FORGOT YOUR DETAILS?

Aerospace & Defense E-SPIN Feature Solution for Aerospace and Defense (A&D) Industries SOLUTIONS PRODUCTS Automotive E-SPIN Feature Solutions for Automotive Industries SOLUTIONS PRODUCTS Banking & Financial Markets E-SPIN Feature Solutions for Banking and Financial Markets Industries SOLUTIONS PRODUCTS Chemical & petroleum E-SPIN Feature Solutions for Chemical and petroleum industries SOLUTIONS PRODUCTS Commercial & Pro. Services E-SPIN Feature Solutions for Commercial and Professional Services industries SOLUTIONS PRODUCTS Construction & Real Estate E-SPIN Feature Solutions for Construction and Real Estate industries SOLUTIONS PRODUCTS Consumer products E-SPIN Feature Solutions for Consumer products industries SOLUTIONS PRODUCTS Education E-SPIN Feature Solutions for Education industries SOLUTIONS PRODUCTS Electronics E-SPIN Feature Solutions for Electronics industries SOLUTIONS PRODUCTS Energy & Utilities E-SPIN Feature Solutions for Energy and utilities industries SOLUTIONS PRODUCTS Food & Beverage E-SPIN Feature Solutions for Food and Beverage (F&B) Industries SOLUTIONS PRODUCTS Government E-SPIN Feature Solutions for Government Industries SOLUTIONS PRODUCTS Healthcare E-SPIN Feature Solutions for Healthcare Industries SOLUTIONS PRODUCTS Information Technology E-SPIN Feature Solutions for Information Technology Industries SOLUTIONS PRODUCTS Insurance E-SPIN Feature Solutions for Insurance Industries SOLUTIONS PRODUCTS Life Sciences E-SPIN Feature Solutions for Life Sciences Industries SOLUTIONS PRODUCTS Media & Entertainment E-SPIN Feature Solutions for Media and Entertainment Industries SOLUTIONS PRODUCTS Manufacturing E-SPIN Feature Solutions for Manufacturing Industries SOLUTIONS PRODUCTS Mining & Natural Resources E-SPIN Feature Solutions for Mining and Natural Resources Industries SOLUTIONS PRODUCTS Retail E-SPIN Feature Solutions for Retail Industries SOLUTIONS PRODUCTS Industry Telecommunications Telecommunications E-SPIN Feature Solutions for Telecommunications Industries SOLUTIONS PRODUCTS Transportation E-SPIN Feature Solutions for Transportation Industries SOLUTIONS PRODUCTS Travel E-SPIN Feature Solutions for Travel Industries SOLUTIONS PRODUCTS
Competencies in Application Performance Monitor (APM) Solutions

Nowadays, most of us use our smart phone to search for the nearest food delivery services, that unknown place for job interview, and even route planning for vacation. But, little did we know, we are actually are applying an innovation technology called spatial computing. Spatial computing refers to set of ideas, solutions, tools, technologies and

Welcome to the new age of Universal Memory hardware generation, if you have followed the technology trends since 1980 you will notice that the memory architecture seldom changes and finally the DRAM will be replaced by Universal Memory, unless they have better cost-performance breakthroughs. Instead of having so many types of memory, for CPU, for

We are in the age of Cloud Infrastructure and Platform Services (CIPS), as cloud computing continues to evolve and new terms keep coming out and attempt to provide scope for both the market and industry. CIPS service providers, in the global scale, have only a few due to the global scale operation involved and are

After a year and a half of lockdowns in the various forms, and at this point of time in the next normal. Majority of the people at large have evolved at the minimum 10 years before COVID-19 pandemic, which also breaks the chain for most of previous behavior, and substitutes with the digital experience (DX).

What is an application security testing? Application security testing is a part of crucial software development process that makes new or updated software applications do not contain security vulnerabilities as well as being more resistance to security threats. Organisations have begun to adopt DevOps practice as a way to speed up the process to deliver

The CI/CD pipeline security cannot be compromised as it is the core component within a development process. The following describes four best practices to secure your CI/CD pipeline. First, tighten the access control. Access control is viewed as the first layer of protection of the CI/CD pipeline, thus the access to the CI/CD pipeline should

Today, in the modern software development market demand, the implementation of Continuous integration/continuous delivery (CI/CD) pipelines is no longer an exception. This is because CI/CD pipelines are capable in improving the workflow of software delivery through a fully-automated process efficiently. However, these capabilities do not eliminate the vulnerabilities that exists in the CI/CD pipelines that

In recent years, many companies had shifted to Agile software development methodologies in order to adapt the rapidly changing business demands in IT projects. The following are among the benefits of Agile software development methodologies: Fast Feedback Cycle In Agile methodology, the project is broken into sprints. This allows the team and product owner to

The key to a good software development is to provide satisfying respond to the customer demands. However, the responds provided depend on the software development methodology applied by the company which is either traditional software development methodologies or Agile software development methodologies. What are the differences between the two methodologies? Firstly, the traditional software development

Agile methodology can be defined as a software development framework approach that are based on the values and principles written in the Agile Manifesto. The agile methodology is usually used by the agile team only as a starting point and later improvised and customized to meet the customer satisfaction. The most popular examples of Agile

Software development life cycle (SDLC) refers to the workflow of the process which describes the main stages and activities of development cycles. The primary objective of SDLC is to produce high-quality software that fulfils or exceeds the end-user demand. There are various software development models used during the development of the software process. The models

Solarwinds Log & Event Manager Product Overview by E-SPIN

Agile development is one of the many type of software development methodology and more often known as Agile software development. The term agile refers to software development approaches that involve continual planning, learning, improvement, team collaboration, evolutionary development and early delivery. The purpose of agile development methodology is to shorten the software development process as

Data Center Automation and Orchestration Layers

The adaptation layer is always used when sending the data over PHY and MAC layers. For example, how an IPv6 packet is encapsulated in an Ethernet frame is defined by RFC2464. It is also the same for IEEE 802.11 Wi-Fi. RFC 6282 defines how an IPv6 data frame is encapsulated over an IEE 802.15.4 radio

Model Operations (ModelOps) is to focus primarily on the governance and life cycle management of a wide range of operationalized AI (Artificial Intelligence) and decision models. This includes knowledge graphs, optimization, rules, machine learning, agent-based models, and linguistics. Model Operations (ModelOps) is at the center of every organization’s enterprise AI approach, if you are yet

The Internet of Things, What you need to understand?

Internet and other networks nowadays is based on IPv4 with 32-bit addresses, which limits the address space to 4,294,967,296 unique addresses. While the addresses were assigned to users, the unassigned addresses will naturally be decreased. On 3rd Feb 2011, the IPv4 address exhaustion has occurred while it had been delayed by address changes such as

The uplink to the Internet is handled by the Access Point (AP) acting as an IPv6 router. Several different devices are connected to the AP in a typical setup, such as PCs, servers, etc. The 6LoWPAN network is connected to the IPv6 network using an edge router. The edge router handles three actions which are:

Network

IPv6 over Low-Power Wireless Personal Area Networks or 6LoWPAN for short is originated from the concept that even the smallest devices should also have an access to the Internet Protocol. These smallest devices or low-power devices with limited processing capabilities should be able to participate in the Internet of Things as well. The 6LoWPAN group

Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine

What is security governance? Basically every company have their own framework of standards, processes and company activities to ensure the whole organisation run smoothly everyday. All this company data and activities must be keep in private and only authorized people can access the data and activities. This is security governance or in other simpler word

E-SPIN Integrated Cyber Security Center Facility

World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To

Data Center Automation and Orchestration Layers

There are entire organizations that are born from a cloud model which resides within the data center. Looking ahead, new cloud and data center control systems will only continue to become more critical. As more users utilize content delivered directly from cloud resources, the data center will need to be able to handle the influx

E-SPIN Unified Vulnerability Management (UVM) Explained

From real-time data analysis and enhanced application performance to much lower operating costs and scheduled downtime, there are plenty of reasons as to why organizations might begin to employ edge computing technologies into their network infrastructure, but what individual technologies are enabling enhanced networks such as 5G? How are they improving existing network infrastructures and

Competencies in Application Performance Monitor (APM) Solutions

Adoption of edge computing and applications will ultimately be determined by how well these technologies mesh with business goals and will depend on whether an organization has the resources to effectively implement, manage and monetize them. Several industries are particularly well poised to benefit from edge computing: 1. Smart cities. Edge computing can apply broadly

Top 5 Edge Computing Applications for Micro Data Center

Edge computing is used to push applications, data and services away from centralized nodes to the logical extremes of a network. It also enables analytics and knowledge generation to occur at the source of the data. Schneider Electric Micro DC Xpress It is a line of connected products that make it faster, easier and more

Since new products like composable infrastructure and on-premises cloud platforms could offer a way to achieve software-defined infrastructure (SDI) and software-defined data center (SDDC), you can see as new opportunity and path to do it, but you also need to aware for the pitfalls. Virtualization changed the data center when hypervisors and virtual machines abstracted

AI take over IT job

AI take over massive of IT job that in the past manual and brain work intensive work such as data entry, manipulate data, compile report and reactive, passive job that waiting for service request and then react, and off course majority of repeated work. From the news headline this year along, we saw Microsoft, Oracle,

Network

At the blink of a few years, the Internet of Things (IoT) is being introduced and storms the market at the speed of light for adoption. If at this moment of time you still do not know the use of IoT for the various use cases and applications, this post will provide you a quick

Trend Micro Enterprise Security Suites Edition Trend Micro along the years had published various Enterprise Security Suites, despite the new package bundled, for existing customer can continue to renew what they previous subscribed. The package value is obvious for massive cost saving and more feature set available for user adoption. Protect and save with integrated,

Competencies in Application Performance Monitor (APM) Solutions
Nowadays, most of us use our smart phone to search for the nearest food delivery services, that unknown place for job interview, and even route planning for vacation. But, little did we know, we are actually are applying an innovation technology called spatial computing. Spatial computing refers to set of ideas, solutions, tools, technologies and
Welcome to the new age of Universal Memory hardware generation, if you have followed the technology trends since 1980 you will notice that the memory architecture seldom changes and finally the DRAM will be replaced by Universal Memory, unless they have better cost-performance breakthroughs. Instead of having so many types of memory, for CPU, for
We are in the age of Cloud Infrastructure and Platform Services (CIPS), as cloud computing continues to evolve and new terms keep coming out and attempt to provide scope for both the market and industry. CIPS service providers, in the global scale, have only a few due to the global scale operation involved and are
After a year and a half of lockdowns in the various forms, and at this point of time in the next normal. Majority of the people at large have evolved at the minimum 10 years before COVID-19 pandemic, which also breaks the chain for most of previous behavior, and substitutes with the digital experience (DX).
What is an application security testing? Application security testing is a part of crucial software development process that makes new or updated software applications do not contain security vulnerabilities as well as being more resistance to security threats. Organisations have begun to adopt DevOps practice as a way to speed up the process to deliver
The CI/CD pipeline security cannot be compromised as it is the core component within a development process. The following describes four best practices to secure your CI/CD pipeline. First, tighten the access control. Access control is viewed as the first layer of protection of the CI/CD pipeline, thus the access to the CI/CD pipeline should
Today, in the modern software development market demand, the implementation of Continuous integration/continuous delivery (CI/CD) pipelines is no longer an exception. This is because CI/CD pipelines are capable in improving the workflow of software delivery through a fully-automated process efficiently. However, these capabilities do not eliminate the vulnerabilities that exists in the CI/CD pipelines that
In recent years, many companies had shifted to Agile software development methodologies in order to adapt the rapidly changing business demands in IT projects. The following are among the benefits of Agile software development methodologies: Fast Feedback Cycle In Agile methodology, the project is broken into sprints. This allows the team and product owner to
The key to a good software development is to provide satisfying respond to the customer demands. However, the responds provided depend on the software development methodology applied by the company which is either traditional software development methodologies or Agile software development methodologies. What are the differences between the two methodologies? Firstly, the traditional software development
Agile methodology can be defined as a software development framework approach that are based on the values and principles written in the Agile Manifesto. The agile methodology is usually used by the agile team only as a starting point and later improvised and customized to meet the customer satisfaction. The most popular examples of Agile
Software development life cycle (SDLC) refers to the workflow of the process which describes the main stages and activities of development cycles. The primary objective of SDLC is to produce high-quality software that fulfils or exceeds the end-user demand. There are various software development models used during the development of the software process. The models
Solarwinds Log & Event Manager Product Overview by E-SPIN
Agile development is one of the many type of software development methodology and more often known as Agile software development. The term agile refers to software development approaches that involve continual planning, learning, improvement, team collaboration, evolutionary development and early delivery. The purpose of agile development methodology is to shorten the software development process as
Data Center Automation and Orchestration Layers
The adaptation layer is always used when sending the data over PHY and MAC layers. For example, how an IPv6 packet is encapsulated in an Ethernet frame is defined by RFC2464. It is also the same for IEEE 802.11 Wi-Fi. RFC 6282 defines how an IPv6 data frame is encapsulated over an IEE 802.15.4 radio
Tagged under: ,
Model Operations (ModelOps) is to focus primarily on the governance and life cycle management of a wide range of operationalized AI (Artificial Intelligence) and decision models. This includes knowledge graphs, optimization, rules, machine learning, agent-based models, and linguistics. Model Operations (ModelOps) is at the center of every organization’s enterprise AI approach, if you are yet
The Internet of Things, What you need to understand?
Internet and other networks nowadays is based on IPv4 with 32-bit addresses, which limits the address space to 4,294,967,296 unique addresses. While the addresses were assigned to users, the unassigned addresses will naturally be decreased. On 3rd Feb 2011, the IPv4 address exhaustion has occurred while it had been delayed by address changes such as

6LoWPAN network architecture

The uplink to the Internet is handled by the Access Point (AP) acting as an IPv6 router. Several different devices are connected to the AP in a typical setup, such as PCs, servers, etc. The 6LoWPAN network is connected to the IPv6 network using an edge router. The edge router handles three actions which are:
Tagged under: , ,
Network

What is 6LoWPAN and its functions

IPv6 over Low-Power Wireless Personal Area Networks or 6LoWPAN for short is originated from the concept that even the smallest devices should also have an access to the Internet Protocol. These smallest devices or low-power devices with limited processing capabilities should be able to participate in the Internet of Things as well. The 6LoWPAN group
Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and

Cloud Security Governance

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

Security Governance Framework

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight
TOP