Integration: An Architecture Example
The Problem: You have five applications, one that manages item information, one that needs that item information for back office operations, and the others use that item information for work management. Now you need to…
Questions We’re Hearing and Asking Around Streaming Data
Data Flow: What Is It? Data in motion, or streaming data, involves tools around capturing, routing and processing data. It also naturally leads into discussions around the best place to store or land the data…
Choosing an Identity Governance Tool
Choosing new software is never easy. Coming up with selection criteria means that you need to understand your company’s needs and strengths. What questions should you ask to determine which identity governance tool is right…
Why Machine Learning Should Be a Part of Your Marketing Strategy
Today’s strategic marketing departments are looking to do more with the data that’s available to them. But for anyone who has started down this journey, you soon realize that having a lot of data doesn’t automatically…
Migrating from Struts 2.x to Struts 2.5
If you are maintaining code, you may find yourself in a situation where you need to upgrade your framework to the latest version. Zirous maintains code bases for multiple clients, and recently we found a…
Another Day, Another Breach
If your company was fined $123 million for doing something wrong, you’d probably do everything you could to avoid it happening again, wouldn’t you? UK authorities fined Marriott $123 million for the 2018 Starwood breach…
Customers First: Strategies to Reap the Benefits of a CDP for a Centralized Customer View
Your Data Integration and Streaming Strategy
How does your data get to its destination? Is it on time? Can you identify the correct data strategy for different use cases in your organization? Being able to answer these questions is a major…
Sign On: Not As Simple As It Sounds
“Sign-on” and “login” have grown by leaps and bounds since the phrases first came into use. They used to just refer to validating a username and a password before allowing a user to access protected/secured…