Time-traveling back to the 1995 software development industry

1995-on-Back-to-the-Future-style-flipboard

Remember the heady days of 1995? Toy Story was released, Jagged Little Pill was the album of the year, The Grateful Dead disbanded, this time for good. For the tech industry, eBay was founded (“an online flea market”), and Windows 95, Java 1.0, and JavaScript (no relation) were all released. There was also a book published, Software […]

Winning strategies for using open source and intellectual property

The terms “open source” and “intellectual property” (IP) appear, on the surface, to be opposites. The purpose of this blog is to examine this and understand how and when to use open source and IP. At the simplest level, IP in a corporation means that output created by employees is owned by the organisation, and […]

What’s going on with Intel and OpenStack?

Is Intel backing away from the OpenStack Infrastructure-as-a-Service (IaaS) cloud? Good question, but I don’t see it happening myself. The story that questions Intel’s commitment to OpenStack was sparked by news that Intel was pulling out of its Rackspace partnership, the OpenStack Innovation Center. This was a software-testing project meant to encourage the use of OpenStack in the enterprise. […]

Technology a key component to surviving in the modern reinsurance market

At a recent meeting of a group of insurance and reinsurance industry leaders in Bermuda, we discussed market conditions such as innovation, technology change and regulation. Technology was identified as the most powerful tool to navigate through a storm of modern business challenges. The continuing soft market, increasing competition from third-party capital such as insurance-linked securities (ILS) and […]

Feasting your programming appetite with microservices

ITIL and DevOps CSC Blogs

I have been coding for more than 25 years and have used more than 18 different programming languages (and their associated frameworks), spanning every programming style from simple scripting, to procedural, to objected-oriented, to dynamic and functional — which is more attractive to the software engineering community these days. Let me confess, every time I […]

Social engineering: Hacking the human mind

Social engineering is a method to manipulate people into doing something, such as divulging confidential information. It could be seen as the hacking of the human mind. Compared to, for example, software, the human mind has far more vulnerabilities that are significantly simpler to find and exploit since they do not require any special expertise like code or computer language. […]

Puppet: One of the best cloud DevOps tools

Devops tools CSC Blogs

Anyone can set up and run a single server instance on a cloud. That’s easy. To set up and manage multiple server instances that can efficiently and automatically shift gears to match the rise and fall of user demand? That’s hard. It requires DevOps tools such as Puppet. Puppet according to RightScale’s 2016 survey of […]

Driving the digital vehicle

It’s not just central locking systems, power mirrors or the 18 electromechanical actuators one German luxury car had built into the driver’s seat as early as 1985. The majority of vehicle processes have been managed electrically/electronically for decades. While today E/E components make up 20% to 40% of manufacturing costs of a car, this proportion […]

Security as a Service: Do you get the service you expected?

Security as a Service CSC Blogs

Following this article about why organizations should outsource security services, in this post I offer some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot of considerations and arrangements. While this post is not comprehensive, it offers important action items to consider when searching for a new security service provider. […]

Security as a Service: How to get the service you expect

Security provider contract tips CSC Blogs

This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are, even when all necessary steps were taken to ensure a successful project/service. Reasons for External Security Service Provider Let’s […]