficient, as well as the service technicians, the sales staff, accounting and other office support, truck drive...

Read More

In the great AI debate, don IN THE GREAT AI DEBATE, DON'T FORGET ABOUT THE PEOPLE WHOSE LIVES IT WILL MOST AFFECT - THAT'S US

blog article

Oct 20, 2017

The government, business, and the tech sector are getting very excited about artificial intelligence (AI). For a government, AI presents an opportunity for a technology where the UK hopes to lead the world – a perfect example for politicians of the innovative, digital, global nation they want ...

Read More

Node4: security comes in NODE4: SECURITY COMES IN 'LAYERS', LIKE ONIONS

blog article

Oct 19, 2017

Cloud, datacentre, and communications software company Node4 has sauced up its security portfolio with a series of upgrades and new security services under the banner of SECaaS (Security as a Service).

Read More

10 TIPS TO LAUNCH A BESPOKE SOFTWARE PROJECT 10 TIPS TO LAUNCH A BESPOKE SOFTWARE PROJECT

blog article

Oct 19, 2017

If you’ve ever said, “I just wish there was a piece of software out there that could do this,” you may in actuality need a piece of bespoke software. Such software that is built specifically for you or your organization by a consulting firm will not only fulfil your wish, but it wi...

Read More

Contrast Security raises $30M for ‘self-protecting’ application software CONTRAST SECURITY RAISES $30M FOR ‘SELF-PROTECTING’ APPLICATION SOFTWARE

blog article

Oct 19, 2017

Application security startup Contrast Security Inc. has raised $30 million in a Series C round led by Battery Ventures that included previous investors General Catalyst and Acero Capital. Founded in 2014, Contrast Security provides “self-protecting” security software that protects enterp...

Read More

Applying some intelligence to Artificial Intelligence APPLYING SOME INTELLIGENCE TO ARTIFICIAL INTELLIGENCE

blog article

Oct 17, 2017

Navigating the turbulent waters of Artificial Intelligence (AI) and Machine Learning (ML) can seem like a daunting task to the uninitiated. In fact even the question of how AI relates to ML is answered differently depending on who you ask, as evidenced by the numerous articles about on these topics....

Read More

OT Meets IT at the IoT Solutions World Congress OT MEETS IT AT THE IOT SOLUTIONS WORLD CONGRESS

blog article

Oct 11, 2017

The worlds of IT and manufacturing have been converging for several years now, and nowhere was this trend more evident than at the IoT Solutions World Congress, held last week in Barcelona, Spain, and attended by ARC analysts. Co-sponsored by the Industrial Internet Consortium (IIC), the event took ...

Read More

IoT Investments Are Set to Jump in 2018 IOT INVESTMENTS ARE SET TO JUMP IN 2018

blog article

Oct 09, 2017

As for the size of companies taking the lead on committing to IoT, a greater percentage of firms with 10,000 or more employees plan to increase spending than is the case among small and medium-sized businesses, the survey finds. Among the biggest IoT spenders are companies that self-identify as &ldq...

Read More

Ford taps Silicon Valley startup to build transportation software FORD TAPS SILICON VALLEY STARTUP TO BUILD TRANSPORTATION SOFTWARE

blog article

Oct 09, 2017

Ford Motor Co. has begun to develop new transportation service applications using a software platform developed by Autonomic Inc., a small Silicon Valley startup. One of the first such businesses is a "microtransit" service called Non-Emergency Medical Transport, launched this summer by Fo...

Read More

Dental Software Market by Technology, Growth, Application & Geography – Analysis & Forecast to 2022 DENTAL SOFTWARE MARKET BY TECHNOLOGY, GROWTH, APPLICATION & GEOGRAPHY – ANALYSIS & FORECAST TO 2022

blog article

Oct 09, 2017

Market Study Report Add New Global Dental Software Market Size, Status and Forecast 2022 to its research database. The report spread across 103 pages with table and figures in it. The report focuses on top key players like LED Dental, Maxident, Navadha Enterprises and many more.

Read More

LEARN TO MODERNIZE LEGACY APPLICATIONS IN THE CLOUD WITH GARTNER RESEARCH LEARN TO MODERNIZE LEGACY APPLICATIONS IN THE CLOUD WITH GARTNER RESEARCH

blog article

Oct 05, 2017

Cloud is a core component of modern business agility. Cloud delivers agility, flexibility, and scale for the development and operations of both new, cloud-native applications, and the traditional applications that enterprises depend on to run their businesses. The problem with the latter group is th...

Read More

Poor software release management creates security nightmares POOR SOFTWARE RELEASE MANAGEMENT CREATES SECURITY NIGHTMARES

blog article

Oct 02, 2017

There are myriad factors that can influence when new software and software updates are released. Often, release schedules are determined in response to software-hungry consumers, competitor strategies, or the increasing pace of hardware development. Whilst some of these pressures are very real, and ...

Read More

As CCleaner illustrates, software security has a ‘systemic problem’ AS CCLEANER ILLUSTRATES, SOFTWARE SECURITY HAS A ‘SYSTEMIC PROBLEM’

blog article

Sep 29, 2017

It’s a truism of the Digital Age that anything can be hacked. It’s also a truism that things aren’t always what they seem. Those notions hold true for CCleaner, which, with 115 million monthly active users, is the most popular Windows system-cleaning and -optimizing software in the...

Read More

The growing role of software in PV systems THE GROWING ROLE OF SOFTWARE IN PV SYSTEMS

blog article

Sep 27, 2017

PV installations are no longer solitary and separate sources of energy. They are becoming an influential and integrated part of a distributed grid that can interact in real time. This transition is similar to how personal computers have become part of a larger network. In the early days of computing...

Read More

How to Implement the File Upload Process in a REST API HOW TO IMPLEMENT THE FILE UPLOAD PROCESS IN A REST API

blog article

Sep 25, 2017

File-sharing is one of the most elementary ways to perform system integration. In the context of web applications, we call “upload” the process in which a user sends data/files from a local computer to a remote computer. This guide will demonstrate one strategy, among many, to implement ...

Read More

88% OF RETAIL ORGANIZATIONS VULNERABLE TO DATA THREATS 88% OF RETAIL ORGANIZATIONS VULNERABLE TO DATA THREATS

blog article

Sep 22, 2017

Target. Kmart. Home Depot. Neiman Marcus. Some of the biggest names in retail have been hit hard by data breaches in past years. Despite increased IT security spending, data breaches across all industries are accelerating. 88% of retail organizations in the US consider themselves vulnerable to data ...

Read More

GSA’s EIS has Feds Thinking About Cloud Unified Communications GSA’S EIS HAS FEDS THINKING ABOUT CLOUD UNIFIED COMMUNICATIONS

blog article

Sep 22, 2017

Federal agencies are increasingly taking a serious look at their existing telecommunications infrastructure now that the General Services Administration (GSA) has awarded its Enterprise Information Services (EIS) telecommunications solutions contract. This contract offers Federal offices significant...

Read More

Part 2: DataWeave 2.0 Syntax Changes in Mule 4 Beta PART 2: DATAWEAVE 2.0 SYNTAX CHANGES IN MULE 4 BETA

blog article

Sep 21, 2017

In my last post, I discussed DataWeave 2.0 header and body (iterative functions) changes in Mule 4 Beta. In this post, I will dive deeper into the topic by discussing operator changes (within the body) as well as other changes.

Read More

How to secure the 7 stages of the sdlc HOW TO SECURE THE 7 STAGES OF THE SDLC

blog article

Sep 18, 2017

Security best practices can be the first thing to slip when your developer team is up against tight deadlines. By integrating security measures into each stage of the software development lifecycle (SDLC) your organisation will save time and money in the long run: it is 30x more expensive to fix a v...

Read More

The Demand for Managed Services Is on the Rise THE DEMAND FOR MANAGED SERVICES IS ON THE RISE

blog article

Sep 18, 2017

Companies are getting more comfortable with managed services. As Everything as a Service (XaaS) becomes more widely adopted by enterprises, there is an increased demand for providers that can offer bundled services that not only address the cloud components, but also tie up loose ends. That’s ...

Read More

Dimensional Modeling and Kimball Data Marts in the Age of Big Data and Hadoop DIMENSIONAL MODELING AND KIMBALL DATA MARTS IN THE AGE OF BIG DATA AND HADOOP

blog article

Sep 17, 2017

Contrary to a common misunderstanding, it is not the only purpose of data models to serve as an ER diagram for designing a physical database. Data models represent the complexity of business processes in an enterprise. They document important business rules and concepts and help to standardise key e...

Read More

Why You Need a VPN Today WHY YOU NEED A VPN TODAY

blog article

Sep 17, 2017

Security is one of the primary concerns of internet users today. Hacking and data theft are among the worst fears of everyday people who work and play online. In addition to concerns over these threats, internet users are often plagued by too many targeted advertisements, restrictions, and bad conne...

Read More

Software QA Testing: Outsourcing vs. Crowdsourcing SOFTWARE QA TESTING: OUTSOURCING VS. CROWDSOURCING

blog article

Sep 15, 2017

Writing code is hard. For some, this may come as a surprise, software quality assurance and testing are not easier. Of course, reporting bugs may not require too much technical skills. But the same cannot be said about evaluating a product from customer's perspective, understanding software prod...

Read More

Best Practices to Secure IT Servers and Infrastructure BEST PRACTICES TO SECURE IT SERVERS AND INFRASTRUCTURE

blog article

Sep 15, 2017

Network infrastructure is known to be the key business asset for organizations that are cloud computing for their critical line-of-business applications. In fact, the backbone of a smooth and sustaining business process is your network technology. The whole security of your system depends on how you...

Read More

The real convergence of IT and OT: How much longer do we have to wait? THE REAL CONVERGENCE OF IT AND OT: HOW MUCH LONGER DO WE HAVE TO WAIT?

blog article

Sep 15, 2017

In the past, information technology (IT) and operational technology (OT) were seen as two distinct domains of a business. The former focused on all the technologies that were necessary to manage the processing of information, whereas the latter supported the devices, sensors and software that were n...

Read More

How to modernize legacy applications with Microsoft Azure? HOW TO MODERNIZE LEGACY APPLICATIONS WITH MICROSOFT AZURE?

blog article

Sep 13, 2017

Today’s organizations face the challenge of building applications for the future while supporting the current environment. They are expected to run the business and build new applications simultaneously for better customer engagement, drive new revenue sources, and develop new products and ser...

Read More

The Incredible Growth of Python THE INCREDIBLE GROWTH OF PYTHON

blog article

Sep 12, 2017

We recently explored how wealthy countries (those defined as high-income by the World Bank) tend to visit a different set of technologies than the rest of the world. Among the largest differences we saw was in the programming language Python. When we focus on high-income countries, the growth of Pyt...

Read More

No Time Outs: 5 Cyber Security Tips to Protect Your Business in the Second Half NO TIME OUTS: 5 CYBER SECURITY TIPS TO PROTECT YOUR BUSINESS IN THE SECOND HALF

blog article

Sep 12, 2017

So you’ve survived the first half of the year with no serious data breaches or other cyber security mishaps. That’s good news. The bad news, however, is that you’ll have to do it all over again to get through the whole year that way, and the second half of the year is a lot rougher...

Read More

Making Multi-Cloud Work for Your Enterprise… Step by Step MAKING MULTI-CLOUD WORK FOR YOUR ENTERPRISE… STEP BY STEP

blog article

Sep 12, 2017

The days of the single cloud are gone. This change is driven by the breadth of technology options, potential cost savings, and the need for business agility.  However, enterprises making the move to multi-cloud face critical choices.  The failure to consider common risks can diminish or ev...

Read More

Equifax data breach — here EQUIFAX DATA BREACH — HERE'S WHAT WE CAN LEARN FROM IT

blog article

Sep 11, 2017

Although data breaches and cyber attacks have flooded the news for several years, the revelation that 143 million Equifax customer records were breached still raises eyebrows and a lot of concern. While it is too early to fully understand the Equifax breach, many people question how, despite thousan...

Read More

The next big thing in hard disks may be glass THE NEXT BIG THING IN HARD DISKS MAY BE GLASS

blog article

Sep 11, 2017

Hard disk makers are in a big of a struggle for survival. As SSDs grow in capacity and shrink in price, hard disk makers are losing business on the low end. Only the cheapest of laptops don’t have a SSD standard any more. And with affordable 1TB SSDs on the market, it’s a good choice for...

Read More

HPE Software Testing Tools Changed Hands: Why It Doesn’t Matter HPE SOFTWARE TESTING TOOLS CHANGED HANDS: WHY IT DOESN’T MATTER

blog article

Sep 08, 2017

By now everyone knows that the Micro Focus-HPE split is a done deal. We’re not going to bore you with yet another vendor-driven blog using this news to stir fear, uncertainty, and doubt in the hearts of the many software testers who’ve become accustomed to using HPE. Why are we holding b...

Read More

Software Development: Do It In-House or Outsource? SOFTWARE DEVELOPMENT: DO IT IN-HOUSE OR OUTSOURCE?

blog article

Sep 08, 2017

We often hear that we live in the world of possibilities. However, how often do you hear what these possibilities are? Besides, when you deal with outsourcing software development companies that have a domain knowledge in your target niche, they can give you more than just developers with the tech s...

Read More

How to “AMP” Your Endpoint Protection HOW TO “AMP” YOUR ENDPOINT PROTECTION

blog article

Sep 07, 2017

Malware is a broad term that encompasses any form of software designed to damage, steal or corrupt data. Ransomware, trojans, worms and rootkits are common malware examples, but the list is far more exhaustive, making fighting malware a normal part of operations for SMBs and corporations alike.

Read More

What Comes Next: Future-Proof Your IT Infrastructure WHAT COMES NEXT: FUTURE-PROOF YOUR IT INFRASTRUCTURE

blog article

Sep 06, 2017

By now, most IT leaders are familiar with the term “digital transformation.” It refers to a company’s ability to capitalize on a range of digital technologies. Across every industry – from financial services to healthcare – businesses can work smarter, serve customers i...

Read More

Veeam for the Microsoft Cloud at Microsoft Ignite VEEAM FOR THE MICROSOFT CLOUD AT MICROSOFT IGNITE

blog article

Sep 06, 2017

Greetings fellow IT professionals! After more than 20 years of TechEd in the late spring and early summer, Microsoft will give us Microsoft Ignite (formerly TechEd) in the fall from Sept. 25 – 29, 2017 in beautiful Orlando, Florida. I am so excited to get together with 10,000 of my closest IT ...

Read More

Common Reasons Companies Avoid a Move to the Cloud COMMON REASONS COMPANIES AVOID A MOVE TO THE CLOUD

blog article

Sep 05, 2017

Many companies recognize that moving to the cloud may be the only option for remaining competitive in a market that caters to the end user. Customers are demanding a personalized, user-friendly experience, and businesses utilizing cloud technology have the ability to meet that demand with frequent u...

Read More

How to decide which software vulnerabilities to fix first HOW TO DECIDE WHICH SOFTWARE VULNERABILITIES TO FIX FIRST

blog article

Sep 04, 2017

Software applications are susceptible to a diverse array of different vulnerabilities. With each vulnerability posing a unique set of problems, it can be difficult for development teams to decide on the right course of action. In order to balance the benefits of fixing a vulnerability with the costs...

Read More

Ransomware payments: Funding the business of cybercrime RANSOMWARE PAYMENTS: FUNDING THE BUSINESS OF CYBERCRIME

blog article

Sep 04, 2017

If you were considering becoming a cybercriminal or were perhaps a traditional villain looking to upgrade your skills for the 21st century, I’m sure your business model of choice would be running a ransomware operation. You would, thanks to the simplicity of platforms like Ransomware as a Serv...

Read More

TWO QUESTIONS TO ASK BEFORE CLOUD MIGRATION TWO QUESTIONS TO ASK BEFORE CLOUD MIGRATION

blog article

Aug 31, 2017

It wasn’t long ago that many believed that public cloud’s benefits were largely limited to greenfield application development. New applications would be developed, tested, and deployed in the cloud, but, traditional applications—due to their size and complexity—remained in ph...

Read More

5 Cloud Backup Myths Debunked 5 CLOUD BACKUP MYTHS DEBUNKED

blog article

Aug 31, 2017

Second only to your people, your data is your organization's most important asset. Backup is crucial, especially since SMBs and large enterprises alike are increasingly requiring constant availability of business-critical data. In the absence of disaster preparedness, organizations face risks as...

Read More

Veeam Support troubleshooting series: Linux FLR appliance deploy fail VEEAM SUPPORT TROUBLESHOOTING SERIES: LINUX FLR APPLIANCE DEPLOY FAIL

blog article

Aug 30, 2017

Veeam Support Team is excited to announce a brand-new way of sharing useful and important information with you. We have prepared a series of advanced-level tech articles based on real support cases. We hope you will like these articles as much as we like to help our customers. Linux FLR appliance de...

Read More

How safe are your passwords? Real life rules for businesses to live by HOW SAFE ARE YOUR PASSWORDS? REAL LIFE RULES FOR BUSINESSES TO LIVE BY

blog article

Aug 30, 2017

Changes to the National Institute of Standards and Technology (NIST) password guidelines were welcomed as long overdue. Security professionals criticized the old guidelines, which recommended a mix of numbers, letters and special characters that are changed periodically. Passwords as a sole authenti...

Read More

THE HBO HACK – COULD TIGHTER CYBER SECURITY HAVE PREVENTED IT? THE HBO HACK – COULD TIGHTER CYBER SECURITY HAVE PREVENTED IT?

blog article

Aug 29, 2017

According to Bruce Schneier, a cryptographer and computer security expert, “The mantra of any good security engineer is: ‘Security is a not a product, but a process.’ It’s more than designing strong cryptography into a system; it’s designing the entire system such that ...

Read More

Okta drives a new trajectory for directories OKTA DRIVES A NEW TRAJECTORY FOR DIRECTORIES

blog article

Aug 29, 2017

Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings forward advancements designed to power a new independent directory standard and integration ecosystem. Befo...

Read More

HDS aims to unify compute for hybrid clouds HDS AIMS TO UNIFY COMPUTE FOR HYBRID CLOUDS

blog article

Aug 29, 2017

Hitachi Data Systems (HDS), is a wholly owned subsidiary of guess who? Yes, Hitachi, Ltd. But the fine folks at HDS do like to remind us of this fact. Now very much a software company (even if you do have a Hitachi television), HDS is now focused on its Hitachi Unified Compute Platform (UCP) RS seri...

Read More

What to do if your public cloud is hacked WHAT TO DO IF YOUR PUBLIC CLOUD IS HACKED

blog article

Aug 29, 2017

It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur. The best way to recover from an attack, aka a hack, is ...

Read More

Deciphering VMware DECIPHERING VMWARE'S APPDEFENSE

blog article

Aug 29, 2017

Of all VMware's new subscription services, AppDefense deserves a bit deeper discussion. AppDefense is the flagship product of an entire new business unit at VMware. With security being one of the only real growth markets left in IT, it's a sensible investment by VMware. AppDefense appears to...

Read More

The Seven Steps to Building a Successful Software Development Company THE SEVEN STEPS TO BUILDING A SUCCESSFUL SOFTWARE DEVELOPMENT COMPANY

blog article

Aug 28, 2017

It has never been more challenging than today to build a successful software development company. Even just a few years ago, companies would offer breakfast at the office or put their people on training to hone and develop their skills. Today, however, we are in a different world. In order to attrac...

Read More

Skills for the world of the future: AI, Big Data, Robotics etc. SKILLS FOR THE WORLD OF THE FUTURE: AI, BIG DATA, ROBOTICS ETC.

blog article

Aug 28, 2017

Over the past few weeks we have had much hype of the effect of Artificial Intelligence, Big Data and Robotics on the world of work and the subjects we should be teaching our chidren. Almost exactly 35 years ago, Donald Michie, the “father” of research into machine intelligence, was given...

Read More

EXTENDING VMWARE’S CAPABILITIES WITH SKYTAP CLOUD EXTENDING VMWARE’S CAPABILITIES WITH SKYTAP CLOUD

blog article

Aug 24, 2017

Skytap is attending VMworld 2017 next week, and we’ll have our largest presence yet at one of IT’s most notable conferences. Looking at the VMworld 2017 agenda, it’s clear attendees understand IT modernization is vital to business success in the digital economy. Skytap Cloud was de...

Read More

Emerging Asia most vulnerable to malware EMERGING ASIA MOST VULNERABLE TO MALWARE

blog article

Aug 24, 2017

Bangladesh and Pakistan have the highest malware encounter rates around the world, followed by two other countries in the ASEAN region – Cambodia and Indonesia, according to Microsoft’s latest Security Intelligence Report. That those countries were most susceptible to malware is hardly s...

Read More

What Makes the Industrial IoT Different from the rest of the IoT? WHAT MAKES THE INDUSTRIAL IOT DIFFERENT FROM THE REST OF THE IOT?

blog article

Aug 22, 2017

It’s amazing how things have changed since then. Nowadays, everyone seems to have heard of the IoT. Turn on the news, and you’ll hear about the IoT and see images of products like health trackers, robot butlers, intelligent cars and smart home appliances.  So, today when I tell peop...

Read More

Artificial Intelligence, Communication, & the Evolution of Software Testing: Interview with Isabel Evans ARTIFICIAL INTELLIGENCE, COMMUNICATION, & THE EVOLUTION OF SOFTWARE TESTING: INTERVIEW WITH ISABEL EVANS

blog article

Aug 22, 2017

At the StarEAST software testing conference in 2017, Isabel walked onto stage during the popular “Lightning Strikes the Keynotes” session, and delivered a presentation on ancient Scottish sheep farming practices. The talk, which could only last 5 minutes, was informative, witty, profound...

Read More

Clover: payments are the next developer frontier CLOVER: PAYMENTS ARE THE NEXT DEVELOPER FRONTIER

blog article

Aug 22, 2017

Software application development engineers (in all forms and guises) will always be interested in monetising the commercial aspects of their creations when and if they want to take them to market, obviously. Moreover, commercial development projects with a market-facing proposition will also need to...

Read More

Is DevOps Helping Feds Put the Pedal to the Metal on Cloud? IS DEVOPS HELPING FEDS PUT THE PEDAL TO THE METAL ON CLOUD?

blog article

Aug 21, 2017

We are starting to hear very different language when federal IT leaders talk about modernization. Our panel at the Federal Focus event explored development and operations, or DevOps, as an approach to modernize and speed new development efforts; shrinking the window between idea and delivery. This i...

Read More

2017 Sees a Change in IT Budgets 2017 SEES A CHANGE IN IT BUDGETS

blog article

Aug 21, 2017

The big trend involving the transition from an on-premise solution to one in the cloud continues to grow. Computer Economics’ highlighted in a benchmark study in their annual report on staffing, and spending for 2017/2018 that this growing trend will continue to rise. Furthermore, the study fo...

Read More

The VCSP opportunity with Veeam Agent for Windows THE VCSP OPPORTUNITY WITH VEEAM AGENT FOR WINDOWS

blog article

Aug 21, 2017

For a good part of the last 18 months of my previous role as Lead Architect at a leading Veeam Cloud & Service Provider (VCSP) partner I was involved in a project to try and come up with an easy way for our clients to perform in-guest backups of their IaaS virtual machines. At that time it invol...

Read More

14 Warning Signs that Your Computer is Malware-Infected 14 WARNING SIGNS THAT YOUR COMPUTER IS MALWARE-INFECTED

blog article

Aug 21, 2017

The increasing number of Internet users worldwide creates an equal (or larger) number of opportunities for cyber criminals to take advantage of our systems. As we become more dependent on the online environment, we can clearly see a massive growth in malware and cyber criminal activities all across ...

Read More

Oracle opens Java EE, any takers? ORACLE OPENS JAVA EE, ANY TAKERS?

blog article

Aug 20, 2017

Oracle bought Sun, for various reasons. Popular commentary on the subject puts the purchase down to Oracle’s desire to have a more credible level of what might be called ‘operational software’ (not to suggest that the Oracle database stack doesn’t ‘operate’ in any...

Read More

FIVE ENTERPRISES RUNNING AIX IN THE CLOUD FIVE ENTERPRISES RUNNING AIX IN THE CLOUD

blog article

Aug 18, 2017

With support steadily growing for multi-cloud, the strategy of using the right cloud for the right workload, enterprises are increasingly turning their focus to specialized cloud providers that can support their unique needs. Simon Sherwood at The Register pointed out this week that these providers ...

Read More

7 Evolving Trends in Software Development 7 EVOLVING TRENDS IN SOFTWARE DEVELOPMENT

blog article

Aug 17, 2017

What’s the difference between a fad and a trend? A fad is ephemeral and burns out shortly after it ignites. For example, every holiday season we witness how some new and novel toy takes the market by storm–remember the Tamagotchi? But soon enough, few people care about these toys anymore...

Read More

Security Alert: Locky Adds the .lukitus Extension, Spreads through Waves of Malspam SECURITY ALERT: LOCKY ADDS THE .LUKITUS EXTENSION, SPREADS THROUGH WAVES OF MALSPAM

blog article

Aug 17, 2017

After infecting computers with recurring malicious email campaigns sent to random recipients in organizations from all over the world, Locky ransomware strikes again. Locky’s persistence is already famous, as cyber criminals use it frequently to exploit vulnerabilities in outdated systems. The...

Read More

Exploratory Testing Cuts the Risk of Software Failures EXPLORATORY TESTING CUTS THE RISK OF SOFTWARE FAILURES

blog article

Aug 16, 2017

Agile development compresses software testing cycles, jeopardizing risk coverage and opening the door for software failures. Here’s what you can do: The adoption of Agile and iterative development processes is forcing testing teams to conduct and complete testing more rapidly than in the past....

Read More

Throwing Away “Bad Software Testing” with Agile and RST: Interview with James Bach, Part 2 THROWING AWAY “BAD SOFTWARE TESTING” WITH AGILE AND RST: INTERVIEW WITH JAMES BACH, PART 2

blog article

Aug 14, 2017

If you have spent any time immersed in the world of software testing, you have probably come across James Bach. James is a noted thought leader, author, blogger, speaker, proponent and developer of exploratory testing, creator of the Rapid Software Testing ™ methodology, and all-around disrupt...

Read More

Ditching Textbooks and Teaching Cybersecurity via News Headlines: Modern Times Call for Modern Measures DITCHING TEXTBOOKS AND TEACHING CYBERSECURITY VIA NEWS HEADLINES: MODERN TIMES CALL FOR MODERN MEASURES

blog article

Aug 14, 2017

In a constantly changing field like cybersecurity, nothing stays the same for long. And as Jim Lewis, a senior VP at the Center for Strategic and International Studies, has learned first hand, this makes teaching about cybersecurity a challenge. And why not? When the headlines are dominated by stori...

Read More

WHY AIX IS MOVING TO THE CLOUD WHY AIX IS MOVING TO THE CLOUD

blog article

Aug 11, 2017

One reason that traditional applications have largely remained on-premises, while greenfield applications continue to be migrated to, and born in the cloud, is the technology they’ve run on for decades is tried and true. These applications continue to provide core business functionality that c...

Read More

Seven Kingdoms of IT: ScrumOps as the attempt to revolutionize software delivery SEVEN KINGDOMS OF IT: SCRUMOPS AS THE ATTEMPT TO REVOLUTIONIZE SOFTWARE DELIVERY

blog article

Aug 11, 2017

Loads of great things in software development have been done in the IT world over the course of decades. Along with all the achieved benefits, several self-sufficient kingdoms emerged on the IT arena. Here you can find separate territories with their proponents: Scrum masters, Lean loyalists, Automa...

Read More

User-Based Security Inside Power BI Dashboard USER-BASED SECURITY INSIDE POWER BI DASHBOARD

blog article

Aug 08, 2017

With the wide adaption of Power BI, reports from the data extracted various data sources and was shown at an enterprise level, this gave an important need of reporting model to be at an enterprise level. One of such enterprise level reporting features being providing data security among the users, i...

Read More

Protecting Your Organization From Phishing Schemes: Tips From the FBI PROTECTING YOUR ORGANIZATION FROM PHISHING SCHEMES: TIPS FROM THE FBI

blog article

Aug 08, 2017

It’s not just the bad actors that we at Core Security want to protect you from – we also want to protect you from yourself. It’s all hands on deck when it comes to securing your systems and the systems you interact with on a daily basis. Everyone personally has, on average, four de...

Read More

Emotet and Trickbot Banking Trojans Acquire Internet Worm Capabilities EMOTET AND TRICKBOT BANKING TROJANS ACQUIRE INTERNET WORM CAPABILITIES

blog article

Aug 08, 2017

Emotet and TrickBOT are two, relatively recent banking Trojans that have shot up in popularity in the past couple of years. Recently, researchers discovered that two have developed a new kind of malicious feature, directly inspired by the success of the WannaCry and Petya ransomware. The pair now co...

Read More

A Closer Look at the Ransomware Attacks: Why They Still Work A CLOSER LOOK AT THE RANSOMWARE ATTACKS: WHY THEY STILL WORK

blog article

Aug 08, 2017

Ransomware phenomenon continues to dominate the threat landscape and affect important sectors (hospitals, banks, universities, Government, law firms, mobile users) and various organizations equally worldwide. There are ransomware attacks happening on a daily basis and still have a high rate of succe...

Read More

SD-WAN is the Key to Securing Modern Healthcare Networks (and you don’t even need a prescription) SD-WAN IS THE KEY TO SECURING MODERN HEALTHCARE NETWORKS (AND YOU DON’T EVEN NEED A PRESCRIPTION)

blog article

Aug 07, 2017

Healthcare institutions today are typically made up of many different clinics, offices and hospitals – all conveniently located wherever their patients are. And in today’s world of mobile devices and cloud-based data, sensitive information is traveling between them all. Physicians are us...

Read More

Session Hijacking Takes Control of Your Accounts. Here’s How SESSION HIJACKING TAKES CONTROL OF YOUR ACCOUNTS. HERE’S HOW

blog article

Aug 04, 2017

Computer session in normal day-to-day speak is a temporary interaction you have with a website. For example, the time between you first log into your bank account, and then log off after your operation, is a session. During a session hijacking, a malicious hacker places himself in between your compu...

Read More

Plexxi offers technical validation for hyperconverged networking PLEXXI OFFERS TECHNICAL VALIDATION FOR HYPERCONVERGED NETWORKING

blog article

Aug 02, 2017

This is a guest post for the Computer Weekly Developer Network written by Mat Mathews in his capacity as co-founder and VP of product management at Plexxi — the firm is a specialist in converged and hyperconverged network infrastructure for public and private cloud deployments. Pressure is mou...

Read More

IoT is Big – Industrial is the Biggest IOT IS BIG – INDUSTRIAL IS THE BIGGEST

blog article

Aug 01, 2017

Without a doubt, there has been a lot of excitement about the impact of the Internet of Things (IoT) in various industries. According to Machina Research (now a part of Gartner), there will be 27 billion devices connected to the Internet by 2025. Frankly, this is one of the more conservative numbers...

Read More

WHY SSL/TLS ATTACKS ARE ON THE RISE WHY SSL/TLS ATTACKS ARE ON THE RISE

blog article

Aug 01, 2017

As enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security (SSL/TLS) game to hide their malicious activities. In the first half of 2017, an average of 60 perc...

Read More

Why is Compatibility Testing at the Core of Digital Transformation? WHY IS COMPATIBILITY TESTING AT THE CORE OF DIGITAL TRANSFORMATION?

blog article

Jul 31, 2017

At the recent Microsoft Inspire conference, CEO Satya Nadella has estimated digital transformation as a $4.5 trillion market. He further stated, “With increasing digitization, where every part of our society and economy has been fundamentally transformed because of digital technology, the oppo...

Read More

Wireless Mesh Networks: Everything you need to know WIRELESS MESH NETWORKS: EVERYTHING YOU NEED TO KNOW

blog article

Jul 31, 2017

You would be forgiven for thinking that wireless mesh networking is just another marketing bullet point for new Wi-Fi routers, a phrase coined to drive up prices without delivering benefits. But we can avoid being cynical for once: mesh technology does deliver a significant benefit over the regular ...

Read More

IOTA: A blockchain for the Internet of Things IOTA: A BLOCKCHAIN FOR THE INTERNET OF THINGS

blog article

Jul 28, 2017

Blockchains haven't had good press recently. Simple word-association connects 'the blockchain' to Bitcoin, Bitcoin to ransomware, ransomware to crime. So the blockchain is, to the uninformed, obviously a bad thing. On the other hand, technology evangelists around the world are touting th...

Read More

Operationalizing Cybersecurity OPERATIONALIZING CYBERSECURITY

blog article

Jul 27, 2017

Operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows.  Just like organizations can’t achieve safety; they cannot achieve cybersecurity.  Therefore, having a well-defined organizational cybersecurity strategy is essential in keeping ...

Read More

Basics needed to swerve security apocalypse BASICS NEEDED TO SWERVE SECURITY APOCALYPSE

blog article

Jul 27, 2017

When we last spoke towards the end of 2015, Sophos’ Global Head of Security Research James Lyne predicted a bumpy 2016 and beyond: chiefly that ransomware would continue to grow in popularity, and that the Internet of Things producers would be in for a ‘big wake-up call’ if they di...

Read More

Bluetooth Mesh networks: Is a standards body right for IoT innovation? BLUETOOTH MESH NETWORKS: IS A STANDARDS BODY RIGHT FOR IOT INNOVATION?

blog article

Jul 20, 2017

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the di...

Read More

FBI Warns About Security Risks From IoT-Connected Toys in Your Home FBI WARNS ABOUT SECURITY RISKS FROM IOT-CONNECTED TOYS IN YOUR HOME

blog article

Jul 19, 2017

The idea that a toy presents a real security threat first came to national attention back in 1998, when a small robot disguised as a fanciful animal was banned by the National Security Agency. This critter was known as a Furby. The Furby appeared to learn English by listening to words spoken around ...

Read More

Setting up the Development Environment for Angular 2 SETTING UP THE DEVELOPMENT ENVIRONMENT FOR ANGULAR 2

blog article

Jul 18, 2017

In this article, we will gain understanding on how to setup a local development environment for Angular 2. This blog covers minimum required configuration for creating applications in Angular using Typescript and ES5. Here, I will be providing a step-by-step approach to setup an environment. Angular...

Read More

The Hardware Hacker: Adventures in Making and Breaking Hardware THE HARDWARE HACKER: ADVENTURES IN MAKING AND BREAKING HARDWARE

blog article

Jul 17, 2017

Trying to place The Hardware Hacker: Adventures in Making and Breaking Hardware (No Starch Press 978-1593277581) into a specific category is a challenge. This superb book covers a multitude of topics, from hardware engineering, software design, Chinese manufacturing, to hardware hacking, product dev...

Read More

Learn How to Integrate in Minutes with TIBCO Cloud Integration LEARN HOW TO INTEGRATE IN MINUTES WITH TIBCO CLOUD INTEGRATION

blog article

Jul 17, 2017

In order to stay competitive, your company needs to become a fully connected or integrated organization. In other words, a digital business.  An organization where technologies offer innovative ways to connect, collaborate, conduct business, and build bridges between people and devices. The rea...

Read More

Critical Vulnerabilities in Microsoft Windows Could Leave Computers Exposed to a New Attack Wave CRITICAL VULNERABILITIES IN MICROSOFT WINDOWS COULD LEAVE COMPUTERS EXPOSED TO A NEW ATTACK WAVE

blog article

Jul 14, 2017

Earlier this week, during Patch Tuesday Update, Microsoft released patches for some critical vulnerabilities that were affecting all versions of Windows operating system, including critical flaws for Windows 10 for enterprises. Researchers at Preempt have analyzed and identified two vulnerabilities ...

Read More

Exploratory Testing for JIRA: Now on Atlassian Marketplace EXPLORATORY TESTING FOR JIRA: NOW ON ATLASSIAN MARKETPLACE

blog article

Jul 12, 2017

If your team uses Atlassian JIRA and wants to jumpstart, scale, or streamline exploratory testing, we’d like to introduce you to the first native exploratory testing add-on for JIRA. Exploratory Testing for JIRA helps you optimize exploratory testing with simplified planning, documentation, an...

Read More

Why Every OEM Developing an Industrial IoT Solution Should Use Wireless Modules WHY EVERY OEM DEVELOPING AN INDUSTRIAL IOT SOLUTION SHOULD USE WIRELESS MODULES

blog article

Jul 10, 2017

The demand for IoT solutions continues to grow at a rapid pace – by 2020, it’s estimated that the number of connected machines will be more than 34 billion – more than four times the human population. For industrial OEMs, delivering a smart connected IoT solution can deliver substa...

Read More

Effective Cyber Security is All About the Benjamins EFFECTIVE CYBER SECURITY IS ALL ABOUT THE BENJAMINS

blog article

Jul 10, 2017

Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ e...

Read More

Software testing must be a boardroom dialog; – But are enterprises doing it? SOFTWARE TESTING MUST BE A BOARDROOM DIALOG; – BUT ARE ENTERPRISES DOING IT?

blog article

Jul 06, 2017

The Twitterati went buzzing on July 3, 2017, when Nasdaq exchange set the stock prices of a list of companies at $123.47; slashing the stock prices for some tech companies and hiking it for others. According to a statement from Nasdaq, the glitch occurred due to ‘improper use of test data&rsqu...

Read More

Software Fail Watch, Q2 2017: Hacking and Cyber Attacks are the New Normal SOFTWARE FAIL WATCH, Q2 2017: HACKING AND CYBER ATTACKS ARE THE NEW NORMAL

blog article

Jul 06, 2017

In the past years, we have observed both an increase in the number of hacks reported, as well as the public attention those hacks gain. In October 2016, an unprecedentedly wide-scale DDoS attack crippled much of North America’s internet for the better part of a day, taking down global power pl...

Read More

How An Insider Threat Operates [True Stories] HOW AN INSIDER THREAT OPERATES [TRUE STORIES]

blog article

Jul 06, 2017

Just over 7 years ago, our former colleague Cristina ran a music blog that had ten thousand daily visitors. On an April night in 2010, someone broke into her Gmail account. He deleted all of the emails saved on the account, and then leveraged it to access three more email addresses. The hacker also ...

Read More

SAP Test Automation: Key Considerations for Selecting an Automated Testing Tool SAP TEST AUTOMATION: KEY CONSIDERATIONS FOR SELECTING AN AUTOMATED TESTING TOOL

blog article

Jul 03, 2017

Even a small SAP update can bring critical business processes to a standstill. Without a fast and trusted way to detect change impacts, upgrading SAP or optimizing processes can expose the business to significant risks. Ultimately, SAP test automation tools are critical for detecting and mitigating ...

Read More

Where Machine Learning Meets Artificial Intelligence WHERE MACHINE LEARNING MEETS ARTIFICIAL INTELLIGENCE

blog article

Jul 03, 2017

The field of artificial intelligence (AI) is one of the most dynamic and disruptive technological revolutions today. This ever-evolving phenomenon gave birth to machine learning, also popularly referred to as ‘Machine Intelligence’ or ‘Deep Learning’. Machine learning enables...

Read More

“Why are big data projects making losses?” “WHY ARE BIG DATA PROJECTS MAKING LOSSES?”

blog article

Jun 30, 2017

This was the title of my article that appeared in IDG Expert Network last year. It was about the lacking profitability of analytics initiatives. After the article got published, I had a lot of discussions with colleagues and clients about the same topic – in the same tenor; big data has to bec...

Read More

Solution guide: Building connected vehicle apps with Cloud IoT Core SOLUTION GUIDE: BUILDING CONNECTED VEHICLE APPS WITH CLOUD IOT CORE

blog article

Jun 30, 2017

With the Internet of Things (IoT), vehicles are evolving from self-contained commodities focused on transportation to sophisticated, Internet-connected endpoints often capable of two-way communication. The new data streams generated by modern connected vehicles drive innovative business models such ...

Read More

HTTP and DNS in a 5G World HTTP AND DNS IN A 5G WORLD

blog article

Jun 30, 2017

The internet has of course been wildly successful over the last thirty years as more and more functionality has moved online. A large part of this success has been due to two key protocols that have allowed the internet to scale relatively gracefully: HTTP which stands for Hypertext Transmission Pro...

Read More

Computer says “No!”: Machines should be accountable for their decisions COMPUTER SAYS “NO!”: MACHINES SHOULD BE ACCOUNTABLE FOR THEIR DECISIONS

blog article

Jun 27, 2017

This summer I was on holiday abroad in a place I’ve never been before. We toured around by car, relying extensively on our sat nav system. One afternoon, I decided to switch off the navigation device and tried to find my way back using an old fashioned technique: my sense of direction. Yes, I ...

Read More

Why Software Testing Tools Fail WHY SOFTWARE TESTING TOOLS FAIL

blog article

Jun 26, 2017

For over two decades now, software testing tool vendors have been tempting enterprises with the promise of test automation. However, the fact of the matter is that most companies have never been able to achieve the desired business results from their automation initiatives. Recent studies report tha...

Read More

How big data is disrupting the oil and gas industry HOW BIG DATA IS DISRUPTING THE OIL AND GAS INDUSTRY

blog article

Jun 23, 2017

The role of CIOs in the success and long term survival of companies in today’s competitive landscape is growing. Technology is the leading differentiator between rival companies, and the next battleground industry could be the biggest one yet. The industry to watch in the coming years is oil a...

Read More

The future is not the cloud or the fog: it is actually the SEA! THE FUTURE IS NOT THE CLOUD OR THE FOG: IT IS ACTUALLY THE SEA!

blog article

Jun 22, 2017

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if...

Read More

How To Improve Your Website Security HOW TO IMPROVE YOUR WEBSITE SECURITY

blog article

Jun 22, 2017

With the WannaCry and Xdata ransomware attacks drawing headlines around the world, maintaining your website’s security is more important than ever. But new survey data by Clutch, a ratings and reviews firm in Washington DC, reveals that too frequently, our knowledge of security features doesn&...

Read More

What is Continuous Testing?—A Crash Course for Software Testers WHAT IS CONTINUOUS TESTING?—A CRASH COURSE FOR SOFTWARE TESTERS

blog article

Jun 20, 2017

Like Lucy and Ethel, many software testers have been scrambling to keep pace with accelerated processes—then along comes the supervisor saying, “You’re doing splendidly…Speed it up!” This ever-increasing pace is just one of 4 aspects of the “perfect storm” ...

Read More

Four Powers of an IT Superhero: No Cape Required FOUR POWERS OF AN IT SUPERHERO: NO CAPE REQUIRED

blog article

Jun 19, 2017

Day after day, the ordinary citizens of Earth remain unaware of the silent guardians that keep watch over the enterprise network. From their shadowy lairs, these brave men and women keep our data safe from the bandits of bandwidth while avoiding downtime destruction.But to be an IT Superhero, you do...

Read More

Custom Email Notification enhancements for communication between Approver, Requester and IT Staff for BMC Remedy CUSTOM EMAIL NOTIFICATION ENHANCEMENTS FOR COMMUNICATION BETWEEN APPROVER, REQUESTER AND IT STAFF FOR BMC REMEDY

blog article

Jun 16, 2017

Email has become a major formal communication platform for all kinds of industry. BMC Remedy, a service desk solution comes with email notification feature for various purposes. Looking at the progress of the email interface and tool capabilities, BMC Remedy email notification feature needs enhancem...

Read More

The pros and cons of adding open source to your software THE PROS AND CONS OF ADDING OPEN SOURCE TO YOUR SOFTWARE

blog article

Jun 12, 2017

For years, free and open source software (FOSS) has a had a negative connotation, with some developers forbidden to use it in final software product releases. The obvious downside in avoiding open source is that organizations run the additional risk of introducing avoidable vulnerabilities. For exam...

Read More

Two ITIL processes that will protect your existence TWO ITIL PROCESSES THAT WILL PROTECT YOUR EXISTENCE

blog article

Jun 09, 2017

In my recent blog entry, I talked about the future of the traditional IT organization and the need for sound governance and processes in the implementation of IT solutions, especially if they are leveraged through cloud and outsourced solution suppliers. IT service management (ITSM) and IT infrastru...

Read More

SAP Testing Advancements in Tricentis Tosca—Autonomous Testing, Fiori, Solman 7.2 & More SAP TESTING ADVANCEMENTS IN TRICENTIS TOSCA—AUTONOMOUS TESTING, FIORI, SOLMAN 7.2 & MORE

blog article

Jun 08, 2017

With Autonomous SAP Testing, comprehensive business process testing has never been faster or easier. This groundbreaking technology automatically generates and maintains SAP business process tests—without requiring manual intervention at any point in the process.

Read More

Real world challenges between us and the Internet of Things REAL WORLD CHALLENGES BETWEEN US AND THE INTERNET OF THINGS

blog article

Jun 08, 2017

Many a blog line has been penned on the rich topic of the Internet of Things (IoT) but not much has been written about the real world challenges between our today and the many promises of the IoT tomorrow. Technology considerations can easily blind us “techies” to more mundane realities ...

Read More

Cloud Computing for the Win CLOUD COMPUTING FOR THE WIN

blog article

Jun 06, 2017

How fitting that Cloud Computing (the horse) beat favorite Always Dreaming to the finish line at the Preakness this year, particularly for those of us working in Federal IT. Just three days earlier, the Modernizing Government Technology (MGT) Act passed the House, signaling continued momentum for ag...

Read More

7 Tools For Effective DevOps Collaboration 7 TOOLS FOR EFFECTIVE DEVOPS COLLABORATION

blog article

Jun 01, 2017

In the enterprise, DevOps adoption is skyrocketing. From 2015 to 2016, DevOps adoption increased from 66 percent to 74 percent. While the benefits of DevOps are clear, what’s not always as straightforward is arranging collaboration between two formerly independent teams: software development a...

Read More

How My Fear Of IT Outsourcing Services Got Crumpled HOW MY FEAR OF IT OUTSOURCING SERVICES GOT CRUMPLED

blog article

May 26, 2017

We recently interviewed one of our clients, who is the IT Practice Lead at one of the IT solutions companies based in Dallas. In his interview, the client shared how (once upon a time) the word outsourcing freaked him out. But as he worked with ISHIR, one of the best IT outsourcing service providers...

Read More

Big Data will enable better network and application intelligence in 5G BIG DATA WILL ENABLE BETTER NETWORK AND APPLICATION INTELLIGENCE IN 5G

blog article

May 25, 2017

We are fortunate to live in an exciting time where multiple technological leaps are occurring. Specifically, I am thinking of the mobile industry transition from 4G to 5G, and the cross-industry IT paradigm shift to the Big Data approach. The 5G standards community is already planning to support the...

Read More

How Software Quality Engineering Can Help Airlines Stay Successful HOW SOFTWARE QUALITY ENGINEERING CAN HELP AIRLINES STAY SUCCESSFUL

blog article

May 22, 2017

A robust software quality testing approach is crucial for businesses across all industries. For instance, in the aviation industry, we have airlines upgrading mobile applications in order to better connect with their passengers. Technology is creating revolutionary paths, no matter the business, lea...

Read More

Understanding the benefits and threats when building an IoT strategy UNDERSTANDING THE BENEFITS AND THREATS WHEN BUILDING AN IOT STRATEGY

blog article

May 22, 2017

The Internet of Things (IoT) market continues to gain momentum, both growing in total connections and into new business and consumer application segments, but still CIOs and other IT leaders diverge on what are the real benefits of this technologies for the business and, mainly, what are the potenti...

Read More

Neural Networks – How Do They Change Your Business? NEURAL NETWORKS – HOW DO THEY CHANGE YOUR BUSINESS?

blog article

May 22, 2017

It seems like everyone in tech is obsessed with neural networks these days. A neural network works similarly to a human brain, but more on that later. Neural networks are so intriguing in the IT world because they offer real possibilities to change the way software operates in industries like travel...

Read More

How to Secure a Business Network, Servers and Endpoints HOW TO SECURE A BUSINESS NETWORK, SERVERS AND ENDPOINTS

blog article

May 19, 2017

If you’re a company owner or manager, then WannaCry probably made you rethink just how important it is to secure your business network. This is the only upside of this cyberattack. However, WannaCry isn’t the starting point of cyber threats, it’s just the latest evolution. Ransomwa...

Read More

Azure IoT Hub – Connecting your Device to the Cloud AZURE IOT HUB – CONNECTING YOUR DEVICE TO THE CLOUD

blog article

May 16, 2017

One of the biggest challenges facing IoT projects is how to reliably and securely connect devices to the solution back end to enable the device to send telemetry and retrieve commands. IoT devices: Are often embedded systems with no human operator. Can be in remote locations, where physical access i...

Read More

Why Software-as-a-Service (SaaS) will never be the same again? WHY SOFTWARE-AS-A-SERVICE (SAAS) WILL NEVER BE THE SAME AGAIN?

blog article

May 12, 2017

In order to be better prepared for the future, organizations have to work towards making enterprise software accessible from any device. They should be able to access the software as they move throughout their day (while traveling, on their desktop or while out in the field). All this should happen ...

Read More

ARE HACKED MEDICAL IOT DEVICES RANSOMWARE’S NEXT TARGET? ARE HACKED MEDICAL IOT DEVICES RANSOMWARE’S NEXT TARGET?

blog article

May 09, 2017

Shortly after IoT became a mainstream topic, the idea of device access-control falling into the wrong hands also grabbed headlines. Was it possible? What would happen? These are particularly concerning questions for healthcare organizations who deal in life-saving devices. But the notion of hacked m...

Read More

What does the future of cyber security look like? WHAT DOES THE FUTURE OF CYBER SECURITY LOOK LIKE?

blog article

May 09, 2017

As per Computer Business Review, there is astronomical numbers of new devices coming online each year as connectivity is key. With 5G on the horizon, it’s looking more like a double edged sword, sacrificing our security for speed. According to ABI Research, by 2020 there will be 40.9 billion a...

Read More

Forrester: The Internet of Things Propels Product Development Into The Digital Era FORRESTER: THE INTERNET OF THINGS PROPELS PRODUCT DEVELOPMENT INTO THE DIGITAL ERA

blog article

May 05, 2017

Digital is the latest radical shift in the technology world and, apparently, it might be the greatest. Digital technologies are disrupting and changing businesses. Product development is at the forefront of this new technology wave. In a recent report, Forrester states that traditional product devel...

Read More

The Impact of IoT on Businesses THE IMPACT OF IOT ON BUSINESSES

blog article

May 03, 2017

The Internet has been around for a while but it’s only been the product of people – all the images, graphics, videos, data, games, and more were created by the people, for the people, and about the people. Compare the Internet to a well-knit fabric – woven all into us, this interne...

Read More

What Pepsi WHAT PEPSI'S FAILED AD CAN TEACH US ABOUT DATA PRIVACY

blog article

May 02, 2017

By now, you've probably seen the ad that Pepsi released to the world and then quickly withdrew when it became obvious how tone deaf it was. I don't have anything to say about the ad that hasn't been said already, but I do want to examine the conditions that led to an ad of such oblivious...

Read More

Software Development Evolution: From Waterfall to Agile to DevOps SOFTWARE DEVELOPMENT EVOLUTION: FROM WATERFALL TO AGILE TO DEVOPS

blog article

May 01, 2017

In the wave of new age technologies, the technology industry is witnessing new tools and methods of Software Development in order to have faster and better quality of development. There are not just many tools for software developers but there are new development methodologies for software developme...

Read More

How to Transform Big Data Possibilities Into a Commercial Advantage? HOW TO TRANSFORM BIG DATA POSSIBILITIES INTO A COMMERCIAL ADVANTAGE?

blog article

Apr 07, 2017

About 2.5 exabytes of data are generated each day, and that number is doubling every 40 months or so. Big data is exploding and the huge volume of data – both structured and unstructured – inundates organizations every hour. As data is growing, most companies face a real challenge to ove...

Read More

Managing IT contractors: One small change makes a big impact MANAGING IT CONTRACTORS: ONE SMALL CHANGE MAKES A BIG IMPACT

blog article

Apr 03, 2017

If the staffing industry has an Achilles heel, it’s that contractors aren’t always as engaged in a company’s mission and work as full-time employees. But it doesn’t have to be that way. We hear every day from IT consultants that they crave the same feedback as permanent emplo...

Read More

Everything You Need TO WATCH about Artificial Intelligence EVERYTHING YOU NEED TO WATCH ABOUT ARTIFICIAL INTELLIGENCE

blog article

Mar 30, 2017

Artificial Intelligence (AI) is the topic everyone in the world is talking about. It`s already part of our lives, and it doesn’t stay still. From SIRI to self-driving cars, AI is progressing at lightning speed. While AI is invading our being day by day, our anticipations of AI seem to be very ...

Read More

CHOOSING A TOP OUTSOURCING SOFTWARE DEVELOPMENT COMPANY: TIPS & TRICKS CHOOSING A TOP OUTSOURCING SOFTWARE DEVELOPMENT COMPANY: TIPS & TRICKS

blog article

Mar 14, 2017

Many companies decide to outsource their software development to an outside company. While the decision to outsource may be an easy one, choosing the right software development service partner can be a challenge. It is certainly doable, however. Here, we’ll talk about three factors you should ...

Read More

How to avoid falling for the W-2 phishing scam HOW TO AVOID FALLING FOR THE W-2 PHISHING SCAM

blog article

Mar 13, 2017

Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Most recently the hot stories have been about a simple targeted request that avoids links, attachments, and malware, plays friendly with email filt...

Read More

Reaching the cybersecurity tipping point REACHING THE CYBERSECURITY TIPPING POINT

blog article

Feb 22, 2017

Remember that moment when you really committed yourself to solid security and privacy practices? The moment when you committed to never clicking on a link you weren’t sure about, to always checking for badges on people coming in the door, to always using your password manager to create a compl...

Read More

SecureWorks Finds Most Cyber-Threats Involve Phishing, Network Scans SECUREWORKS FINDS MOST CYBER-THREATS INVOLVE PHISHING, NETWORK SCANS

blog article

Feb 03, 2017

The vast majority of successful attacks on companies are conducted by cyber-criminals using phishing, network scans for exploitable systems, and strategic web site compromises, security-services firm SecureWorks found in an analysis of six months of incident-response engagements. The analysis of 163...

Read More

The Influence of Digital Payments and the Need for Software Testing THE INFLUENCE OF DIGITAL PAYMENTS AND THE NEED FOR SOFTWARE TESTING

blog article

Feb 01, 2017

Digital payments are the norm of the day as more businesses break geographic barriers and make a mark globally. In this post, we discuss the various aspects of digital payments for today’s consumers. Digital payments influence customers buying habits immensely, because of the readily available...

Read More

Dropbox Unveils New Tools Designed for Enterprise Teams DROPBOX UNVEILS NEW TOOLS DESIGNED FOR ENTERPRISE TEAMS

blog article

Jan 30, 2017

Dropbox dropped a slew of new features and application improvements into its product line Jan. 30, centered mainly around the trend for enterprises to organize themselves into project teams that report to division heads. Dropbox CEO Drew Houston also announced that the San Francisco-based company no...

Read More

A Few of My Favorite Things A FEW OF MY FAVORITE THINGS

blog article

Jan 27, 2017

The recent holiday season had me in a sharing mood, so I thought I would extend it just a little bit longer than usual and use a holiday theme to share some of the applications and information sources that make work as a Salesforce.com consultant just a little bit better. This list is by no means ex...

Read More

Applying a Phased Approach to Ensure Better SharePoint Business Solution Deployment APPLYING A PHASED APPROACH TO ENSURE BETTER SHAREPOINT BUSINESS SOLUTION DEPLOYMENT

blog article

Jan 26, 2017

The Define phase helps to set the stage for successful solution delivery by outlining the steps necessary to better understand customer requirements, demonstrate and select potential SharePoint capabilities for use in solution, and to lay the foundation for effective communications and project manag...

Read More

Top Software Testing Tools That Accelerate Testing TOP SOFTWARE TESTING TOOLS THAT ACCELERATE TESTING

blog article

Jan 23, 2017

Software testing tools are critical resources for every successful Quality Assurance team. A wide variety of software test tools addressing various aspects of the testing process, can be applied to different types of software, programming languages, and to different types of testing.

Read More

Software liability is coming SOFTWARE LIABILITY IS COMING

blog article

Jan 17, 2017

The New Year started badly for networking multinational D-Link after the US FTC kicked off legal proceedings claiming the company failed to secure a variety of its self-proclaimed un-hackable products. There's a bigger focus on weak device security at the moment given the severity of last year&#...

Read More

Security fatigue—or how I learned to overcome laziness and use a password manager SECURITY FATIGUE—OR HOW I LEARNED TO OVERCOME LAZINESS AND USE A PASSWORD MANAGER

blog article

Jan 11, 2017

I admit it: I sometimes suffer from “security fatigue,” and I bet you do, too. If you’ve ever reused a password for a new site login, thinking the site isn’t that important, you suffer from it. If you’ve clicked on a tempting email offer or social media request, even if...

Read More

Will Speed to Market and Quality Determine the Software Testing Agenda for 2017? WILL SPEED TO MARKET AND QUALITY DETERMINE THE SOFTWARE TESTING AGENDA FOR 2017?

blog article

Jan 03, 2017

Speed is becoming a defining factor for every new venture in the marketplace. Whether it is a financial app, a gaming app, a VR device, or anything that is consumer-centric or enterprise facing; speed is the key to success. The next line of emphasis is on the quality and performance. Aspects such as...

Read More

Reflexions from 2016: Top Software Testing Priorities for 2017 REFLEXIONS FROM 2016: TOP SOFTWARE TESTING PRIORITIES FOR 2017

blog article

Dec 30, 2016

2016 has been a year of successful technology ventures as well as a year of data and security breaches. Interestingly, this has opened up a lot of lucrative opportunities for Big Data and Security professionals. Data is at the core of all innovations, a key enabler for enterprises to plan their next...

Read More

Key Software Testing Best Practices from 2016 KEY SOFTWARE TESTING BEST PRACTICES FROM 2016

blog article

Dec 27, 2016

As experts say, ‘the best (Software Testing) tools are the ones everyone uses, not always the ‘industry’ best’.The year 2016 has witnessed a lot of experimentation around technology and its adoption via various approaches. These approaches have been tried and tested across pr...

Read More

Why is Software Testing Being Outsourced? WHY IS SOFTWARE TESTING BEING OUTSOURCED?

blog article

Dec 23, 2016

2016 has been a year of mashups in the enterprise technology space! The enterprise software market has witnessed some phenomenal upgrades such as Cloud accessibility/SaaS, machine learning, Artificial Intelligence, Smart devices, intelligent systems, intelligent applications, etc. Open Source innova...

Read More

Oracle is cracking down on Java SE users who think it ORACLE IS CRACKING DOWN ON JAVA SE USERS WHO THINK IT'S FREE

blog article

Dec 20, 2016

ORACLE HAS begun an aggressive campaign of chasing licence fees for use of payable elements of its Java software.The company, which acquired Java owner Sun Microsystems in 2010, has already lost a case over the fair use of Java APIs in Google's Android operating system, but as it awaits another ...

Read More

What We Can Learn from Yahoo’s Latest Hack – Plus IT Security Tips for 2017 WHAT WE CAN LEARN FROM YAHOO’S LATEST HACK – PLUS IT SECURITY TIPS FOR 2017

blog article

Dec 20, 2016

With the holidays around the corner, people are using their email more than ever to book flights, order gifts, check shipping statuses and more. But what do you do when your privacy and personal information is taken and exposed? Last week, Yahoo disclosed that a minimum of 1 billion accounts were ha...

Read More

HANA View Prompts in IDT Derived Table HANA VIEW PROMPTS IN IDT DERIVED TABLE

blog article

Dec 16, 2016

Recently, I was on a project that used HANA views as the data source for SAP BusinessObjects 4.0 universes (unx). The HANA views had mandatory input parameters (i.e. prompts) as well as variables which I needed to provide default values for or bypass with a derived table in the Information Design To...

Read More

What WHAT'S IN YOUR CYBERSECURITY ARSENAL? TIERS OF PROTECTION FOR INVESTMENT MANAGERS

blog article

Dec 15, 2016

When it comes to protecting your investment firm from serious cybersecurity threats, it's safe to say that less is definitely not more. In fact, it takes a pretty heavy arsenal of security measures to combat the ever-growing threats targeting your firm from both the inside and the outside. But i...

Read More

Setting animation scale for Android UI tests SETTING ANIMATION SCALE FOR ANDROID UI TESTS

blog article

Dec 12, 2016

Before testing with Espresso, it is highly recommended to disable animations. Tests may be flaky otherwise. The simplest (and only officially mentioned) way to disable animations is to go manually to Settings app and adjust appropriate settings in Developer options. That way is very inconvenient whe...

Read More

Right Size IT Managed Service for Midsize Companies RIGHT SIZE IT MANAGED SERVICE FOR MIDSIZE COMPANIES

blog article

Dec 09, 2016

Today, the U.S. economy counts on our midsize companies to fuel its growth. Midsize companies are not only adding jobs at twice the rate of big business, their sales increased by 7.4 percent in 2015 alone – 4.5 percentage points higher than companies in the S&P 500. As their economic impor...

Read More

HowTo – Custom API Policy with Anypoint Platform HOWTO – CUSTOM API POLICY WITH ANYPOINT PLATFORM

blog article

Dec 08, 2016

As organizations embrace APIs for exchanging information with internal or external customers and partners, it’s critical not to sacrifice visibility or governance.  That’s where API management comes in. API management policies can be layered on top of the implementation of the APIs ...

Read More

10 Considerations When Choosing Flash Storage 10 CONSIDERATIONS WHEN CHOOSING FLASH STORAGE

blog article

Dec 08, 2016

IDC reports that the top pain points IT managers face when it comes to storage are reducing storage-related costs, ensuring data compliance and protecting virtual machine data, all while increasing capacity and performance. Easy enough, right? With the choices between hard disk drive (HDD) and flash...

Read More

2017 Outlook for Hedge Funds: Risk, Regulation and Cybersecurity 2017 OUTLOOK FOR HEDGE FUNDS: RISK, REGULATION AND CYBERSECURITY

blog article

Dec 08, 2016

2017 is already shaping up to be an interesting year. With a new presidential administration taking office and the hedge fund industry coming off the heels of a challenging year, there’s a lot to keep an eye on. We recently hosted a panel with law firm Morgan Lewis to discuss these and many ot...

Read More

An Insight into Data Tap in SQL Server AN INSIGHT INTO DATA TAP IN SQL SERVER

blog article

Dec 07, 2016

Data taps are one of the great significant features in SQL Server in the Data analysis during runtime. In a nutshell, they enable us, at runtime, to choose a given path from a data flow and capture a copy of the data at that specific point of the data flow in a .csv file on a given execution instanc...

Read More

KKR to buy Optiv Security KKR TO BUY OPTIV SECURITY

blog article

Dec 06, 2016

Over the past three years, Optiv has served more than 7,500 clients in 76 countries, including 71 of the Fortune 100 and 604 of the Fortune 1000. Optiv was named to the 2016 Inc. 5000 as one of North America’s fastest-growing private companies with a 97 percent three-year growth rate. The comp...

Read More

Private Equity CTO Survey Explores IT Priorities and CTO Role Evolution PRIVATE EQUITY CTO SURVEY EXPLORES IT PRIORITIES AND CTO ROLE EVOLUTION

blog article

Dec 06, 2016

The tide is changing for private equity firms. They continue to grow in popularity – some say private equity is the new hedge fund – but with increased interest comes amplified speculation and heightened expectations. In technology, private equity firms have found a fierce enabler for co...

Read More

HOW MUCH DOES IT COST TO BUILD A WEBSITE ON RUBY ON RAILS? HOW MUCH DOES IT COST TO BUILD A WEBSITE ON RUBY ON RAILS?

blog article

Dec 06, 2016

Web development with Ruby on Rails could be much easier. It has just one way to go, the shortest way, so you will get to your destination much faster. Most of the ruby on rails developers admit they have got a great boost in productivity. Since they’ve started using this framework. There is a ...

Read More

HOW TO HIRE GOOD SOFTWARE DEVELOPERS HOW TO HIRE GOOD SOFTWARE DEVELOPERS

blog article

Dec 06, 2016

Most IT experts today agree that talented software developers will soon be the most needed type of employee for just about any company, even if that company’s business is not related to software development. Finding and recruiting highly qualified software developers sometimes may be hard. But...

Read More

Meet a Muley: Zoe Nicholson, growing partnerships across Australia and New Zealand MEET A MULEY: ZOE NICHOLSON, GROWING PARTNERSHIPS ACROSS AUSTRALIA AND NEW ZEALAND

blog article

Dec 05, 2016

When I moved back to Sydney from working in Asia for a few years, I decided my next job should be with a company that had new and innovative technology. It would have been easy for me to go back to security or infrastructure, but I liked the idea of learning about a whole new area of IT. So with tho...

Read More

MOST POPULAR TYPES OF APPS MOST POPULAR TYPES OF APPS

blog article

Dec 05, 2016

Mobile apps are compact software solutions designed to help with your preferred tasks on smartphones and tablets. The variety of those programs is immense but they have different designs, working mechanics, and therefore can be divided into different app categories. Today we want to discuss  th...

Read More

Join us at the Gartner Application Strategies & Solutions Summit next week! JOIN US AT THE GARTNER APPLICATION STRATEGIES & SOLUTIONS SUMMIT NEXT WEEK!

blog article

Dec 02, 2016

The theme of next week’s event is, “Step up to a New Business Reality”; a theme quite relevant to all of us planning for 2017 and looking back on the triumphs and challenges of 2016. As we gear up for the new year, MuleSoft is excited to join Gartner at this premiere event to help ...

Read More

Supply Chain API for Agility SUPPLY CHAIN API FOR AGILITY

blog article

Dec 01, 2016

Traditional supply chains are coming under growing pressure as organisations search for growth in increasingly competitive markets. Around the world, changing economic conditions and customer demands mean that organisations need to find a way to be increasingly agile. Those unable to evolve their op...

Read More

Top 6 Hurdles to IT Optimization TOP 6 HURDLES TO IT OPTIMIZATION

blog article

Dec 01, 2016

The need to optimize IT operations is almost universal in business today. According to more than 100 IT executives from large U.S. organizations recently surveyed by IDG Research, just nine-percent of companies have operations that are running optimally. The remaining 91-percent have room for improv...

Read More

Creating subsites and change master page using REST API from SharePoint Designer Workflow CREATING SUBSITES AND CHANGE MASTER PAGE USING REST API FROM SHAREPOINT DESIGNER WORKFLOW

blog article

Dec 01, 2016

SharePoint Server 2013 brings a significant advancement to Workflow: enterprise features such as fully declarative authoring, REST and Service Bus messaging, elastic scalability, and managed service reliability. SharePoint Server 2013 can use a new workflow service built on the Windows Workflow Foun...

Read More

Meet MuleSoft developers near you! MEET MULESOFT DEVELOPERS NEAR YOU!

blog article

Nov 30, 2016

The MuleSoft community keeps growing! Every day, we observe developers from around the globe take initiatives to strengthen their local groups, share business insights and exchange ideas on how APIs contribute to the ongoing digital transformation. In the next ten days, no less than five MuleSoft co...

Read More

Why Don’t The IT Pros Fear The Rise Of Robots? WHY DON’T THE IT PROS FEAR THE RISE OF ROBOTS?

blog article

Nov 30, 2016

Automation has proven itself to be one of the greatest and most consequential job killers of the last few decades. In a wide variety of industries, automation has replaced human labor, as robots and AI programs can process information, learn, and replicate increasingly complicated tasks. We’ve...

Read More

AQuA API with Zuora Connector AQUA API WITH ZUORA CONNECTOR

blog article

Nov 29, 2016

Zuora has been offering three different types of API: REST API, SOAP API and AQuA API. It is believed that majority of Zuora customers use the SOAP API to integrate with Zuora because of the breadth of its API. (MuleSoft is using the SOAP API internally!) While MuleSoft offered the Zuora Connector b...

Read More

Managed Services: Ensuring Enterprise Transformation to Hybrid IT MANAGED SERVICES: ENSURING ENTERPRISE TRANSFORMATION TO HYBRID IT

blog article

Nov 29, 2016

Organizations are continually challenged to align IT initiatives with business goals. While the top business initiatives are centered around the financial metrics of optimizing profits, growing revenue and driving down costs, ensuring innovation, customer satisfaction and market penetration are crit...

Read More

Six Myths about Hedge Fund Cybersecurity SIX MYTHS ABOUT HEDGE FUND CYBERSECURITY

blog article

Nov 29, 2016

The cybersecurity threat landscape continues to evolve, leaving behind significant operational and reputational harm for financial services firms. Cyber-attacks such as those impacting LinkedIn, Talk-Talk, Yahoo and Sony have forced cybersecurity into the limelight via news making headlines, enough ...

Read More

Does Donald Trump mean disruption for the IT Industry or will he get the IT Industry growing? DOES DONALD TRUMP MEAN DISRUPTION FOR THE IT INDUSTRY OR WILL HE GET THE IT INDUSTRY GROWING?

blog article

Nov 26, 2016

During his campaign, President-elect Donald Trump, gave mixed signals that he intends to create more jobs in US (which means lesser work will be outsourced) and, on other hand, stressed that it’s important to retain foreign talent. Given such mixed opinions, what should the IT world and offsho...

Read More

Cybersecurity firm Optiv files for IPO to raise $100M CYBERSECURITY FIRM OPTIV FILES FOR IPO TO RAISE $100M

blog article

Nov 24, 2016

Cybersecurity solutions company Optiv Security Inc. on Friday quietly filed for a $100 million initial public offering. The company is majority-owned by Blackstone Group LP. IPO underwriters include Morgan Stanley, Goldman Sachs & Co., Barclays Capital Inc. and Citigroup Global Markets Inc. Whil...

Read More

How IT Needs to Adapt to the Growing Number of Developers HOW IT NEEDS TO ADAPT TO THE GROWING NUMBER OF DEVELOPERS

blog article

Nov 23, 2016

There is growing pressure for IT to deliver on business demands in real time—but there is often a gap between what they need to do and what they can do. So, how can they close the IT delivery gap? For starters, they should make everyone in the company a developer. This is not to say that all e...

Read More

The Fan Challenge: How Sports Are Embracing Digital to Engage Audiences Worldwide THE FAN CHALLENGE: HOW SPORTS ARE EMBRACING DIGITAL TO ENGAGE AUDIENCES WORLDWIDE

blog article

Nov 23, 2016

To be able to successfully connect with your followers, it’s crucial to understand what they want first. It’s no wonder that the application of big data in sports has expanded beyond tracking athletic performance to include tracking the behavior of the fans. A healthy portion of data poi...

Read More

Algorithm & Analytics: Propel Digitization to Deliver Business Value ALGORITHM & ANALYTICS: PROPEL DIGITIZATION TO DELIVER BUSINESS VALUE

blog article

Nov 22, 2016

While a good number of businesses are dazed over the hype around technology buzzwords like “Big Data” and “IoT” often attributed to the hysteria unleashed by IT vendors and industry, a few have set their eyes on something that is even older than computing—Algorithms. Mo...

Read More

Five Black Friday/Cyber Monday IT Security Scams to Be Aware Of FIVE BLACK FRIDAY/CYBER MONDAY IT SECURITY SCAMS TO BE AWARE OF

blog article

Nov 22, 2016

As we prepare our turkeys for Thanksgiving and retail stores of all shapes and sizes prepare their inventory for Black Friday and Cyber Monday sales, cyber criminals are preparing their attacks. Your inboxes are likely already flooded with the newest and most popular deals for this holiday season, b...

Read More

The Morning Ledger: China Inc.’s Shopping Binge unnerves West THE MORNING LEDGER: CHINA INC.’S SHOPPING BINGE UNNERVES WEST

blog article

Nov 21, 2016

Good morning. For weeks and weeks, we have heard rumors according to which it isn’t just the German government that is concerned about the planned takeover of a German technology company by a Chinese buyer. “It’s the Americans, first and foremost,” people said, in Berlin and ...

Read More

HOW MUCH DOES VR APP DEVELOPMENT COST? HOW MUCH DOES VR APP DEVELOPMENT COST?

blog article

Nov 21, 2016

VR app development is supposed to be the future of tech. Virtual reality technology is being successfully applied in different spheres of our lives. It allows us to play with our imagination and opens the door to the fantastic and imaginary worlds. Without any doubt, this is the place where dreams c...

Read More

Smarter Apps with Application Insights SMARTER APPS WITH APPLICATION INSIGHTS

blog article

Nov 21, 2016

Application Insights is an Application Performance Management (APM) tool by Microsoft. It is an extensible analytics service that monitors live web applications and services – hosted on Azure, other cloud services or on-premises servers. It provides rich and comprehensive information on the pe...

Read More

Android Fundamentals: Working with the RecyclerView, Adapter, and ViewHolder Pattern ANDROID FUNDAMENTALS: WORKING WITH THE RECYCLERVIEW, ADAPTER, AND VIEWHOLDER PATTERN

blog article

Nov 18, 2016

In the mobile development world, regardless of the platform, lists that display data to the user are commonly used in many projects. The Android platform gives us two different types of views that can be leveraged to display lists of data—the  ListView and the RecyclerView. My fri...

Read More

Don’t Stay in the ‘Shu’ box: Agile is not a Recipe DON’T STAY IN THE ‘SHU’ BOX: AGILE IS NOT A RECIPE

blog article

Nov 17, 2016

The way we humans learn things is a progressive process that goes from less to more, little by little. Shu Ha Ri is a way to explain this from the Japanese martial arts (Aikido to be exact). A rough translation for this would be something like ‘learn, detach and transcend’. In order to u...

Read More

Weaving it with Dataweave expression WEAVING IT WITH DATAWEAVE EXPRESSION

blog article

Nov 16, 2016

We all know how powerful Dataweave Transform Message component is. This is such a powerful template engine that allows us to transform data to and from any format (XML, CSV, JSON, Pojos, Maps, etc. basically ). So if we need to transform we need a Dataweave component in our flow. But wait! Dataweave...

Read More

4 tips to have the most successful Corporate Intranet 4 TIPS TO HAVE THE MOST SUCCESSFUL CORPORATE INTRANET

blog article

Nov 16, 2016

Are you planning to implement a Corporate Intranet or a Knowledge Management Portal but skeptical that it won’t work? Well, you are right! Social Collaboration has a great impact everywhere. Even in the way professionals work. The Corporate Intranet has made the ‘workplace’ possibl...

Read More

UX/UI RETROSPECTIVE: MOBILE APP DESIGN TRENDS IN 2016 UX/UI RETROSPECTIVE: MOBILE APP DESIGN TRENDS IN 2016

blog article

Nov 16, 2016

Minimalism is always on trend in mobile app design. 2016 is not an exception from the rule, as users are being enchanted by the blend of subtle and simple colors in backgrounds, easy access to navigation, innovative scrolling and predominance of bold and big fonts. Due to the result of marketing res...

Read More

Getting Your Test Tool Right is Key to Releasing Quality Software GETTING YOUR TEST TOOL RIGHT IS KEY TO RELEASING QUALITY SOFTWARE

blog article

Nov 15, 2016

Choosing and investing in a software testing tool or a test automation framework is like fitting into the right sports shoes – you need to run with them, walk with them, and if on an expedition climb with them. While you want the testing tool to work for you, you have multiple objectives to ac...

Read More

Durable Streaming API with MuleSoft Salesforce Connector DURABLE STREAMING API WITH MULESOFT SALESFORCE CONNECTOR

blog article

Nov 15, 2016

Salesforce introduced the Streaming API with its Spring ‘16 release (API v36). It was a neat feature since Salesforce users don’t have to poll or periodically call Salesforce to check any updates in their objects. One important limitation with API v36 was that the Streaming API (API v36)...

Read More

Key ERP Support Strategies for Midsize Enterprises KEY ERP SUPPORT STRATEGIES FOR MIDSIZE ENTERPRISES

blog article

Nov 15, 2016

Though smaller in scale, the ERP needs of a midsize organization are similar in scope to those of the enterprise organization. The problem is that the smaller IT teams at these organizations are already stretched thin without managing a complex ERP system that is a challenge for even well-staffed en...

Read More

Build a Better UX Process BUILD A BETTER UX PROCESS

blog article

Nov 15, 2016

What does a UX Process really look like? Honestly, depending on the project, it can look many different ways. I personally prefer to use a combination of in-depth process techniques, rather than just focusing on one specific area. It is critical to understand that UX is made up of several different ...

Read More

10 BEST TEST MANAGEMENT TOOLS FOR QA ENGINEERS 10 BEST TEST MANAGEMENT TOOLS FOR QA ENGINEERS

blog article

Nov 15, 2016

The idea implementation starts with a clear planning of the whole process. Product owner or Project manager has to select the best team, grant the responsibilities and assign tasks, and choose test management tools to be used for the entire software development life cycle. A tool selection begins wi...

Read More

MANAGE PROJECTS WITH EASYQA TO IMPROVE SOFTWARE QUALITY MANAGE PROJECTS WITH EASYQA TO IMPROVE SOFTWARE QUALITY

blog article

Nov 11, 2016

To manage projects with EasyQA you have to create them within your organization. Let’s take a look what is a project. Project – is a temporary endeavor which might have a certain beginning and finishing date, and might be determined by certain financing or achievement of certain goals, t...

Read More

Navigating Today’s Cybersecurity Landscape Is Tricky NAVIGATING TODAY’S CYBERSECURITY LANDSCAPE IS TRICKY

blog article

Nov 10, 2016

Cisco’s 2016 Midyear Cybersecurity Report provides an unfiltered look into the current cybersecurity landscape. It’s not a rosy picture, as the report reveals the growing threat of cyberattacks, and most notably, ransomware. The report, though, isn’t all doom and gloom and reveals ...

Read More

Preventing Cybersecurity Threats with Email Phishing Simulations PREVENTING CYBERSECURITY THREATS WITH EMAIL PHISHING SIMULATIONS

blog article

Nov 10, 2016

Social engineering schemes continue to grow in their sophistication, and phishing campaigns, in particular, are causing concern as they make their way to employee inboxes. These fraudulent email campaigns (and phone calls too!) appear legitimate and take advantage of employees who are often too busy...

Read More

PowerApps and Microsoft Flow is now available on Microsoft SharePoint POWERAPPS AND MICROSOFT FLOW IS NOW AVAILABLE ON MICROSOFT SHAREPOINT

blog article

Nov 10, 2016

On 31st October 2016, Microsoft SharePoint announced the availability of PowerApps and Microsoft Flow. Both the tools enable users to automate workflows and build custom apps quickly, and it is also suitable for specific needs of SharePoint users. PowerApps is meant to help users who can’t cod...

Read More

HOW TO BECOME A MILLIONAIRE WITH GAME DEVELOPMENT HOW TO BECOME A MILLIONAIRE WITH GAME DEVELOPMENT

blog article

Nov 10, 2016

There are dozens of ways how to be a millionaire. But definitely one of the most pleasant options is to build a game which can conquer the world. What? You don’t believe that game development can be such a rewarding thing? We are here to convince you! In fact, game development is one of the mo...

Read More

How to speak to developer — Designers’ Cheatsheet HOW TO SPEAK TO DEVELOPER — DESIGNERS’ CHEATSHEET

blog article

Nov 09, 2016

Communication between designer and developer is essential to the project success — so far, so obvious and we all know it, right? But the reality very often challenges us with communication issues that nobody’s expected because we’re all focusing on the natural flow of work and the ...

Read More

Android Auto: Now Everywhere! ANDROID AUTO: NOW EVERYWHERE!

blog article

Nov 09, 2016

Smartphones are crucial to modern life. They are our communications platform, our entertainment hub, and our most-used utility. They are our constant companions. Until recently, smartphones have missed out on deep integration into what is usually our second biggest investment: Cars. The big trend in...

Read More

Android Auto: Now Everywhere! ANDROID AUTO: NOW EVERYWHERE!

blog article

Nov 09, 2016

Smartphones are crucial to modern life. They are our communications platform, our entertainment hub, and our most-used utility. They are our constant companions. Until recently, smartphones have missed out on deep integration into what is usually our second biggest investment: Cars. The big trend in...

Read More

Today’s Healthcare Demands Always-on Mobility TODAY’S HEALTHCARE DEMANDS ALWAYS-ON MOBILITY

blog article

Nov 08, 2016

Today’s healthcare organizations face unique challenges to provide a high standard of care, all while protecting sensitive patient data. The delivery of quality healthcare requires technology that provides physicians and medical staff with “anytime, anywhere” access to view patient...

Read More

What’s the Difference Between Next-Generation Firewalls and Traditional Firewalls? WHAT’S THE DIFFERENCE BETWEEN NEXT-GENERATION FIREWALLS AND TRADITIONAL FIREWALLS?

blog article

Nov 08, 2016

Due to changes in the cyber security landscape, traditional firewalls on the port level are no longer effective at managing traffic. Malicious traffic has the capacity to enter any open port, which provides great risk to firm security. Next generation firewalls work further than port-based firewalls...

Read More

What are the top 10 web security risks? WHAT ARE THE TOP 10 WEB SECURITY RISKS?

blog article

Nov 08, 2016

Web applications have increased vulnerability to malicious attacks. If you have a web application for your business, should you be worried? Most definitely. Attackers don’t single out web applications. They seek loopholes in a business web application to invade one. If you have a web applicati...

Read More

Continuous Integration with Jenkins and GitHub CONTINUOUS INTEGRATION WITH JENKINS AND GITHUB

blog article

Nov 08, 2016

Continuous Integration (CI) and Continuous Delivery (DC) are rapidly becoming an integral part of software development. These disciplines can play a significant role in building stable release processes that help ensure project milestones are met. And in addition to simply performing compilation tas...

Read More

Azure Pricing Receives an Overhaul In 2016 AZURE PRICING RECEIVES AN OVERHAUL IN 2016

blog article

Nov 08, 2016

Microsoft has made substantial changes to the Azure pricing model across the channel effective October 2016.  One of the major reasons for this change was an effort to eliminate the discount complexity across various programs which were often difficult and cumbersome to explain and calculate.&n...

Read More

Verge Shows Startups How to Piece Together an Effective Startup Pitch VERGE SHOWS STARTUPS HOW TO PIECE TOGETHER AN EFFECTIVE STARTUP PITCH

blog article

Nov 08, 2016

There are few things more important in the process of establishing a startup than the pitch. With millions of apps in the app store and substantial funding on the line, the stakes are high to ensure you are crafting a pitch that will ensure your startup not only has a right-now, but a future. A new ...

Read More

4 IT HR Challenges Affecting Your Business 4 IT HR CHALLENGES AFFECTING YOUR BUSINESS

blog article

Nov 07, 2016

For many businesses outside of the IT sector, creating and/or hiring for an IT Department can be extremely confusing. Domain Management, Development, Up-Time and VoIP can sound like a foreign language to non-technical people. Don’t worry, though, because you’re not alone. A significant n...

Read More

What’s new in Angular JS 2.0? WHAT’S NEW IN ANGULAR JS 2.0?

blog article

Nov 07, 2016

AngularJS has become one of the most popular open source JavaScript frameworks in the world of web application development. Angular 2.0 is five times faster as compared to Angular 1.x. Angular 2.0 written entirely in Typescript and meets the ES6 specification. And it’s not an update for Angula...

Read More

The demand for custom applications is exploding. What’s going on? THE DEMAND FOR CUSTOM APPLICATIONS IS EXPLODING. WHAT’S GOING ON?

blog article

Nov 06, 2016

Our clients are requiring more custom applications than ever before, and our experience seems to reflect an industry trend.

According to Forrester Research’s report of global tech spending, investment in software for the enterprise grew 43% over the last five years, going from $...

Read More

App of the week: Sales Forecast Accuracy APP OF THE WEEK: SALES FORECAST ACCURACY

blog article

Nov 04, 2016

The Domo Appstore gives you all the tools you need to customize our business intelligence platform exactly as you like it. With around 1,000 unique applications available, the Appstore allows you to pick and choose the software that best helps you solve your company’s individual business probl...

Read More

How to Find the Perfect Color Scheme for Your App HOW TO FIND THE PERFECT COLOR SCHEME FOR YOUR APP

blog article

Nov 04, 2016

Color is an important part of our human experience, so it’s an incredibly useful tool for visual communication. A clashing color scheme can ruin an incredible concept, but working with the right palette will optimize a mobile app experience. People perceive color in different ways, with differ...

Read More

EASYQA: NEW WEB-BASED TEST MANAGEMENT TOOL TO IMPROVE SOFTWARE QUALITY EASYQA: NEW WEB-BASED TEST MANAGEMENT TOOL TO IMPROVE SOFTWARE QUALITY

blog article

Nov 04, 2016

Using test management tool is one of the most important aspects of a successful project. Quality makes a significant part in case of market’s overload of different software. Even if a group of developers comes up with and realizes a brand new and extremely useful idea, other developers will wo...

Read More

Create a New Space to Build Agile Testing Process with EasyQA CREATE A NEW SPACE TO BUILD AGILE TESTING PROCESS WITH EASYQA

blog article

Nov 04, 2016

Creating and managing agile testing process is always frightening as you never know what to start with and what you have to deal with. That’s why one always wants to begin with something comprehensible and easy to work with. Our test management tool EasyQA gives an opportunity to create and ma...

Read More

VIRTUAL REALITY APPLICATIONS IN MEDICINE TRANSFORMING HEALTHCARE WE ONCE KNEW VIRTUAL REALITY APPLICATIONS IN MEDICINE TRANSFORMING HEALTHCARE WE ONCE KNEW

blog article

Nov 04, 2016

Virtual reality is rapidly entering our lives. It is changing the way we interact, entertain and even how we are cured. This is the unique case when some tech invention is becoming that deeply implemented in healthcare as VR is. Virtual reality applications in medicine do the job any other kind of t...

Read More

The growth of ‘mHealth’, mobile for the healthcare industry THE GROWTH OF ‘MHEALTH’, MOBILE FOR THE HEALTHCARE INDUSTRY

blog article

Nov 03, 2016

‘mHealth’ is no longer just another buzzword but is predicted to gain a lot of momentum in the coming years. For the uninitiated, ‘mHealth’ is a term used to address any medical care accessed with the help of a mobile device. As per a report from World Health Organization (WH...

Read More

App Promo Videos – Unbeatable Strategy to Boost Conversion Rate APP PROMO VIDEOS – UNBEATABLE STRATEGY TO BOOST CONVERSION RATE

blog article

Nov 03, 2016

App Store Video is one of the latest and hottest trends in the sphere of app marketing. However, publishing a right app video on Play Store Video (Android) and App Preview Video (iOS) is a challenge to achieve. Primarily, very few people actually play the entire video while they land on an app store...

Read More

Tips for building better map-enabled mobile apps TIPS FOR BUILDING BETTER MAP-ENABLED MOBILE APPS

blog article

Nov 03, 2016

The Google Maps Library for Android allows you to show geographic locations in a graphical and interactive way giving a clear and simple interpretation of the information displayed in a map. However, displaying thousands of markers, the performance and user experience could be affected. In some case...

Read More

MICROSOFT PLANNER ROLLED OUT: COMPARISON WITH TRELLO AND ASANA MICROSOFT PLANNER ROLLED OUT: COMPARISON WITH TRELLO AND ASANA

blog article

Nov 03, 2016

Microsoft Planner, a new project management tool that helps teams track and collaborate on projects, has been recently launched for the Office 365 suite. The new app has been in the works since the last fall and is now available to all Office subscribers. The sweetener here is that Microsoft Planner...

Read More

DJI Mavic Pro Drone Offers Strong Competition To The Go Pro Karma DJI MAVIC PRO DRONE OFFERS STRONG COMPETITION TO THE GO PRO KARMA

blog article

Nov 02, 2016

Drone technologies are on a high today and at this point of time, there are currently quite a number of good and affordable drones on the market for anyone willing to give this latest technology a first-hand try. Chinese technology company Dà-Jiāng Innovations Science and Technology Co. Ltd o...

Read More

“Agile development methodology is not a choice anymore, it has become the only way to continuously improve” “AGILE DEVELOPMENT METHODOLOGY IS NOT A CHOICE ANYMORE, IT HAS BECOME THE ONLY WAY TO CONTINUOUSLY IMPROVE”

blog article

Nov 02, 2016

We used to, in the past, follow what is known as the traditional methodologies. We have come a long way since. Waterfall was one of the most popular methodologies wherein we first defined and documented the client requirements, then the architecture of the software is conceptualized and coding is do...

Read More

Managing development team – Useful tips for Project managers MANAGING DEVELOPMENT TEAM – USEFUL TIPS FOR PROJECT MANAGERS

blog article

Nov 02, 2016

If you’re a project manager and you don’t have the much technical experience yourself, you might be wondering how to avoid becoming that nightmare PM so many developers seem to disregard. The fact is that you don’t need to know how to code to understand how the people on your team ...

Read More

Android app shortcuts ANDROID APP SHORTCUTS

blog article

Nov 02, 2016

While I was exploring my new Pixel XL, one of the things I noticed while setting up the perfect home screen was a pop-up menu when long pressing on certain apps. This immediately piqued my curiosity so I went looking to see what this mystery menu was; and then I discovered app shortcuts. App shortcu...

Read More

Android app shortcuts ANDROID APP SHORTCUTS

blog article

Nov 02, 2016

While I was exploring my new Pixel XL, one of the things I noticed while setting up the perfect home screen was a pop-up menu when long pressing on certain apps. This immediately piqued my curiosity so I went looking to see what this mystery menu was; and then I discovered app shortcuts. App shortcu...

Read More

Secure Productive Enterprise: A Bundled Solution for the Digital Age SECURE PRODUCTIVE ENTERPRISE: A BUNDLED SOLUTION FOR THE DIGITAL AGE

blog article

Nov 02, 2016

We create content on desktop computers, share it with coworkers and partners across internal and external networks, and send it to our team members via messaging and collaboration tools. Employees regularly connect to enterprise information systems and databases from anywhere, at any time, via table...

Read More

Automating Infrastructure in Azure Government AUTOMATING INFRASTRUCTURE IN AZURE GOVERNMENT

blog article

Nov 01, 2016

This is an overview of a solution built by AIS with Microsoft for a federal client in the DC area. The client’s goal was to be able to automate the setup and takedown of virtual machine sandboxes on the fly. These sandboxes are used by the client’s developers to do security testing of th...

Read More

Mobile UI: Should You Follow the Guidelines? MOBILE UI: SHOULD YOU FOLLOW THE GUIDELINES?

blog article

Nov 01, 2016

High-quality mobile apps are rare and mobile games show the same trend. A survey shows that an app loses 77% of its DAUs on average within the first three days after installation. There are many factors  that determine success or a fiasco of an app and UI is one of them.Other research revealed ...

Read More

Hello Again – Apple Event Recap HELLO AGAIN – APPLE EVENT RECAP

blog article

Nov 01, 2016

The Apple event last week featured a major update for the Apple TV and introduced long-awaited hardware updates for the MacBook Pro line. The Apple TV’s got a new app – it’s called “TV”. It aggregates content from other apps to bring a more conventional television exper...

Read More

The end of apps? Multimodal UI and the future of mobile THE END OF APPS? MULTIMODAL UI AND THE FUTURE OF MOBILE

blog article

Oct 31, 2016

Every day people ask me questions like, “Where is mobile going?” “Aren’t apps a fad?” “Will everything go to the browser?” “Aren’t chatbots the future?” Humans interact with technology to do something better or faster. It’s that simpl...

Read More

The end of apps? Multimodal UI and the future of mobile THE END OF APPS? MULTIMODAL UI AND THE FUTURE OF MOBILE

blog article

Oct 31, 2016

Every day people ask me questions like, “Where is mobile going?” “Aren’t apps a fad?” “Will everything go to the browser?” “Aren’t chatbots the future?” Humans interact with technology to do something better or faster. It’s that simpl...

Read More

What You Need to Know to Put Your App in the App Store or Google Play? WHAT YOU NEED TO KNOW TO PUT YOUR APP IN THE APP STORE OR GOOGLE PLAY?

blog article

Oct 31, 2016

Let's imagine for a moment that your dream has come true: your app has been created, the development process is left behind as well as sleepless nights, everyday work, gallons of coffee and piles of cigarettes. The app that until recently used to live only in your imagination is now in your hand...

Read More

Top Money-Sharing Services and Apps TOP MONEY-SHARING SERVICES AND APPS

blog article

Oct 31, 2016

Take a look at our list of the best money-sharing solutions you can use to send money to your relatives and friends.

Read More

How We Built a Cross-Platform Event App…In Less Than a Week HOW WE BUILT A CROSS-PLATFORM EVENT APP…IN LESS THAN A WEEK

blog article

Oct 28, 2016

It all started with an email from a customer: They wanted an event app for an upcoming regional sales summit. The requirements fit the mold of a typical event app (session schedule and downloadable documents, photo sharing, surveys, sync with Outlook, etc.), but there was one small problem. The app ...

Read More

App of the Month: Anchor “Radio by the People” APP OF THE MONTH: ANCHOR “RADIO BY THE PEOPLE”

blog article

Oct 28, 2016

Are you fond of podcast recording and sharing of soundbites of your own talking? Seriously… then we are sure you didn’t miss Anchor. Or did you? Anyway, it’s never too late to plan out your next podcast by reaching out through a new app or platform. Undoubtedly, Anchor is one of t...

Read More

Why Apple’s MacBook Touch Bar was the right thing to do WHY APPLE’S MACBOOK TOUCH BAR WAS THE RIGHT THING TO DO

blog article

Oct 28, 2016

People love a Greek tragedy. Icarus has flown too close to the sun and tumbled to Earth. Apple has forgotten its core users and been eclipsed by Microsoft. The Touch Bar is a compromise between adding a touch screen on a MacBook and ignoring touch entirely.
These narratives are easy to sketch...

Read More

How to Pick the Right Name for Your Mobile App HOW TO PICK THE RIGHT NAME FOR YOUR MOBILE APP

blog article

Oct 28, 2016

What’s in a name? Everything. An app’s name is the central pillar on which all your other branding efforts are built, plays a key role in App Store optimization, and is often the first “test” your app has to pass with potential users. The name of your app needs to instantly c...

Read More

Everything You Need to Know About App Install Campaigns EVERYTHING YOU NEED TO KNOW ABOUT APP INSTALL CAMPAIGNS

blog article

Oct 28, 2016

It requires almost 7,000 downloads a day to get App Store ranked in the top 25 within the popular social networking category. To break into the top 25 apps overall, you’re looking at more than 35,000. Per day. Paid app install campaigns help mobile apps get over the initial nearly impossible h...

Read More

7 Reasons Why Your Association Needs a Mobile App 7 REASONS WHY YOUR ASSOCIATION NEEDS A MOBILE APP

blog article

Oct 27, 2016

Your association strives to bring great value to its members–news and information resources, community management, social networking, opinion research, fundraising, public relations, and so much more. But, if your association is like most, it is delivering its value via email and website at be...

Read More

Top-Notch Video Streaming in Your Unity Mobile App TOP-NOTCH VIDEO STREAMING IN YOUR UNITY MOBILE APP

blog article

Oct 27, 2016

Today’s audiences are increasingly seeking better options for more immersive entertainment experiences. By providing this kind of viewer involvement, VR and AR are quickly becoming one of the hottest technologies of the decade, with the projected revenues expected to reach as much as $150B by ...

Read More

What are IT Pros scared of? WHAT ARE IT PROS SCARED OF?

blog article

Oct 27, 2016

Just before the Halloween, we have surveyed Ciklum’s employees on their hopes & fears. The answers on “What are IT pros scared of?” by the most demanded tech specialists may surprise you. IT geeks are not afraid of the things the other human beings are normally scared of. Tech ...

Read More

Boo! 10 Apps That Celebrate the Halloween Spirit BOO! 10 APPS THAT CELEBRATE THE HALLOWEEN SPIRIT

blog article

Oct 27, 2016

Four days to go…. Halloween’s just creeping around the corners!

Festive season is ON!

What have you planned to make a big bash? Lemme me guess. Ummm… Creepy costume? Or spooky make-up? Or scary decorations at home and office? Or maybe a horror-themed...

Read More

When Toasters Crashed the Internet: What You Should Know About the Recent DDoS Attack WHEN TOASTERS CRASHED THE INTERNET: WHAT YOU SHOULD KNOW ABOUT THE RECENT DDOS ATTACK

blog article

Oct 26, 2016

As the dust settles around last week’s distributed denial of service (DDoS) attack, IT experts and many affected companies will note Friday, October 21, 2016 as the date of a watershed event. It is the first time that the Internet of Things (IoT) was used in a widespread cyberattack. Where are...

Read More

Blackstone Awarded Contract to Drive Digital Transformation at DHS BLACKSTONE AWARDED CONTRACT TO DRIVE DIGITAL TRANSFORMATION AT DHS

blog article

Oct 26, 2016

Blackstone Technology Group is proud to announce that it has been awarded a professional services contract to support the Department of Homeland Security’s Office of the Chief Technology Officer (OCTO) to engineer the digital transformation of the department. “This represents a significa...

Read More

Facebook launches standalone app for Events FACEBOOK LAUNCHES STANDALONE APP FOR EVENTS

blog article

Oct 25, 2016

Every morning I wake up, the first thing that I check on my smartphone is if Facebook has announced a new feature/ app. I know of the various hazards of being addicted to smartphones but blame it on Facebook to launch something new after every few days. It came as no surprise when Facebook launched ...

Read More

UserTesting.com, I think we should see other people: our criteria for a useful usability tool USERTESTING.COM, I THINK WE SHOULD SEE OTHER PEOPLE: OUR CRITERIA FOR A USEFUL USABILITY TOOL

blog article

Oct 25, 2016

Our user-centered focus is paramount here at WillowTree. What good is an app, after all, if it doesn’t serve and delight its users? That’s why our testing process is designed with a series of user checkpoints. We want to make sure we’re delivering a product that results in satisfac...

Read More