There are numerous ways in which enterprises can leverage the cloud computing services. Each of the cloud computing service models come with its own advantages, and the variety of options as well as the elasticity in all service tiers is one of the primary reasons why cloud computing is becoming so popular. However, given the many options, it is vital for the enterprises also to be aware of certain drawbacks of cloud computing deployment and service models. In this posts, I outline one use case for each of the cloud computing service models, namely for the IaaS, PaaS or SaaS and see their applicability to different cloud deployment models. [Read more…]
Have you ever wondered what makes the service a ‘cloud’ application? Or alternatively, how does any app become cloud based? The following article dives a little deeper into this often-asked questions and explores some of the characteristics and criteria of the cloud. To illustrate the point, I examine two well-known public services (Airbnb and Spotify) and analyze the ‘cloud application’ sticker and its merit used often with these two these online services. [Read more…]
The following article shows how to install Tomcat v9.0.xx on CentOS Linux 7.x.xxxx.
Ever wondered how you can test your internet speed from a command line in Centos?
The following post is a short guide on how to expire Amazon S3 objects by means of defining a simple lifecycle rule. In this tutorial, we’ll be deleting all files in the bucket that are older than 30 days. [Read more…]
Following are slides from Amazon AWS Innovate 2017 Toronto hosted on 10th of May 2017. [Read more…]
In this post, I will try to look at the three of the very common risks associated with the ability of business to manage its project costs. I identify risk, the cause and try to suggest a possible risk mitigation strategy. [Read more…]
The following short post is my perspective on the adequacy of the personal privacy laws and standards in Canada.
The issue of unclear law around the ‘fair use’ is well illustrated by the copyright situation, where Google Inc. introduced two new search products called Google Book Search and Google Image Search. These were the products, through which Google started digitizing the text and images of copyrighted and public domain books and for the first time expanded beyond indexing the online world of websites. It is also one of the most prominent cases where Google Inc. throughout many lawsuits with Authors Guild, always claimed ‘fair use’ as the reason for digitally scanning and storing million of books online. According to Judge Sprizzo (2017) presiding over one of the lawsuits, the Google claimed that they were simply only showing the “snippets” of the books. Do I think Google had a valid claim to fair use in the lawsuit? [Read more…]
Studies such as (Urbaczewski, A., & Jessup, L. M., 2002) suggest that controlling internet access (at least initially) is not beneficial for productivity, stating “evidence exists of a productivity vacuum occurring immediately following the installation of Internet access on worker desktops.”
Following post talks about the results of my SonicWall Phishing IQ Test. I also go over some of the notes I’ve taken during the test. [Read more…]
This is just a set of thoughts referring to a recent security incident called the ‘NSA Hack,’ which in my view profoundly impacted the privacy on a global scale.
I would like to start my initial post by quoting Paul Maritz, CEO of VMware who stated that “Cloud is about how you do computing, not where you do computing” (Davidson, M., 2015).
Consider a global organization with operations and subsidiaries in several countries. Is it a proper course of action for a global enterprise to adjust the business code of ethics when executing the business internationally? The following article presents my opinion on the matter. [Read more…]
This post analyses my views on ethical responsibilities of IT professional in the fictitious, ethically ambiguous scenario. [Read more…]