Posts

Showing posts from May 6, 2015

Google Cloud Bigtable in our data-driven age.

Image
Data-driven age means: public data, enterprise data, corporate data and social data accessible and actionable anywhere, anytime and in real-time.
This nowadays reality requires streamlined end-to-end maturity, performance, flexibility, scalability, security, privacy and seamless when it comes to efficiently derive and unlock critical insights from these data.
Shared services infrastructuresbring peace in minds; while scalable NoSQL database, industry-standard and open-source Apache HBase API play their partition.
Google Cloud Bigtable available as a beta release in multiple locations worldwide can be ideal for enterprises and data-driven organizations that need to handle huge volumes of data, including businesses in the financial services, AdTech, energy, biomedical, and telecommunications industries.

The ‘‘Top Three Common Cyber Attack Vectors on SAP Systems’’

Image
Cyberattaks are more and more sophisticated, various and targeted. Attackers are everywhere and are working in real-time to achieve their assignments. Our digital age are also marked by negligence and lack collaboration between critical teams.
So that one can observe that OnapsisResearch Labs can analyze thousands of vulnerabilities to identify the three ‘most commonly used approaches for hacking into business-critical data hosted in SAP applications, as well as disrupting key business processes’’: 1.    Customer and Supplier Portal Attacks. Backdoor users are created in the SAP J2EE User Management Engine. By exploiting different critical vulnerabilities, the hacker can obtain access to SAP Portals and Process Integration platforms and their connected, internal systems.
2.    Direct Attacks through SAP proprietary protocols. This attack is performed by executing operating system commands under the privileges of the SAP administrator, and by exploiting vulnerabilities in the SAP RFC G…

Daunting ‘Vulnerabilities’ in SAP Systems.

Image
In our digital age where, Companies are eager to harness the opportunities presented by moving systems to the cloud, enabling user adoption through mobile devices and big data, it is daunting to observe that SAP systems seem not protected from cyber threats by traditional security approaches.
According to Onapsis, the global experts in business-critical application security, three most common cyber attack vectors can be used for compromising SAP business systems at the application layer. 
The Onapsis Research Labs study found that over 95 percent of SAP systems were exposed to vulnerabilities that could lead to full compromise of the company’s business data and processes. ‘’These attack vectors put intellectual property, financial, credit card, customer and supplier data as well as database warehouse information at risk for the world's largest companies’’. 

“The big surprise is that SAP cybersecurity is falling through the cracks at most companies due to a ‘responsibility’ gap betwee…

Cognitive computing and content analytics capabilities

Image
Beyond a set of requirements related to regulatory, privacy and security, Connectikpeople.co recalls that, it is always indispensable when it comes to cognitive computing and content analytics capabilities, to be able to gain faster intelligence from data across multiple secure traditional and cloud environments.
The ability to link data and workloads across multiple cloud environments or combining external data with on-premises, traditional IT infrastructure is also a game changer like flexible platform for mining data for insights and innovation.

Recruit and manage workforces in our digital age.

Image
Find the right skill at the right time in the most efficient way, is more and more complex in our digital age where the high profiles are rare.
However, as an ambitious company, you need the real-time ability to improve your business processes and make fact-based decisions more smoothly and simply about how you recruit and manage your workforces.
A set of on-premise and cloud solutions are available; but the most important for you, is to protect your recruiting investments, with inter alia: a broader set of options for recruiting, assessment and onboarding of candidates.
You need in real-time actionable insights and data for better decisions on hiring, growing and retaining your workforce.
Connectikpeople.co encourages the planned integration between the SuccessFactors® Employee Central solution and IBM Kenexa’s cloud-based HR software Talent Acquisition Suite, likely to helping to streamline your recruiting investments anywhere and anytime.

Startups of the days with their backers.

Image
They are young, ambitious and mature with Twilio, a cloud communication company, henceforth valued at $1B.
CloudGenix provides software for managing networks across multiple data centers, CloudGenix came out of stealth in April 2014 and focuses now on sales and product development. Its investors include: Mayfield Fund, Bain Capital Ventures and Charles River Ventures.
NatureBox is a subscription delivery service for all-natural snack foods. Founded in 2012, NatureBox has raised $58.5M to date and focuses now on its international expansion. Among its investors we have: General Catalyst Partners, Canaan Partners and SoftBank Capital. Twilio is a cloud communication company that enables users to use standard web languages to build apps via a web API. Founded in 2007, Twilio has raised $204M to date and is now valued above $1B.
Feel free to contact us if you are a startup owner!