High Tech Articles - Perficient Blogs
Blog

High Tech

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

How Blockchain and Bitcoin Tech Will Fuel the Industrial IoT

Technological powerhouses bitcoin and blockchain offer the potential to collaborate with the Internet of Things (IoT), resulting in simplified connections within the industrial IoT. Through advanced implementation of blockchain and bitcoin, technology promotes a simpler way to experience life itself. Blockchain is the underlying technology in bitcoin and other cryptocurrencies. Information contained and stored within […]

Read more

[Guide] Improving Operations & Patient Outcomes: Strategy & Tech

Due to the emergence of value-based care, precision medicine, and consumerism, the healthcare industry continues to grow and change. More than ever before, healthcare organizations are collecting patient and member data in real time by utilizing mobile applications, wearable, and implantable devices. In fact, according to Forbes.com, “There are 3.7 million medical devices in use […]

Read more

Marriage of DevOps and ITIL

DevOps is more of a philosophy or way of working than it is a formal framework or standard. Nevertheless, the approach deserves merit, as it goes to the core of tension in most IT organizations—the need to be responsive to business change while maintaining a stable, highly available IT infrastructure, and delivering quality services that […]

Read more

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Read more

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

Ensuring Reliable Message Delivery in MuleSoft Applications

Some types of MuleSoft applications have zero tolerance for message loss.  An online order purchasing application is a good example.  Losing even one message during an online purchase order would have a direct impact on a company’s sales revenue. Fortunately, there are ways to ensure reliable message delivery when implementing a MuleSoft application.  One approach […]

Read more

Consensus Algorithms in Blockchain and Beyond – 5 of 5

Cryptocurrencies such as Bitcoin and smart contract platforms like Ethereum are recent examples of the evolution of consensus algorithms blockchain represents. Consensus, getting distributed processes to agree on a single value, is a fundamental problem in computer science. Distributed processing is difficult. In fact, there are logical proofs that show pretty conclusively that there won’t […]

Read more

Consensus Algorithms in Blockchain and Beyond – 4 of 5

Cryptocurrencies such as Bitcoin and smart contract platforms like Ethereum are recent examples of the evolution of consensus algorithms blockchain represents. Consensus, getting distributed processes to agree on a single value, is a fundamental problem in computer science. Distributed processing is difficult. In fact, there are logical proofs that show pretty conclusively that there won’t […]

Read more

Consensus Algorithms in Blockchain and Beyond – 3 of 5

Cryptocurrencies such as Bitcoin and smart contract platforms like Ethereum are recent examples of the evolution of consensus algorithms blockchain represents. Consensus, getting distributed processes to agree on a single value, is a fundamental problem in computer science. Distributed processing is difficult. In fact, there are logical proofs that show pretty conclusively that there won’t […]

Read more

Consensus Algorithms in Blockchain and Beyond – 2 of 5

Cryptocurrencies such as Bitcoin and smart contract platforms like Ethereum are recent examples of the evolution of consensus algorithms blockchain represents. Consensus, getting distributed processes to agree on a single value, is a fundamental problem in computer science. Distributed processing is difficult. In fact, there are logical proofs that show pretty conclusively that there won’t […]

Read more

Consensus Algorithms in Blockchain and Beyond – 1 of 5

Cryptocurrencies such as Bitcoin and smart contract platforms like Ethereum are recent examples of the evolution of consensus algorithms blockchain represents. Consensus, getting distributed processes to agree on a single value, is a fundamental problem in computer science. Distributed processing is difficult. In fact, there are logical proofs that show pretty conclusively that there won’t […]

Read more

DataStax Advanced Security : Eat your vegetables first

I see companies start down their Big Data/NoSQL journey with a Proof of Concept mindset and they almost always end up funding a science project by confusing early wins on established products with progress. Cassandra is ten years old and DataStax has 500 customers in 50 countries. This stuff works; what you need is a […]

Read more

Extreme Customer Experience Makeover

Digital innovation continues to disrupt industries at lightning speed. Today’s organizations are transforming their entire business – from strategy to operations, technology to culture – to better deliver value to their customers. In 2017, we compiled the top 10 trends leaders needed to know when it came to their digital transformation journey. In this 10-week […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up