SaaS Infrastructure is the first key component to building a secure Software as a Service platform. This article is one in a series of articles discussing how to build a secure SaaS platform. Infrastructure experts will quickly chew threw this article but the evolution may help developers understand the evolution of their creations. Step 1: building somewhere for your solution …
Employee Self-Service does for HR what ATMs do for banks. Where do you start with a solution like this and is it not only for big business? The short answer its for any business who wants a professional HR department. The more staff you have, the more an ESS saves you time, money and hassle. This article looks at where …
Technology titles vary from business to business and country to country but which title most appropriately suits your role. This article examines the general focus areas of the roles tries to help you understand where you fit in your business. Thomas Jefferson the 3rd president of America said “Do you want to know who you are? Don’t ask. Act! Action …
Technology Stacks are grouped combinations of technical choices. The influence on your business is significant. What are the tech guys on about? Often abbreviated to single letters these phrases will influence your technical choices for years to come so it’s worth knowing what they are and how they will affect your business. This is a name dropping article under general …
Cipher suites are collections of ciphers and used to keep data secure across the Internet. This article explores what a cipher is and a cipher suite does. Please consider this a “general” introduction to the area. I skirt past a lot of the math and operational precision of what goes into specific modern cipher suites. I do this in favour …
Cookies are a term used in browsing the internet but what are they really. This article explains in as non-technical a way as possible what a cookie is, does and the pros and cons of them. Cookies save so much effort but can be abused. Here’s what cookies do for you. Browsing basics Saving you time Sense checks [read …
To build a beautiful interface is traditionally difficult due to subjectivity with beauty in the eye of the beholder. However as you try to articulate your ideas and wonder what a system could look like this article allows a computer user articulate their ideas very visually with little effort. This is a fun try it and see article for every …
Breaches pose the biggest threat to modern business currently and seem to happen frequently with difficult consequences. What is a breach, why they happen and what can you as a manager do to limit them. This is non-techy article. This article seeks to help non technical managers understand the challenges faced by IT and Security teams and what can be …
Person-centric design is a way of perceiving systems and data that focuses on the people rather than the system. A person-centric approach is a strategic win for your business. This article introduces the area and its advantages and offers a way of updating your approach without throwing out the baby and the bathwater. Focused on solutions from a business / …
The Information Systems Pyramid provides a context for managers to be able to request reports and systems to give information at different levels. The model developed in the 1980s still has relevance for modern business but the definitions need some review. This article seeks to contextualise reporting levels for managers to further discussions with their IT teams. This article should …