Managing Data Security in Public, Hybrid and Private Clouds

The cloud provides convenient, on-demand network access to a centralized pool of configurable computing resources such as such as computing servers, storage, networks, services, and applications that can be rapidly deployed with great efficiency and minimal management overhead. Although cloud computing presents tremendous benefits in terms cost and performance, security and privacy concerns remain the

Cross-site Scripting and What You can Do About it

Almost every day we hear or read about the eCommerce sites losing customer credit card data or other critical operational data. The companies lose critical information such as credit cards data, patient health records, and social security numbers to the hackers due to vulnerabilities in their customer facing web applications. While it may be impossible

Essential Security Technologies for Building Secure Enterprises

Enterprise networks are vulnerable to a wide variety of attacks ranging from data leaks to the spread of malware to insider threats. Because enterprise networks often contain sensitive or valuable information, companies try to deploy a large number of software tools to secure them. But despite the deployment of expensive software and hardware tools systems

Building Text to Speech Applications Using Asterisk Open Source VoIP Platform

Introduction Asterisk is a software implementation of a telephone private branch exchange (PBX); it allows attached telephones to make calls to one another, and to connect to other telephone services, such as the public switched telephone network (PSTN) and Voice over Internet Protocol (VoIP) services. Features The Asterisk software includes many features available in proprietary

Blackberry – A Sad Tale of A Company That Lost Its Direction

Today Blackberry, more formally known as Research in Motion (RIM),  announced a layoff of about 40% of their workforce and writing off about US $1 billion.   Blackberry is a perfect example on how to set a successful company to fail by improper planning. I had worked with some of Blackberry’s engineers at Motorola and also

Some Thoughts On Android OS Security

Android OS and Application Security A lot of has been written about Android o/s security issues in the popular media.  Unfortunately, most of it is totally misleading, irresponsible, and totally erroneous.  While Android OS may have many security issues, but many problems cited with Android Phones are not related to the OS at all. Most

Drupal vs Joomla vs WordPress, The Best Open Source CMS for Enterprise Web Portals

Summary:  There are tons of arguments in favor of each CMS and forums are full of discussions. This blog summarizes the core strength of each CMS, for someone not familiar with the strength of each CMS. At my company, we work with all three CMS platforms, our conclusion is that : All of the CMSes

Outsourcing Software and Product Development Without Compromising IPRs

Summary:  If you are planning to engage an outsourcing development company, understanding the safety of IPRs is very important.  With so many dubious outsourcing vendors in the market, it is important to only deal with someone that has ability to protect your IPRs. How do you protect your IPRs with a company that has no

Developing Great Looking iPhone Applications

Summary iPhone has totally revolutionized the mobile application development. The real reason is the simplicity of the process by which any one can submit applications to iTunes to monetize their efforts. This has its pros and cons both. Just because everyone can submit an application, there is a flood gate of applications being submitted every