In March 2011, RSA – EMC’s security division – sent shockwaves through the industry as it announced a sophisticated cyber-attack on its SecureID system. Theft of unspecified information from SecureID has left marring scars and lot of red faces. But at the same time it has raised a lot of questions for IT industry as a whole.
Prior to the attack, SecureID was a benchmark in two-factor authentication system. But the attack proves that just having a strong security mechanism is not enough. We cannot just deploy a security system and hang up our boots expecting it to take care of everything. We have to be vigilant at all times and keep testing the security of our IT setup. In other words, we need to regularly conduct an IT audit.
Read More Information Technology Audit
Ever heard of the term ‘IT Debt’? All those who have been following Gartner, would have an idea what it means. For all those who are not Gartner fans here is what it means. IT Debt is the cost of maintenance backlog of an enterprise. It’s the cost of upgrading enterprise applications to their latest releases and operating versions. In other words, it’s the cost of bridging the gap between the current state of IT architecture and its ideal state.
Read More Application Overhaul – A Strategic Level Initiative
Over the past few years, IT industry has experienced a booming demand for PHP professionals. PHP seems to have won the hearts of IT professionals and market alike with its robust development potential. An increasing number of customers are looking to hire PHP developers for their web application development projects. And is it hard to find a PHP developer for hire? Absolutely not! One search on Google and you end up with a long list of companies offering PHP developers on hire.
Read More Tips for Hiring PHP Developers
Our modern day business scenario has this uncharacteristic need for a dispersed yet connected workforce. We want our people to be proactive and reach out to the customers but without losing touch with the enterprise. We want them to operate from remote locations while still having access to enterprise information. As a result, we have people carrying out communications via emails, phones, video conferences, Skype, instant messengers, VoIP, fax, social networks, and the list goes on.
Read More Unified Communications
A few days back, I came across news of a raging storm uprooting some giant oak trees and blocking off traffic for several hours. Initially, I didn’t bat an eyelash or gawk at nature’s fury. But then a very quirky thought came to my mind. I thought ‘how come I have never read about bamboo trees getting uprooted’. The answer was staring right back at me. Bamboo trees survive the worst of storms because of their agility and ability to adapt.
We as enterprises need to be more like bamboo trees and less like oak trees. The more rigid we are in our ways and processes the more likely we are to lose our footing. But if we are open to new technologies, processes, and experiences, we have a far better chance of surviving and thriving.
Read More Technology Change Management