Security

November 25th, 2017 by

We are in the midst of an exciting Digital Transformation era wherein the enterprises across all sectors are at speed…

November 17th, 2017 by

https://youtu.be/7Z-BRgPcBDQ The value is in the data You might have heard this sentence many times. Generating and converting data is…

November 15th, 2017 by

Last week I received an e-mail from the design firm Ideo. Last year I did a couple of online courses…

September 26th, 2017 by

In 2010 Steve Jobs posted his manifesto “Thoughts on Flash” as a response to the criticism of Flash not being…

Blockchain

May 31st, 2017 by

Two of the most talked about technologies in today's world are Blockchain and IoT. They are at the initial stage…

April 20th, 2017 by

In the first article of this series, I discussed the outstanding user experience Universal Studios provides to its customers while…

April 19th, 2017 by

In the first article of this series, I discussed the outstanding user experience Universal Studios provides to its customers while…

April 18th, 2017 by

In my previous article, I discussed the outstanding user experience Universal Studios provides to its customers while maintaining an extremely…

April 17th, 2017 by

Too often we ignore user experience when it comes to security features, because “that's just the way it has always…

March 24th, 2017 by

Now that you understand where a security architecture starts, it is time to look at the full cycle of Security…

March 23rd, 2017 by

It´s not that easy to start creating a Security Architecture when it’s hard to define it in the first place.…

March 22nd, 2017 by

In a recent client meeting when we started discussing 'Security Architecture', I came across interesting views of what Security Architecture…