Skip to main content

Technical

Why Healthcare is Moving to Cloud: Cost & Time Savings

The following is the second blog in a series about why healthcare organizations are moving to the cloud. In this series so far, we have looked at how the cloud brings robust data security to healthcare organizations. In this blog, we’ll look at how the cloud can potentially provide cost savings and greater efficiency for […]

Application security assessment

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

FileNet P8 Domains, Object Stores, and Document Classes

I created three videos with instructions on how to create a domain, an object store, and a document class with associated property templates and choice lists. However, all of these tasks assume you’ve installed, configured, and deployed the Content Platform Engine (CPE). Future videos will demonstrate how to do that. In the meantime, if you […]

Advantages of Datorama

Skype for Business Online Being Retired in 2021

Say it ain’t so! Our beloved Unified Communications platform will sadly be pushing up daisies starting July 31, 2021. For most of us working with Skype for Business (Online) we knew it was only a matter of time before Teams took the throne as Microsoft’s preferred UC/IC product. Microsoft has made this clear over the […]

MQCSP structure

Protecting the MQCSP structure

Problem Description As I mentioned in one the previous posts: MQCSP structures, containing the user ID and password of the user being authenticated, are sent in the clear across the network, if you’re not using TLS to encrypt your traffic. For example, if you setup LDAP for authentication (as described in the previous post), start […]

Using Chef Habitat to Migrate Legacy Windows Applications

Overview In this bog post we will discuss Using Chef Habitat to Migrate Legacy Windows Applications to a Modern Secure Platform. With support ending for Windows Server 2008 and Microsoft SQL Server 2008, legacy Windows applications will need to be migrated to newer secure and supportable modern platforms. For instance, Windows Server 2016 and 2019 […]

MQCSP structure

Multiple Paths to Cloud: Migrating Legacy Applications

In our previous blog post, Multiple Paths to Cloud: Taking a Cloud Native Approach, we discussed the importance of a unified plan for cloud adoption as well as the benefits of cloud native to build apps. In part two, we examine options for migrating legacy applications to the cloud. This path to cloud adoption has […]

The State of Cloud And Its Benefits

The following is the first blog in a series about why businesses are moving to the cloud to modernize and improve business performance. Gone are the days of wondering if your business needs to utilize the cloud. You must now decide how to best utilize it. This is a byproduct of the evolution of the […]

7 Tips Sitecore Commerce@2x

7 Steps to create lower environments with Sitecore Commerce

When dealing with live websites, it is desired to have lower environments that mirror production as closely as possible. Why? Because this improves your quality assurance and user acceptance processes on pretty much anything that you build, change or configure in the site. With a similar environment it’s easier to find things that will not […]

Intelligent Security Graph

ChlauthEarlyAdopt and AdoptContext rules behavior in MQ v9.1+

August 8, 2019. Due to a security vulnerability, IBM changed the order of operations when authenticating users in v9.1. This is important if you setup your security on a prior version and then migrate to v9.1. Your security rules might stop working as you intended. In this post, we will talk about “channel early adoption” […]

Team Of Engineers Having Discussion At Desk

B2B Digital Transformation: Assessing IT and Technology

Rather than begin a digital transformation journey with technology (as many organizations tend to do), you must begin by setting objectives, evaluating your market, and determining where you fit. Only then can you begin to assess internal capabilities and begin selecting the technology to support new initiatives. IT and Technology New technology deployments require a […]

Cloud CTMS for Pfizer

How to configure IBM MQ authentication: OS and LDAP

IBM MQ user authentication An IBM MQ queue manager can be configured to authenticate connecting users. But it does not keep a list of users or their passwords. That is the functionality that MQ leaves to external resources. There are two options you can choose from: Authenticate using the operating system Authenticate using a Lightweight […]

Load More