The authors for this blog are Abdul Waheed and Paresh Borkar. Many organizations today still struggle with providing strong authentication for their web-based applications. Most organizations continue to rely solely on passwords for user authentication, which tend to be weak (to be easy to memorize), shared across systems, etc. Though there have been strides towards...
Blogs
The project described in the post was started with a thought of having an easy automation tool to interact with Openstack. Considering the challenges one has with existing Openstack CLI, this tool offers a very good starting point in overcoming those challenges Setup Unlike the existing Openstack CLI, this tool does not require any pre-requisite...
Group-Based Policy Overview With the popularity of Openstack and growing community-based initiative in more than hundred countries; there is a major community-based initiative by thousands of contributors. It's time to focus on real challenges that involve deployment and delivery of applications and services with flexibility, security, speed and scale rather than just orchestration of infrastructure...
Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...
In my previous blog post – Stream It On, I explained the general concept of Streaming Analytics and the kind of problems it can solve. In this post, I would like to discuss how traditional Big Data analytics and Streaming Analytics are different, and why Streaming Analytics is becoming a very crucial component for modern...
I have always been fascinated by the way in which real-time streaming technology has evolved. Today this technology can be used to deliver multimedia content simultaneously to participants of a network-based communication. Multimedia content may include audio, video, graphics, animation, images, text, etc. To be effective, streaming multimedia is presented in a continuous fashion, and...
If you ever thought that the data in your application's ecosystem had valuable insights, you were right and chances are that you are already leveraging those. But if you thought the value was only in the archived data ('data at rest'), think again. The 'moving' data has equal significance, and often, more business value and...
Logging – for a large part of the history of computer software, creators of software products have had a love-hate (but mostly just indifferent) relationship with logging. They love logs when products run into problems – which is more often than most people would imagine; they hate logs because software doesn’t do anything automatically and...
These first few weeks at GS have given me some food for thought. While I have been bombarded with TLAs and FLAs, (and some SLAs as well), most of which are new to me (I have just crawled out from under the kernel / device driver / firmware rock, you see), the constant running theme...
For long, Yoga for a balanced lifestyle and Ayurveda, a formidable contender in the alternative medicine space, have been the leading spiritual products manufactured out of India. These were well supported by educational and professional institutions and a large number of voluntary participatory groups, which gave them the early momentum and a form of an...