Blogs

Contact Us
Please Contact Us

What is driving the Fourth Industrial Revolution (4IR)?

profile picture
By Rajesh Dangi
July 05, 2018
FWaaS

The fourth industrial revolution, I4R is a reality and encompasses multi-fold impact to our lives actually due to digital revolution, but the phrase 'fourth industrial revolution' was first used in 2016, by World Economic Forum, which he describes how this fourth revolution is fundamentally different from the previous three, which were characterized mainly by advances in technology. However, this fourth revolution, impacts our lives much more than before transforming each and every aspect of the digital world. The endeavour where advanced digital technologies such as big data, artificial intelligence, robotics, machine learning and the internet of things interact with the physical world and create an ever lasting impact to our health, our interaction with one another and how we work or do business, In fact the very definition of work itself is getting redefined as our contribution to social, economic and environmental aspects or the outcomes we desire.

Read More

FWaaS, Explained!

profile picture
By Rajesh Dangi
June 18, 2018
FWaaS

FWaaS, Firewall as a service is simply network zoning with firewall partitioning that is virtually isolated and logically grouped policies and rules thereof, each virtual Firewall has multiple such policies tied down to multiple rules (Read, Access control lists, i.e ACLs) thus making it a great proposition as an optimized service running on physically shared devices or cloud instances going completely virtual in a revolutionary way of delivering firewall and other network security capabilities as a cloud subscription service.

Read More

Hyperscale or Hyperconverged Infrastructure, Simplified!

profile pictur
By Rajesh Dangi
June 1, 2018

Modern application and workloads are much more demanding in nature and getting liberated from the clutches of legacy layered stacks. The evolution of the compute following data, runtime execution of code and dynamic assemble of IT infrastructure resources making everyone rethink on their strategies of application deployments. Each and every element of the ecosystem is getting challenged to solve the issues learned in the past. Be it availability, scalability, multi-tenancy, security, integrity etc of the workloads running from any location, cloud, edge around the globe.

Read More

Serverless Computing, Simplified!

profile pictur
By Rajesh Dangi
May 23, 2018
Serverless Computing

No kidding, The serverless is actually not actually serverless, it certainly needs the underlying infrastructure such as compute, memory and storage but the pains of managing this infrastructure and capacity thereof is totally outsourced and managed by your cloud service provider, It is thus all about compute runtime, used for modern distributed applications that significantly or fully incorporate third-party, cloud-hosted applications and services, to manage server-side logic and state and most of times don't even provide storage. (its persistent cache from microservices / neighboring pods that's largely replacing the working data and stickiness to transactions)

Read More

Data Modeling, Simplified!

profile pictur
By Rajesh Dangi
May 16, 2018
Data Modeling

A data model is a design for how to structure and represent information driven by the data strategy and thus provides structure and meaning to data.

As a first step a "Data model theory" is coined and then translated into a data model instance. Such model of required information about things in the business or trade, usually with some system, context in mind, further

Read More

GDPR - Clock is ticking!

profile pictur
By Rajesh Dangi
May 2, 2018
GDRP

Come 25th May 2018, companies that have customers in EU and/or part of value chain that caters to EU customers will need to be on their toes, those who haven't been preparing for the past couple of years will now face challenges.

Read More

Data Archival-Strategic Importance!

profile pictur
By Rajesh Dangi
April 23, 2018
Data Archival-Strategic

While we continue to discuss, datafication, role of active data and data protection strategies around it, it is imperative to revisit the Data Archival and governance. Most of the businesses today have one way or another to maintain their data archives but in reality, the effectiveness of archival and qualitative approach on archival still stone-age. Don't believe me, let us dwell more and talk about strategy, best practices and techniques deployed for data archival. The topic warrant this discussion due to GDPR and associated impact on organizations who still might be struggling to meet both ends meet! i.e. Governance and BAU ( Read, business as usual) ..

Read More

Protecting the Active Data – Strategic Insight!

profile pictur
By Rajesh Dangi
April 16, 2018
GI-SimplifieGd

Growing concerns on the data governance and the recent breaches call out for insight into the most valuable asset for any organization, Data.

Although data governance spans out to availability, usability, integrity and security of the data as a whole, we would touch upon the “active data? of the organization and dwell upon the key challenges of managing this active data, key challenges and strategies around the risk management thereof. The ILM (Information lifecycle management) is a well-known framework explaining the active data and role of the same in overall digital asset management.

Read More

BI, Simplified!

profile pictur
By Rajesh Dangi
March 08, 2018
GI-SimplifieGd

Business intelligence (BI) has two different meanings related to the use of the term "intelligence", first is the human intelligence capacity applied in business affairs/activities and the second relates to the intelligence as data assets i.e. information valued for its currency and relevance.

Read More

Datafication...an outlook at our data assets!

profile pictur
By Rajesh Dangi
March 02, 2018
Datafiction

Datafication (also referred as Datafy) is a modern technological trend turning many aspects of our life into computerised data and transforming this information into new forms of value, says Wikipedia. Today all aspects of our life is surrounded by multitude of technologies that generate data.

Read More

GDPR, Quick insight on the impact on APAC business entities!

profile pictur
By Rajesh Dangi
February 09, 2018

What is GDPR?

The General Data Protection Regulation (GDPR) is a regulation to strengthen and unify the data protection of all EU citizens / residents by giving the choice and control of use of their personal data usage, processing and storage by the data controller (an organization that collects data from EU residents) or processor (an organization that processes data on behalf of data controller e.g. cloud service providers) or the data subject (person) is based in the EU. It also applied to organizations based outside the European Union if they collect or process personal data of EU residents. This regulation was adopted by European Parliament, the council of European union and European Commission on 27 April 2016. After two year transition period this becomes enforceable effective May 2018.

Read More

Fog computing, the strategic IoT gateway for "Cloud of Things"

profile pictur
By Rajesh Dangi
January 30, 2018

The cloud computing is well adapted and enabling most of the innovative technologies today, I am attempting a compilation from various sources to bring a closer look at Fog Computing, a "Cloud of Things" i.e. ecosystem of Cloud computing and IoT Systems enabler. The edge computing is becoming more and more significant and with advancements in mobile computing and associated peer to peer social applications, drones, connected cars and augmented reality etc driving the agenda on how the data gets generated, processes (locally) and disseminated with decentralized way yet building up the knowledge repository centrally to draw insights from algorithms and AI/ML (read artificial intelligence and Machine learning) artefacts.

Read More

Firewall Best Practices to Block Ransomware Attacks and what has NxtGen done?

profile pictur
Dinsoka K
January 18, 2018

It is important to keep in mind that IPS, sandboxing and all other protection the firewall provides is only effective against traffic that is traversing the firewall and where suitable enforcement and protection policies are being applied to the firewall rules governing that traffic. So, with that in mind, follow these best practices for preventing the spread of worm-like attacks on your network:

Read More

Blockchain,“The Internet of Value"

profile pictur
Rajesh Dangi
September 20, 2017

Two key technologies are creating waves in the digital world towards transformation of the business, first the Bitcoins and another Blockchain. Both are correlated but not the same, Bitcoins is a worldwide cryptocurrency and digital payment system that offers distributed ledger system leveraging the Blockchain technology running transactions from multiple locations ( read devices, applications or micro services ) by multiple users and still maintains integrity of the transaction and value remittance thereof. The system is peer-to-peer, and transactions are capable of running independently between users, without an intermediary.

Read More

Hadoop File Formats, when and what to use?

profile picture
Rajesh Dangi
June 23, 2017

Hadoop is gaining traction and on a higher adaption curve to liberate the data from the clutches of the applications and native formats. This article helps us look at the file formats supported by Hadoop ( read, HDFS) file system. A quick broad categorizations of file formats would be...

Read More

RANSOMWARE: What it is and how to deal with it

profile picture
Rajesh Dangi
March 28, 2017

Almost every day we hear about cases of ‘Ransomware’ affecting running servers – an act we call digital terrorism. Let’s get a quick understanding of this risk and the preventive measures to mitigate it. Crypto-ransomware gains access to a target server and encrypts all the files on that server. It scrambles the contents of the file so that you can’t access them without a particular decryption key that can correctly unscramble it. This makes the users or the administrators of the server helpless, and there are no known tools that can detect the hashing algorithms and then decrypt them. A ransom is thus demanded in exchange for the decryption key.

Read More

Focus on the Fourth ‘V’ of the Big Data for EDH enablement!

profile pictur
Rajesh Dangi
March 14th, 2017

Big data as defined in the Wikipedia, Big data is a term for large or complex data sets that are a constantly moving targets for the traditional strategies, tools for processing and managing them via traditional data processing applications which are inadequate to deal with them. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying, updating and information privacy.

Read More
Archive