Nov 14, 2017
Within IT organizations or any other industry, automation is the new entrant and is here to stay!Robotics Process Automation – giving way to Artificial Intelligence? A speedy approach? Or error free technology? Or Productivity?According to industry statistics, 30-40% of project costs are rework. Automation is a natural er...
read moreMar 04, 2015
We have all worked on scenarios where we grant system object access to certain users based on the parameter, provided by them. Sometimes, the user just changes the parameter passed as input intelligently, and she gets access to some restricted documents or db data.For example, you should not be able to see your manager’s review ...
read moreAug 28, 2014
When an organization built and controlled its own networks, it was imperative that the security would vary and was largely dependent on the organization requirements. But, with a cloud infrastructure setup, the security methodology and requirements change significantly. And many of those who try to attempt to tackle the issue th...
read moreMar 28, 2014
Speaking of security concerns with Infrastructure as a Service provider, there are many who believe cloud service providers will provide better security, and there are others who believe there will be greater risks associated with cloud usage, such as data breaches and cloud services abuse. There are many myths associated with c...
read moreMar 21, 2014
Speaking of security concerns with Infrastructure as a Service provider, there are many who believe cloud service providers will provide better security, and there are others who believe there will be greater risks associated with cloud usage, such as data breaches and cloud services abuse.There are many myths associated with cl...
read moreSep 11, 2013
Cloud computing comprises broadly of Public, Private and Hybrid clouds. Healthcare companies have been predominantly using private clouds in the past to adhere to prevalent data security norms. HIPAA and HITECH acts require that electronic protected health information (ePHI) be stored and processed in a secured manner and not sh...
read more