tag:blogger.com,1999:blog-83042718406015138692024-03-18T06:56:10.778-07:00Tech BytesVisit here for a variety of articles and resources on Information Technology and related leadership, management, security and governance areas.
<br>Follow me on Twitter <a href="https://twitter.com/kannagoldsun">@kannagoldsun</a>. Also subscribe to the <a href="http://links.kannan-subbiah.com">daily digest</a>Kannan Subbiahhttp://www.blogger.com/profile/02201893470064493220noreply@blogger.comBlogger96125tag:blogger.com,1999:blog-8304271840601513869.post-66539869283026824102019-08-05T10:45:00.001-07:002019-08-05T10:45:58.726-07:00The Biggest Predictions for the IT Industry
By Team TechJury
The IT industry is continuously evolving. Thanks to its dynamic nature, we are getting access to improved products and services. Moving forward, the industry is poised for even more growth as developers and IT experts work around the clock to upend what IT is today.
Here are some predictions on what comes next within the industry.
AR For Businesses
The world met Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-66146759538547215772018-03-30T02:17:00.000-07:002018-03-30T02:17:18.861-07:00Enterprise Architecture Framework - Non-Functional Attributes
Non-Functional Attributes (NFAs) always exist though their signficance and priority differs when considered with certain other functional or non-functional attribute. It’s particularly important to pay attention and consider them in the inital phase of the EA framework development, as these attributes may have direct or indirect impact on some of the functional attribute of the framework. Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com1tag:blogger.com,1999:blog-8304271840601513869.post-89543793235784141222018-03-25T01:52:00.000-07:002018-03-25T01:52:21.057-07:00Securing the Operational Technology (OT) - The Challenges
OT - Overview
Operational Technology(OT) is generally technology used in the manufacturing or operational floor. The OT has evolved considerably in the recent years from pure mechanical technology to data-driven technologies like Robotic Process Automation (RPA) leveraging IOT, Machine Learning and Artifiial Intelligence. The impetus from the Industrial IOT (IIOT) brings more and more Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-48451111326568570352016-12-25T08:00:00.000-08:002016-12-25T08:00:46.179-08:00The Mobile Phone Is Your Private Property
This morning, when I was on my morning walk, a person came out of a construction site and was requeting me to lend my phone to make a phone call. I was not comfortable lending my phone primarily for three reasons: First he is a stranger to me; Second, he seem to be working in the construction site and he should have sought help from those around in his workplace as they would be more Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com2tag:blogger.com,1999:blog-8304271840601513869.post-60665755546778461172016-11-13T00:38:00.000-08:002016-11-13T00:38:08.734-08:00A Software Product Vs Project
In short, a software Project is all about to execute a Statement of Work of an internal or external customer, where what customer required is right irrespective of what is ideal or what the end user would expect. Though some projects are scoped in such a way that certain aspects of non-functional requirements are left to the choice of the project teams.
Product development isn’t about Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-60374790158000350352016-10-01T02:58:00.000-07:002016-10-01T03:00:22.534-07:00DNS Security Extensions - Complexities To Be Aware Of
The Domain Name System (DNS) primarily offers a distributed database storing typed values by name. The DNS acts like a phone book for the Internet, translating IP addresses into human-readable addresses. Obviously, as close to 100% of the internet requests are by the domain names, requiring the DNS servers resolve the domain names into IP addresses. This results in a very high load on theKannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-77072546290183171442016-08-07T10:04:00.000-07:002016-08-07T10:04:26.520-07:00Distributed Ledger - Strengths That Warrants Its Adoption
Blockchain is the most talked about technology today that is likely to have a pervasive impact on all industry segments, more specifically in the Banking and Financial Services. Blockchain packs the principles of cryptography, game theory and peer-to-peer networking. Blockchain, once the formal name for the tracking database underlying the cyptocurrency bitcoin, is now used broadly to refer to Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-75872379597554476512016-04-10T00:20:00.000-07:002016-04-10T00:20:44.473-07:00Economics of Software Resiliency
Resilience is a design feature that facilitates the software to recover from occurrence of an disruptive event. As it is evident, this is kind of automated recovery from disastrous events after occurrence of such events. Yes, given an option, we would want the software that we build or buy has the resilience within it. Obviously, the resilience comes with a cost and the economies of benefit Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-64609456636456445122016-03-20T01:56:00.000-07:002016-03-20T01:56:23.577-07:00Big Data for Governance - Implications for Policy, Practice and Research
A recent IDC forecast shows that the Big Data technology and services market will grow at a 26.4% compound annual growth rate to $41.5 billion through 2018, or about six times the growth rate of the overall information technology market. Additionally, by 2020 IDC believes that line of business buyers will help drive analytics beyond its historical sweet spot of relational (performance Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-45987767754373983742016-01-03T00:52:00.000-08:002016-01-03T00:52:46.325-08:00Enterprise Architecture - Guiding Principles
Enterprise Architecture (EA) artifacts must be developed with a clear understanding of how the EA will be used and who will use it. The EA may be used as a tool for evaluating design alternatives and selecting optimal solutions, as a guide providng insights into how practices will be streamlined or improved through automation or as a plan for needed investments and an understanding of what Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-34660198110354215922015-09-26T23:50:00.001-07:002015-09-26T23:50:37.897-07:00Teachability - a Significant Soft Skill for Leaders
"If You Want to Learn, Be Teachable" -- By John C. MaxwellThere is an old saying that “you can't teach an old dog new tricks,” but the concept called “teachability” remains a key component for ensuring that the professionals of all walks are successful in their pursuit. This is all the more important in the IT because the "Change" here happens at a faster pace and those being teachable get Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-89032154726772804012015-08-15T06:20:00.002-07:002015-08-15T06:20:43.496-07:00The Promise and Peril of IoT
The Internet of Things can be defined as below:
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected.
As we can see today, there are many things that we use in our daily livelihood are Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-2072649627272176322015-06-19T07:09:00.000-07:002015-06-19T07:09:55.985-07:00Information Security - Reducing Complexity
Change is constant and we are seeing that everything around us are evolving. Primarily, the evolution is happening on the following categories:
Threats:
There is a drastic change in the threat landscape between now and the 1980s or even 1990s. Between 1980 and 2000, a good anti-virus and firewall solution was considered well enough for an organization. But now those are not just enough Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-50909235478344479082015-05-23T01:30:00.001-07:002015-05-23T01:30:57.103-07:00Factors Affecting Software Resiliency
The digital transformation is happening everywhere right from small private firms to government organizations. On the personal front, connected things is coming on, where by every thing that we have or use will be smart enough to connect and communicate with other things(systems). This in effect means there will be an increased reliance on IT systems to accomplish various tasks. This will call Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-70203540505259208782015-02-01T00:40:00.003-08:002015-02-01T00:40:35.205-08:00Evolution of Wearables - What is in store?
Many of us are hearing more and more about fitness bands and some are using these. Big players are now rolling out smart watches, which has disrupted the basic fitness bands considerably in a very short span of time, as these smart watches have these basic fitness features within. Wearables like, glasses, jewellery, headgear, belts, armwear, wristwear, legwear, footwear, skin patches, Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-82100769036035139202014-11-06T02:23:00.000-08:002014-11-06T02:23:42.849-08:00Enterprise Architecture Practice - Capabilities
Enterprise Architecture (EA) function now have an unprecedented chance to lead the way in identifying new business opportunities, thanks to the innovations in the web and mobile technologies and businesses realizing the business advantages of such advancements. EA serves a strategic business purpose by enabling business capabilities to be implemented via IT architecture and related IT delivery Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-75926296894381009772014-11-03T22:53:00.000-08:002014-11-03T22:53:31.354-08:00Information Security - Cost Analysis
Reports indicate that the Information Security is now a Board Agenda and the security spending by enterprises is on the rise. This is more because of the raise in the data breaches worldwide and the increased hacking and cyber attacks. This impacting all enterprises, be it small, medium or large and across various segments, i.e. not only financial but also all domains. The increased exposure Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-60392026520470894112014-09-28T23:55:00.000-07:002014-10-04T00:03:02.886-07:00Information Security Controls Relating to Personnel
Information Security in an organization largely focusses on the Confidentiality, Integrity and Availability of data, information and related resources. While the risk of threats are increasing, study says that the threat is more from the inside than from the outside. This has mandated the need for framing polices, procedures and controls around the employees of the organization, so that such Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-88371544502458277622014-09-13T01:40:00.000-07:002014-10-03T01:50:24.143-07:00Principles of Information Governance
With the evolution of tools and technologies around big data, the variety and volume of customer information collected has increased many fold. This also requires the responsible use of such information by the organization. Many countries have promulgated legislations to regulate the use and protection of such information in every organization.
The set of multi-disciplinary structures, policiesKannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-7201273273237404232014-08-28T22:42:00.000-07:002014-08-28T22:42:20.899-07:00Architectural Security aspects of BGP/MPLS
The inherent benefits of the MPLS (Multi Protocol Label Switching), is gaining widespread use for providing IP VPN services. With the emerging trend of connected systems, a global enterprise today is well connected with their partners, with MPLS being the preferred choice. Border Gateway Routing Protocol (BGP) is used to interconnect such autonomous systems by exchanging the routing informaiton Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-6029412810165497552014-08-24T22:55:00.000-07:002014-08-29T23:02:26.059-07:00Perspectives of Business Reference Model
We are all witnessing the steady progress of the Enterprise Architecture(EA) discipline and it is now well understood that the EA is not just about IT infrastructure and the Business Architecture(BA) forms an integral part of EA. Unlike in the past, when Business Architecture was used for the purpose of eliciting the requirements for the IT systems, BA is used to develop and describe the targe Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-29714108257188809452014-07-20T03:22:00.000-07:002014-07-20T03:22:38.247-07:00A Checklist for Architecture & Design Review
Mostly the security requirements remain undocumented and is left to the choice or experience of the architects and developers thus leaving vulnerabilities in the application, which hackers exploit to launch an attack on the enterprise's digital assets. Security threats are on the rise and is now being considered as a Board Item as the impact of security breach is very high and could cause Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-78350090838751176872014-06-29T03:47:00.000-07:002014-06-29T03:47:59.621-07:00Governance of Agile Delivery
Introduction
The Agile methodology brings in alternate approach to traditional project management, where success was hard to get. Typically used in software development, Agile methodology help businesses respond to unpredictability. By focusing on the repetition of smaller work cycles as well as the deliverables, agile methodology is described as “iterative” and “incremental”. In waterfall, Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-78321825945645730932014-06-22T02:58:00.002-07:002014-06-22T02:58:20.876-07:00Sustaining Successful IT Governance Environment
A tremendous amount of importance is being given to governance, risk, and compliance (GRC), ans thus IT governance is becoming a necessity in today's business context. There is strong pressure on senior management and the Board members to have a good understanding of their IT systems and the controls that are in place to avoid things such as fraud and security breaches. As the global corporateKannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0tag:blogger.com,1999:blog-8304271840601513869.post-32983978074831028522014-04-27T02:22:00.000-07:002014-04-27T02:22:45.537-07:00WAF - Typical Detection & Protection Techniques
WAF - Web Application Firewalls is a new breed of information security technology that offers protection to web sites and web applications from malicious attacks. As the name suggests, WAF solution is intended scanning the HTTP and HTTPS traffic alone. The WAF solutions have evolved over the last few years and are capable of preventing attacks that network firewalls and intrusion detection Kannan Subbiahhttp://www.blogger.com/profile/02737187722305953525noreply@blogger.com0