This paper, along with its companion spreadsheet, is intended for an in-depth comparison of multiple cloud platforms. The comparison focuses on each of the various services and calls out unique aspects which might inform a customer’s decision to choose one cloud over the other, depending on their specific business and technical requirements.
A well-trained Artificial Intelligence (AI) model with its continuous learning opportunities far exceeds the capabilities of humans to manually identify fraudulent transactions, investment opportunities, or prospective clients for loans or credit cards. In this white paper, we explore the applications of AI in the financial sector.
By 2020, there will be tens of millions of connected devices around the world — from tires to baby monitors. But with each new connected device comes a new security threat. In this paper, we explore security threats across the device, network, and cloud infrastructure layers — as well as how to develop more secure end-to-end IoT solutions.
The implementation of DevOps in brownfield projects (i.e., ones where existing products or services are already providing value to customers) requires multiple moving pieces, from assessing a client’s current usage of DevOps practices and technical means (if any), to enhancing continuous learning and experimentation culture within a client’s IT organization. In this paper, we will explore techniques used by GlobalLogic consultants to achieve these goals.
This white paper describes current test automation challenges, proper usage of Cucumber JVM BDD in Agile development, setup with Spring Boot, and Jenkins integration.
In this video, Robert Starmer, CTO, Kumulus Technologies, discusses the sometimes surprising sources of inefficiencies when using cloud services—as well as teaching you about cutting-edge tools and models you can use to combat them, both in public and private settings.
Although REST APIs can provide a fast and consistent mobile end user experience, it also raises new security concerns. This whitepaper focuses on various security threats, considerations, and use cases for managing API security.
If we can make various home automation products that work together available in the market, there are endless possibilities. In this paper, we will elaborate on how an end-to-end home automation solution is possible and what tools, devices, framework, and technologies will play a role in the same.
Click OK to continue browsing the GlobalLogic site. Be aware you can disable Cookies at any time.