/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Saving the dry, lifeless soul of enterprise software

Nowadays large suppliers are improving their products while making them easier to implement and simpler for users to adopt. Cloud computing has totally changed the enterprise environment. To know more on the transition of enterprise software, go through the article by Michael Krigsman, analyst, strategy advisor, enterprise advocate.

http://www.zdnet.com/saving-the-dry-lifeless-soul-of-enterprise-software-7000026198/

Rate this blog entry:
5628 Hits
0 Comments

Protecting encryption keys is critical to keeping cloud data private

Implementing cloud data encryption and maintaining control over encryption keys is an important way for the enterprise to verify how information can be shared and unlocked. Cloud data encryption transforms data so that it is undecipherable without the key that can be used to change the data back to its original form. But several enterprises are now realizing that when they cede control of their encryption keys to their cloud providers, their sensitive data may not be as private as they had hoped. They need to look for peer reviewed security proofs and understand implications on end users of cloud applications if there are strong encryption techniques. Recommendation from Gartner and the security and compliance needs to control sensitive data and it becomes clear that having vast amounts of sensitive data dispersed to multiple cloud application providers and relying on those providers to keep the encryption keys safe creates a security paradox for the enterprise.

 

 

To gather more insights visit the article by Gerry Grealish, Chief Marketing Officer of PerspecSys, follow http://www.cloudcomputing-news.net/blog-hub/2014/mar/20/when-deploying-cloud-data-encryption-protecting-encryption-keys-is-critical-to-keeping-cloud-data-private/

Rate this blog entry:
6814 Hits
0 Comments

Application of graph search

Max De Marzi, software field engineer with Neo Technology, inspired by Facebook’s graph search, talks about how use of graph search adds value to the enterprise by making practical use of big data. He also indicated how this technology can be applied to solve business problems.

For more information follow

http://searchsoa.techtarget.com/news/2240215892/Facebook-inspires-enterprise-to-use-big-data-graph-searches?asrc=EM_NLN_27254566&utm_medium=EM&utm_source=NLN&utm_campaign=20140317_Facebook%20inspires%20enterprise%20to%20use%20graph%20searches_cdelacvivier&track=NL-1839&ad=892421

 

 

Rate this blog entry:
8947 Hits
0 Comments
Sign up for our newsletter

Follow us