Type to SearchView Tags

Category blogs - Featured

Blog Category Listing

Application Migration Decision Tree
135

Jul 28, 2021

Migration to M365/O365: A Decision Tree

Subhasis Karmakar Senior Technical Manager, Digital & Analytics

Enterprises have hastened their cloud deployment plans with a desire to equip their office-based workers, who turned into remote workers overnight, with technologies to support agile work. Thus they intend to undergo cloud migration, whether from on...
Catapulting a New Era of Telecom Service
65
In this blog, Rajesh talks about IBM Cloud for Telecommunications how it fulfills the current and future needs of telecom providers. It combines IBM’s expertise in the telecommunications domain and experience in building industry-specific...
Application Perspective of Cloud
147
This post is a novel try to draft about two major cloud PaaS and generic overview of migrating existing app from pcf to openshift. The blog is for those who are at very initial phase of discussing about planning & strategy for app migration....
How AI is playing a role at Investment Banks and Capital Markets Trading Desks
42
The LIBOR scandal which made headlines in 2012 revealed traders at major international banking institutions in the U.S. and the U.K. acted in collusion to manipulate the London Interbank Offer rate (LIBOR). This revelation which was thought to...
Cyber Resilience: Protecting What Matters Most
101

Jul 13, 2021

Cyber Resilience: Protecting What Matters Most

Anand Swamy SVP, Strategic Ecosystems

Cyber-attacks are a pressing concern for businesses in the age of rapid digital transformation.
Accelerate Clinical Research by leveraging patient care data
43

Jul 12, 2021

Accelerate Clinical Research by leveraging patient care data

Ajay Tomar Practice Director, Life Sciences & Healthcare,

The society is witnessing a once-in-a-century kind of event that is affecting millions of lives globally – the COVID-19 pandemic. Scientific response to such pandemics in the past took a few decades to reach a large section of society at a global...
Cyber Resiliency with HCL Rubrik Solutions
192

Jul 09, 2021

Cyber Resiliency with HCL Rubrik Solutions

Sarthak Sharma Product Management Group, NGDC Practice

This blog details the impact of cyberattacks on digital enterprises, particularly those that have occurred in various types and forms post the onset of the pandemic. To counter the threat of cyber-attacks and enable organizations to adopt the...
How to assess your organization's automation maturity
40

Jul 07, 2021

How to assess your organization's automation maturity

Rohit Kumar Ranjan Digital Transformation Consultant

This article tells us about the importance of analyzing the business goals and automation readiness to progress in the RPA adoption cycle. The blog tells us about the different levels of organizational preparedness and the associated RPA...
Private Equity Deal Origination using new technology solutions and AI
95

Jul 02, 2021

Private Equity Deal Origination using new technology solutions and AI

Kinsuk Mitra Director of Finance, Risk and Compliance

Deal sourcing or Origination is a process used by Investment bankers, VC, PE and Finance professionals to identify investment opportunities in the market. Investment firms need to do this to ensure a large volume of deals is obtained in a given...
Enterprise Service Bus
32,472
The recent buzz around Enterprise Service Bus (ESB) is only matched by the ambiguity with which the term is defined. This blog provides an overview of the basic terminologies, architecture, and core functionalities around the concept of anESB...
Keycloak Multitenancy
1,209

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
Operational Acceptance Testing (OAT) and Its Advantages for Stakeholders
18,341
Overview Commonly referred to as OAT, Operational Acceptance Testing is the testing done before the solution is released or deployed, just after the execution of user acceptance testing (UAT).  The OAT environment is called the ‘pilot’ or ‘pre...
Elatic vs Solar
15,612

Jul 26, 2016

ElasticSearch Vs Solr

Anil Rawat Lead Engineer , Engineering R & D Services

In big data search , primary choices are Elasticsearch and Solr that are open source enterprise search platforms and have the ability to perform full-text searches and faceted searches. In this blog, we take a deeper look and compare these two...
SOFR and Libor
6,495

Jan 22, 2020

Transition from LIBOR to SOFR

Kaviya V Senior Business Analyst

Starting around 2005, few banks around the world manipulated the LIBOR (London Interbank Offered Rate) benchmark rate for their own profits (from trades and to show that they are more creditworthy) which came to light in the year 2012.  After...
AEM
11,028
Adobe Experience Manager 6.4 helps build an experience manager site that contains a header, a body, and a footer section. In addition, users can learn how to promote reuse of experience manager content by: • Leveraging editable template structures...
Structure Based or Whitebox Testing Techniques
21,422
There are various types of software testing techniques. Each individual technique is good at finding a particular type of defect. Each testing technique falls into a number of different categories.
Application Migration Decision Tree
135

Jul 28, 2021

Migration to M365/O365: A Decision Tree

Subhasis Karmakar Senior Technical Manager, Digital & Analytics

Enterprises have hastened their cloud deployment plans with a desire to equip their office-based workers, who turned into remote workers overnight, with technologies to support agile work. Thus they intend to undergo cloud migration, whether from on...
Node Network
3,124
An end to end IoT system includes various networks in an IoT system, type of devices and the applications running in those networks. Constrained node network is deployed as an edge network in an IoT system. There are various classes of constrained...

MongoDB in Big Data Analytics Applications
Raghavendra Ganji - Big Data Analytics CoE | March 18, 2016
3478 Views

bigdata

Automation – A Requirement or Necessity?
Rabia Sharma | March 18, 2016
919 Views

Automation

In today’s world, where things keep on changing on daily basis and we sometimes find it hard to adjust with the changing needs and scenarios, automation does play an important role for continuous delivery. QA being the gatekeepers, are not only limited to perform manual testing but also play an important role in designing frameworks and implementing test scenarios programmatically.


Improving Efficiency Of Vulnerability Assessment In NFV Based Cloud Networks
Saurabh Sharda - Senior Technical Specialist | March 3, 2016
895 Views

The concept of virtualizing the network equipment is picking up fast. Popularly known as Network Function Virtualization (NFV), this concept aims to virtualize network functions by running them as software on standard server grade hardware and do away with previously used proprietary equipment. The Specification group for NFV is being worked upon by the European Telecommunications Standards Institute (ETSI) and is made up of representatives from several leading telecommunication industries.