Adoption of digital technologies, especially cloud, is at an all-time high and businesses are increasingly demanding managed service providers and IT organizations to cater to their dual-speed IT need...
Blog | Published Date - Jan 24, 2017
We no longer live in a world where people debate if the cloud is right for them or not. Cloud has become a first class citizen. The word cloud is used in this article to indicate a compute model and ...
Blog | Published Date - Oct 05, 2017
.Net needs no introduction and is well known among the developer community. Over the years, we have had several versions of .Net Framework. However, .Net Core and .Net Standard are new entrants to the...
Blog | Published Date - Mar 23, 2018
There are multiple blogs available on how to integrate Azure Multi-Factor Authentication (MFA) with on-premise applications such as ADFS, RD Gateway, IIS, etc. But in this blog, I’m going to call ou...
Blog | Published Date - Apr 24, 2018
Moving to the cloud can be a stressful process involving a myriad of steps. Be it ISVs (independent software vendors) or large information technology firms, migrating to the cloud is always coupled ...
Blog | Published Date - Dec 09, 2021
As cloud adoption gains momentum in the energy and utilities sector, it is important for CIOs & CISOs to understand the security and compliance implications of cloud migration. Cloud services are ofte...
Blog | Published Date - Jul 26, 2022
Taking lessons learned from a Bacon-and-egg sandwich
You have perhaps heard this business story before:
Question: In a bacon-and-egg breakfast, what's the difference between the Chicken and the Pi...
Blog | Published Date - Jun 06, 2022
Introduction:
As FinOps matures, there is a growing interest in Unit Economics and the Cloud Efficiency Rate (CER) metric. This metric is being heavily promoted by some FinOps tool vendors as well. W...
Blog | Published Date - Apr 30, 2024
Current State of Affair
Be it Sony or Colonial Pipeline attack, various organizations have got caught like a sitting duck at the mercy of attackers. Even after paying the ransom, some of them could n...
Blog | Published Date - Sep 27, 2022