Security Testing – Considerations, Best Practices & Tools

Security testing is a variant of different types of testing methods and approaches where testing is carried out just to ensure that the product, application or the system under test doesn’t have security related loopholes which might result into loss of valuable information in the hands of those unauthorized. This would cause a serious threat to the organizations. It can
read more

How to Run Commands on Remote Windows Machine Using Python Paramiko Module

Paramiko (Python Module) works on SSHv2 protocol. It provides both client and server functionality. Paramiko module can be used if SSH server is running on the target machine. Target machine can be Linux or Windows system. For Linux systems, SSH packages are already available hence we can use it easily. But for Windows systems, SSH package
read more

Top Considerations for Protecting Data Operations in the Cloud

Cloud computing is emerging technology in today’s world. We can get any kind of applications or services easily without spending any time over Internet. These kinds of business model do not require any upfront investments. It is low the cost, high performance and high availability with good tech support makes your business run without
read more

Getting Started with Network Function Virtualization (NFV)

First question that comes to mind is whether SDN and NFV are same or different or related technologies? SDN and NFV are independent technologies. SDN creates a separate management plane which sits a floor above the traditional control plane so as to get wider view of the network and orchestrate using network protocols like OpenFlow. So, with the SDN approach
read more

Data Center Automation: Gateway for Smarter, Efficient and Successful Business Solutions

Gone are the days when we Data Center organizations needs to deploy thousands of employees and had to put on the huge amount of investment towards the maintenance of their Data centers. Today’s technological advancement has moved to data center automation and this blog will talk about that. Data Center automation is an initiative to achieve automation process
read more

Securing Docker Containers

Docker is a great technology which simplifies the development and deployment of distributed applications. While building dockerized applications, security at various points needs to be considered. Due to lack of CPU/Hypervisor, Docker security is fully implemented in Software. Let us look at all prominent security aspects of kernel and container applications
read more

REST API Security – Best Practices

Software industry has been undergoing change at a rapid pace for quite some time now and so are the ways to design, develop, deploy and support software applications. From large mainframe systems to microservice architectures, the industry sure has travelled a long journey (or rather still continues to do so). And in the process, software design
read more

What is Hybrid Scalable Converged Unified Storage?

Phew! The technical jargons are going the medical naming convention, isn’t it? Practically, they all can be separated to be on their own, so let’s define them separately & then combine them together to see what we get. Layman definition of the individual Terms: Hybrid: It literally means many things build into 1 single Unit, Scalable: It means
read more

Key UX Design Trends for 2017

Companies have now started realizing the value of keeping their users happy. Right from a startup to fortune companies have shown attention towards user experience and interface recently. I believe “User Experience” is not a rocket science to understand and implement, if you thoroughly understand your user’s expectations.
read more

Basics of the Internet of Things

We live in the era of technology, from making payments to opening doors, everything is automated and wired with technology. Terms like smart lock, smart car, smart television, smart phone, etc. have become quite common. These ‘smart’ devices have enabled the advent of the Internet of Things, commonly referred to as IoT. However, new technologies
read more