SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Five safe practices while dealing with computers

Well who loves a virus in their computer, hacked accounts, stolen data or corrupt data? No one right. So apart from having a nice and durable anti-virus system there are certain habits which must be developed for safe computer experience.

1.       Use a VPN everywhere

2.       Enable two-step or two-factor authentication for your online accounts

3.       Always lock your PC

4.       Encrypt your drive

5.       Make sure your own Wi-Fi network is secure

 

Read the complete article here: http://www.computerworld.in/how-to/5-secure-habits-paranoid-pc-user

  3200 Hits

Challenges for software project management

Software development is a tough job. And what is tougher? Its managing those software projects. Its not enough to know about project management. But what really needed is keeping pace with the oh – so –fast moving IT industry. So here are some challenges that might be faced by the project management team-

1.       Globalization causing extremely high competition

2.       Legacy systems and infrastructure issues

3.       Sufficient software specific expertise

4.       SaaS offerings taking over

5.       Multiple complicated user level requirements

6.       Third-party integration and interface issues

7.       Quality testing and bug fixes requiring numerous software iterations

8.       Revenue recognition reporting requirements for the software industry

 

Read the complete article here: http://www.computerworld.in/feature/8-challenges-affecting-software-project-management

  4896 Hits

Is Viv to beat Siri?

Creators of Siri (the most popular A.I tool that serves as a personal assistant which can answer your questions, write your mails and plan your schedule), presented its sibling Viv. The creators claim that Viv will be a complete game changer in the field of artificial intelligence. But it has a long journey to cover. It must be integrated with smart phones and other smart devices. Read the complete article here: http://www.computerworld.in/news/new-siri-sibling-viv-may-be-next-step-ai-evolution

  3822 Hits

The Apple Pencil Needs Sharpening

The Apple Pencil Needs Sharpening

The Apple Pencil and the iPad pro can be the best sketchbook for one's creative expression when they are at its best, although some artists expect them to work a bit better. Apple pencil and iPad pro works great together, but the Bluetooth connection may not be as good as you might expect it to be. The Apple Pencil needs to restart if you restart your iPad pro as the pencil doesn’t hold power for too long. Sometimes the pencil needs the Apple Pencil Thunderbolt Adaptor to charge it for around ten minutes before normal charging. Read more about iPad Pro’s Apple Pencil on: http://www.computerworld.com/article/3072906/apple-ios/what-to-do-when-your-ipad-pro-s-apple-pencil-stops-working.html

 

  4303 Hits

Artificial Intelligence: GPU in new trend

The rise in trend with mobile computing software like smartphones, the demand for PC was being declined for several years. PCs have become boring and market was get stagnated.  Then, GPUs (Graphic Processing Units) has become more interesting as they are the key enablers for the performance of PCs as it improves the graphic performance of games and coming up with various new design in the context of video and images. The industry was working to expand the use of GPUs as a computing accelerator. NVIDIA worked as pioneer in GPU computing market with its CUDA platform. Now, NVIDIA has introduced Tesla P100 platform. This is the first GPU designed for hyperscale datacenter application. It features over 15 billion transistors, combines 16Gb of die stacked 2nd generation High-Bandwidth memory (HBM2). It also has NVIDIA’s NVlink Interface technology to connect to multiple Tesla P100 GPU modules. This is the example how AI (Artificial Intelligence) is evolving and playing crucial roles. To know more, read this: http://www.forbes.com/sites/tiriasresearch/2016/04/05/nvidia-reinvents-the-gpu-for-artificial-intelligence-ai/#44fc297315b7

 

 

  5896 Hits

All About Application Migration

Presently companies have started shifting or planning to shift on cloud and updating there entire data center with modern infrastructure solutions. They are optimizing their entire ecosystem to support mobility and new kinds of end-point technologies. To stay updated on today's market, need is to design an environment that's ready for virtualization and cloud. Organizations are running into application migration challenges.  Some apps can't be virtualized. Some are simple and can't be moved into a cloud ecosystem. Some apps have critical legacy dependencies and some apps are challenged by compliance and security measures. So here's the good news: new technologies are enabling a very granular understanding of applications and their unique requirements. Let's look at some ways that can work with challenging applications and some application migration options. # Understanding the Application DNA # What to Do With Mainframes? # Working Around Dependencies # Getting Creative with Challenge Apps # Ripping Off the Band-Aid. To read more, follow: http://www.datacenterknowledge.com/archives/2016/02/23/application-migration-know-your-options/

 

  4233 Hits

Coolest gadgets of 2016

 

Gadgets or Gizmos as some refer to it have come a long way. Technology has evolved in so many ways helping man in different fields like medicine, lifestyle and entertainment to name a few. Gadgets are now available where it is possible to experience anything, anywhere through virtual reality. According to TIME Magazine, here are some shortlisted ‘Coolest Gadgets of 2016’ 

# HTC Vive Headset- You don’t just sit and experience while wearing the headset. Instead, through head-tracking technology and a pair of hand-held wireless controllers, you’re encouraged to interact with your environment, climbing ladders, painting the air, and even shooting zombies.

# Loop-Loop connects to online photo services via Wi-Fi, streaming your favorite pictures wherever you are.

# Ili Wearable Translator- The world’s first wearable translator, can connect two people have full conversations in separate languages, without the help of a Smartphone or even an Internet connection.

To know more, please read the article by John Patrick Pullen (Contributor in Time Mag.) -: http://time.com/4169302/ces-2016-coolest/

 

  3620 Hits

Good posture in a day keeps the doctor away

According to a recent study, Experts are saying that Excessive use of electronic gadgets is leading to hunched backs and high stress level among youngsters. Hunched back is a medical condition of exaggerated curving of the upper back.

This is condition is commonly being observed especially those who are between 9-18 years old due to weak abdominal muscles from years of sitting in a hunched postion. 

Orthopaedician are suggesting that it’s important to learn the correct way to sit, especially when using electronic gadgets. Simple exercises & practicing yoga improve spine flexibility and good body posture. So good posture in a day keeps the doctor away.

 

To know more, please read the article by The Health Site -: http://www.thehealthsite.com/news/are-you-hooked-to-your-smartphones-and-other-gadgets-doctors-say-it-can-give-you-a-hunched-back-ag0316/

 

  4272 Hits

Cybercrime: A Global Threat to Industries

Cybercrime is a continuous global threat to many industries. The risk associated with it is forcing the firms to spend large amount of money in hiring new technologies, devices and experts to combat it. Verizon Data Breach Investigations Report (DBIR) is the leading source of information about the cybercrime and security breaches, according to which 100,000 incidents of cybercrime have been observed across many industries this year. When a business becomes a victim of cybercrime, its employees, shareholders and customers also get affected. The major attack patterns identified by the report are: insider and privilege misuse, denial of service (DoS) attacks and web application attacks.

To know more, please click on the following link: https://hbr.org/sponsored/2016/04/data-breaches-arent-just-an-it-issue

 

  4538 Hits

Signs to check whether your company’s security culture leaks consistency or not

Consistency plays a vital role in the company's culture. But lack of consistency can lead to harm in secured position. Some ways to improve culture lacking consistency are - talks not supported with supporting actions; people don't practice what they preach; change the quote from "we have to do something" to "we have to do the right thing"; have a consistently good team and train them well; prioritize the security of your customers. Read the complete article here: http://www.darkreading.com/operations/8-signs-your-security-culture-lacks-consistency-/a/d-id/1325286

  3294 Hits

Startups must consider network monitoring

One thing that startups must take into consideration is network monitoring. Even IT startups have failed to implement it. It's understandable that startups are on a tight budget, but there is free network monitoring solutions available as well. Network monitoring plays a vital role in company's online presence. It can do lots more than just providing security solution. It can help with project management, tracking customer insights, and system maintenance and also plays a vital role in network security that helps in preventing unauthorized access. Read the complete article here: http://it.toolbox.com/blogs/byod-cloud/why-startups-cant-afford-to-take-a-pass-on-network-monitoring-71598

  4292 Hits

Big data’s role in marketing

Marketing dances the fine line between pure numbers and human touch. No business of a subdivision of business can run without data. Similarly, marketing have been embracing big data to meet their needs as well. Now marketers can successfully judge who is a loyal customer and who is not. Using big data marketers has successfully identified potential customers, their demographics and ways to retain them. They can identify what the customers want and need which the competing company fails to deliver. Analysis of results has also become easier. Read the full article here: http://it.toolbox.com/blogs/hosting-facts/how-big-data-is-transforming-marketing-for-good-71635

  3658 Hits

Banking Sector and the Role of UPI

After the spread of internet, banking and mobile wallets have done wonders for India’s digital payment system. Now, it's the time of UPI (Unified Payment Interface). As banks are still left behind in payment space as compared to the wallets of financial technology companies, now they are coming up for tie ups with UPI of NPCI (National Payment Corporation of India), so there might be an increase in payment system by the banks also. RBI and NPCI have excluded wallet providers from this because of the security reasons. It is also possible that after getting approval for this pilot project, wallet providers would be allowed to go for it. But yes, at the end, the success of UPI again depends upon how many players are using it. To know more go through the given link: http://articles.economictimes.indiatimes.com/2016-04-13/news/72295046_1_upi-npci-wallets

 

  4767 Hits

Importance of Web Design for Business

Who doesn't love a fancy website with nice animations and images? But one thing which must be kept in mind is that no matter how great landing page you create, until it has a small loading time, it will not help in the growth of your business. A fast and responsive website is the key to success. Avoid having a lot of images and animations on your website as it just slows down your website and will make it impossible for customers to access your complete website.  Choose your platform wisely according to the domain of your website. There are many platforms easily available over the web. One more thing to increase your business is to keep in mind that website should be accessible seamlessly between cross platforms. Read the complete article here: : http://it.toolbox.com/blogs/hosting-facts/web-design-will-be-an-important-step-for-your-business-to-bloom-72900

  3379 Hits

Disaster management in IT

IT managers are concerned about the heat hazards inside a data center, but what about outside hazards? Climate trends are increasingly affecting the IT operations. Weather related disturbances lead to grid outages which affect its efficiency. The need for disaster recovery tools are raising. But it's not budget friendly to maintain two data centers. So people have shifted their focus to DRaaS i.e. Disaster Recovery as a Service. It leads to less infrastructure management. Read the complete article here:  http://www.computerworld.com/article/3048467/disaster-recovery/for-it-climate-change-means-preparing-for-disaster.html

  4050 Hits

Manufacturers are starting to slowly adopt cloud

Manufacturers are slowly beginning to appreciate and accept the idea of putting portions of their ERP systems onto the cloud. Although most still shows resistance to the idea, but they are keeping an eye on the cloud market, maybe for potential future use. There can be various approaches which manufacturers can adopt. One can be use a hybrid combination of cloud based ERP and traditional ERP.  Others can use a private cloud for ERP.  Reports state that in certain scenarios, cloud based ERP would really make sense for manufacturers.  In situations where - Global companies want a two-tier ERP strategy; smaller organizations that can't afford on premise cloud; new manufacturing business   that start from scratch and many more. Read the complete article here: http://www.computerworld.com/article/3043778/enterprise-applications/manufacturers-resistance-to-the-cloud-is-weakening.html

  3259 Hits

Cloud and HR

Earlier, whenever an employee was hired, a lot of paperwork generated which required hours of works by managers. They had to file them, record them and place them securely. And whenever a need arises to have a look at that document, one will find herself in the midst of piles of document, searching for it. But now processes have changed. But now, whenever an employee is hired an email is sent to the person providing her a link where she can upload her documents which is equivalent to the paperwork done before. This saves time, space and is prone to fewer errors. This system is recoverable in case a document is lost. Cloud has made HR's life significantly easier. Read the complete article here: http://www.computerworld.com/article/3049420/cloud-computing/how-the-cloud-is-transforming-hr.html

  4118 Hits

Cloud App Security Makes Cloud Computing less Complicated

Organizations are now shifting their data on cloud. This creates a problem for IT in terms of security and handling, because security teams needs strong visibility, control and threat protection for cloud applications.    

Microsoft Azure is an open, flexible, enterprise-grade cloud computing platform. Microsoft Azure’s part Cloud App Security makes it possible for IT to set up application discovery and check with the existing security. Since there are numerous applications it is not always possible for IT to know the risk of running an App. But cloud app security gives a risk score(based on prior examination, certificates and information) to most of the App .It gives IT department the same control as their internal software as they can also track how the App is being used through Connecting.

 

To know more: http://www.infoworld.com/article/3055849/saas/dont-overlook-saas-the-original-cloud-option.html

  3745 Hits

Android based cyber security mobile device: A Blackberry way

Android based cyber security mobile device: A Blackberry way

Last couple of years smartphone company Blackberry is facing serious financial degradation due to the presence of android device at cheaper price and with more features. After a huge loss in the smartphone market, Blackberry is trying to diversify their business into cyber security sections under the guidance of John Chen, Executive chairman and CEO of Blackberry. They acquired new companies for providing data security. These companies are providing data sharing security, Geo tagging and automated security alerts, tracking, auditing files inside or outside firewall.

To read, follow: http://www.forbes.com/sites/stevemorgan/2016/04/28/blackberrys-turnaround-ceo-dials-up-cybersecurity-and-it-answers/#515f874e6921

 

  4253 Hits

Security In Cloud Technology

The cloud market continues to grow in 2016. Companies are now more willing to adopt the cloud technology. But security being one of the biggest concern, it is often difficult to choose which cloud style to choose- Public cloud or on premise cloud. Public clouds have a very nice structure and security mechanism which helps the user use the platform economically and securely. On premise setup will require a large investment. But then there are some data which can't be moved to the public cloud. For regulatory, compliance or customer demand reasons, a company can't expose data to public clouds. So the company must invest in the security of their applications and let the public cloud giants secure the infrastructure. Read the full article here http://www.computerworld.com/article/3016281/cloud-computing/public-cloud-vs-on-premises-which-is-more-secure.html

  4196 Hits