Type to SearchView Tags
Technology | Engineering R&D

Category blogs - Featured

Blog Category Listing

Keycloak Multitenancy
46

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
The Key to Successful Should Costing Fact Based Supplier Negotiations
106
People settle differences through a common method called Negotiation. It is a process by which agreement or compromise is reached thereby avoiding argument and dispute. When there is commitment to the contract with coverage of all aspects mutually...
Building a Future-Proof  Fibre Network with HCL - Part 2
71
The Communication Service provider landscape is preparing itself for digital transformation. As more and more devices, people, and things connect, the demands for fast, reliable connections continue to increase. To unleash value creation, new...
Approach of using managed under unmanaged environment
135
In Automation testing, setup will have its own tool to test the software quality based on software requirements. While creating this automation tool, if the tool run and developed in high level programming environment ( like C#, .Net, etc ) then it...
Building a Future-Proof Network with Fibre
107
5G is all about delivering all the bandwidth that customers want for all their information needs. 5G will open the avenues towards many possibilities which will lead to explosion of information traffic be it voice, data or video. This flood of data...
Containers and Virtual Machines – Essential to 5G
151
To reap benefit of 5G, networks need to be more flexible and agile and containers are the key as they will provide improved efficiency as well as reduced cost. However, every operator will evolve at its own pace and will have its own cloud...
5G Revolution is beyond the corner
88
Imagine a world where you can have a 3D full immersion conference call with your colleagues wherever they may physically be in the world…Imagine a world where you can easily live stream on Instagram, a goal scored by your favourite player during...
AI applications
695
Adoption of AI is becoming a common phenomenon across the industry. Companies are in different stages of AI maturity and depending on the level of adoption they are seeing varying levels of impact. While there is lot of excitement in the rapid...
Partner Eco System
83
A platform enabled ecosystem of partners where interaction takes place in multiple ways and value creation is done through collaboration and co-creation is the ideal means to foster a relationship. The positive impact generated by such an ecosystem...
Elatic vs Solar
14,727

Jul 26, 2016

ElasticSearch Vs Solr

Anil Rawat Lead Engineer , Engineering R & D Services

In big data search , primary choices are Elasticsearch and Solr that are open source enterprise search platforms and have the ability to perform full-text searches and faceted searches. In this blog, we take a deeper look and compare these two...
JProfiler
10,925
JProfiler is a Java profiler tool and is useful for developers/testers as it can be used to analyze performance bottlenecks, memory leaks, CPU loads and resolve threading issues.
Right Sensors for Object Tracking
6,272
Choosing right sensor for tracking objects is really important and there are many criteria to determine which sensor should be used. Read more on how sensors are classified based on property:
Keycloak Multitenancy
46

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
Major Applications of Embedded Systems
3,201
Embedded systems have become an integral part of our daily life.Embedded systems monitoring plays a crucial role in the overall success of the entire system .Read the blog to know various techniques to monitor embedded systems
WBEM
1,128

May 07, 2018

Web Based Enterprise Management

Sachin Sharma Technical Manager

WBEM being  a Set of Management and Internet Standard technologies unlike its predecessor which are protocols. It helps WBEM to be more protractible and hence simplify and promote the development of non-aligned platforms, tools, changeable...
Approach of using managed under unmanaged environment
135
In Automation testing, setup will have its own tool to test the software quality based on software requirements. While creating this automation tool, if the tool run and developed in high level programming environment ( like C#, .Net, etc ) then it...
Multihoming
1,804

Apr 15, 2016

What is Multihoming?

Jayaramakrishnan Sundarraj Senior Technical Lead

Ideation
1,520

Nov 02, 2017

Ideation Techniques- Part 2

Sanjeev Purohit Group Manager

In continuation of the previous blog Promoting and Nurturing Innovation and part 1 of ideation techniques we will go through other advance techniques like SCAMPER, Mind Map, Reverse thinking for idea generation. 

MongoDB in Big Data Analytics Applications
Raghavendra Ganji - Big Data Analytics CoE | March 18, 2016
3380 Views

bigdata

Automation – A Requirement or Necessity?
Rabia Sharma | March 18, 2016
891 Views

Automation

In today’s world, where things keep on changing on daily basis and we sometimes find it hard to adjust with the changing needs and scenarios, automation does play an important role for continuous delivery. QA being the gatekeepers, are not only limited to perform manual testing but also play an important role in designing frameworks and implementing test scenarios programmatically.


Improving Efficiency Of Vulnerability Assessment In NFV Based Cloud Networks
Saurabh Sharda - Senior Technical Specialist | March 3, 2016
843 Views

The concept of virtualizing the network equipment is picking up fast. Popularly known as Network Function Virtualization (NFV), this concept aims to virtualize network functions by running them as software on standard server grade hardware and do away with previously used proprietary equipment. The Specification group for NFV is being worked upon by the European Telecommunications Standards Institute (ETSI) and is made up of representatives from several leading telecommunication industries.