Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Month: March 2015

Identity and access management

Disruptive Technology This Week

What the world is talking! Disruptive technologies, the 3rd Platform, SMAC plus – these are changing lives in more ways than we know of. Everyday. Around the world. Here’s a roundup of what made it to the news on disruptive technology this week. How disruptive can disruptive technology be? As per this LSE report, the […]
Read Now
technology

Role of shift left strategy & Automation in Service Management

Organizations that deliver technology services to consumers forge strategic partnerships to diversify their service offerings and increase market penetration and profitability. Service quality and delivery need to be able to scale rapidly to meet customer requirements while remaining agile and innovative. I am sharing my point of view for enabling organizations to apply shift-left strategy […]
Read Now
technology

Why is Industrial Networking different?

We often consider Industrial Networking to be entirely different from a conventional process. This document will describe factors that make industrial networking different. There are two factors which make industrial networking different; they are environmental & types of communication. Let’s look more at these factors: 1. Environmental: When we talk about industrial networking, it includes […]
Read Now

IAM – Who has access to what information?

An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords, identities and directories. However, the ultimate motive of an Identity and Access Management practice is to […]
Read Now

The Importance of Black Box Testing

When testing software, it’s necessary to employ a methodology that’s as free from bias as possible. Development can be easily influenced by giving the tester too much information about the development process itself. The best-case scenario is that the tester is simply given a task to accomplish using the software in question, and no guidance […]
Read Now

Archives

Categories