Database Security in Cloud Environment

Cloud computing has the market divided into two groups. There are the proponents of cloud and then there are the opponents of cloud. The cloud proponents have always sung praises about cloud’s scalability, ease of deployment, and reduced cost of IT ownership. But the opponents have always cautioned against security issues of cloud. And with Amazon’s not-so-distant cloud outage, concerns over cloud’s dependability and security have once again reared their head.

Read More Database Security in Cloud Environment

XII Commandments for Successful Outsourcing

12 commandments for Successful Outsourcing

Outsourcing is more than just a fad now. It’s a strategic decision made by enterprises to realize business goals. During the initial days, outsourcing found its high in the obvious cost savings it delivered. But apparently this cost cutting turned out to be the nemesis of enterprises as they were left high and dry by their cheap service providers with no business results on hand. And the market realized that outsourcing was more than just cost containment. Today, outsourcing is powered by a new philosophy that stresses on quality, reliability, and dependability in addition to cost reduction.

Read More XII Commandments for Successful Outsourcing

Product Development – Innovate or Fabricate?

Product Development - Innovate or Fabricate

In the past, I have contributed on topics like innovation management and open innovation. I have always been a big fan of innovation. But then recently I stumbled upon the term “fabrication”. I was talking to this friend of mine who works in the R&D department of an IT company. We were debating about product lines and how to expand or diversify them. As the debate heated up, he very passionately announced, “I would rather innovate than fabricate!”

Read More Product Development – Innovate or Fabricate?

MS Commerce Server & Its Hard to Beat Attributes

Ms Commerce developement

People are buying online. All our surveys and contemporary research show that the number of people buying products and services online is on an increase. And along with this comes the deluge of software packages that assist in developing e-commerce websites.

Now these software packages are good for developing platforms that facilitate online trade and commerce. They do an excellent job when it comes to putting together an e-commerce website that sells products and services. But that’s all they are good for – selling. If you are looking to develop e-commerce applications that sell and deliver memorable experience then these software packages are no good. What you need here is Microsoft’s Commerce Server.

Read More MS Commerce Server & Its Hard to Beat Attributes

Information Technology Audit

Secure IT infrastructure

In March 2011, RSA – EMC’s security division – sent shockwaves through the industry as it announced a sophisticated cyber-attack on its SecureID system. Theft of unspecified information from SecureID has left marring scars and lot of red faces. But at the same time it has raised a lot of questions for IT industry as a whole.

Prior to the attack, SecureID was a benchmark in two-factor authentication system. But the attack proves that just having a strong security mechanism is not enough. We cannot just deploy a security system and hang up our boots expecting it to take care of everything. We have to be vigilant at all times and keep testing the security of our IT setup. In other words, we need to regularly conduct an IT audit.

Read More Information Technology Audit