The Committee on Information Technology of the Institute of Chartered Accountants of India has issued a technical guide on IT Migration Audit. We are pleased to have been involved in this initiative of the Institute. We thank the Institute for acknowledging the contribution of the Qadit team comprising of CA N Venkatakrishnan (Special Invitee of the Committee on Information Technology of the Institute of Chartered Accountants of India), CA Mahesh Balan, CA V Vijayakumar, CA N Swameshwar and CA Suresh Rangarajan in the Preface of the publication.
Continue reading “Technical guide on IT Migration Audit”
SOA Security Model has been doing rounds in recent past in many forums. This prompted me to write on SOA security aspects through a 3 part article. Through this ‘Part 1’, let me introduce you to SOA. A Service Oriented Architecture (SOA) is a framework for integrating business process and supporting IT infrastructure as secure, standardized components services that can be reused and combined to address changing business priorities.
Continue reading “SOA Security – Part 1 – Intro to SOA”
The most general description of the CPU is that it is the brain of the computer. This is what everyone is familiar with. Let’s delve a little deeper.
Continue reading “Tech Terminology Demystified – The CPU”
RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”
XBRL or eXtensible Business Reporting Language is an XML dialect developed for business reporting purposes. It is increasingly becoming the standard for communication of information between businesses on the internet. Continue reading “XBRL – An introduction”
As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?
Continue reading “MPLS Architecture – An Overview”
Information rights management is a technology which aims to protect sensitive and critical documents and information while at the same time ensuring that it is made available for genuine needs. For example, two companies may negotiate to trade a patent during which the patent details would be made available to the buying company. Despite signing an NDA, if the deal doesn’t happen, the company which was supposed to buy the patent can come out with a new product based on that patent (whose details were made available to it during negotiation stage) with some modifications. Continue reading “Information Rights Management – An Introduction”