A Case for Cloud Based SaaS Billing for Telecom Operators

Managing telecom operations is a complex endeavor as it involves managing many layers of complex systems designed to deal with business issues, technology equipment, and customer management. Besides, a telecom operator has to deal with retail customers, wholesale customers, resellers, partners, employees, contractors, installers and a myriad of equipment and service suppliers. Despite all this

Setting In-house Private Cloud with OpenStack

It appears that traditional data center architecture built around the clusters of dedicated servers is now obsolete. In the last few years, increasing number of companies virtualized their data centers to support various in-house applications. However, virtualization which was the buzzword until recently is now simply being looked upon as a stepping stone to create

Managing Data Security in Public, Hybrid and Private Clouds

The cloud provides convenient, on-demand network access to a centralized pool of configurable computing resources such as such as computing servers, storage, networks, services, and applications that can be rapidly deployed with great efficiency and minimal management overhead. Although cloud computing presents tremendous benefits in terms cost and performance, security and privacy concerns remain the

Cross-site Scripting and What You can Do About it

Almost every day we hear or read about the eCommerce sites losing customer credit card data or other critical operational data. The companies lose critical information such as credit cards data, patient health records, and social security numbers to the hackers due to vulnerabilities in their customer facing web applications. While it may be impossible

Essential Security Technologies for Building Secure Enterprises

Enterprise networks are vulnerable to a wide variety of attacks ranging from data leaks to the spread of malware to insider threats. Because enterprise networks often contain sensitive or valuable information, companies try to deploy a large number of software tools to secure them. But despite the deployment of expensive software and hardware tools systems