IP Spoofing is used to gain unauthorized access to a network by impersonating a source with authorized access. IP spoofing is a cyber attacking technique. In this white paper, we demonstrate how hackers can access your information through IP spoofing — and what steps you can take to prevent it.
This paper, along with its companion spreadsheet, is intended for an in-depth comparison of multiple cloud platforms. The comparison focuses on each of the various services and calls out unique aspects which might inform a customer’s decision to choose one cloud over the other, depending on their specific business and technical requirements.
A well-trained Artificial Intelligence (AI) model with its continuous learning opportunities far exceeds the capabilities of humans to manually identify fraudulent transactions, investment opportunities, or prospective clients for loans or credit cards. In this white paper, we explore the applications of AI in the financial sector.
By 2020, there will be tens of millions of connected devices around the world — from tires to baby monitors. But with each new connected device comes a new security threat. In this paper, we explore security threats across the device, network, and cloud infrastructure layers — as well as how to develop more secure end-to-end IoT solutions.
The implementation of DevOps in brownfield projects (i.e., ones where existing products or services are already providing value to customers) requires multiple moving pieces, from assessing a client’s current usage of DevOps practices and technical means (if any), to enhancing continuous learning and experimentation culture within a client’s IT organization. In this paper, we will explore techniques used by GlobalLogic consultants to achieve these goals.
This white paper describes current test automation challenges, proper usage of Cucumber JVM BDD in Agile development, setup with Spring Boot, and Jenkins integration.
Although REST APIs can provide a fast and consistent mobile end user experience, it also raises new security concerns. This whitepaper focuses on various security threats, considerations, and use cases for managing API security.
If we can make various home automation products that work together available in the market, there are endless possibilities. In this paper, we will elaborate on how an end-to-end home automation solution is possible and what tools, devices, framework, and technologies will play a role in the same.
Network Functions Virtualization is no longer a matter of if, but when. Replacing proprietary physical devices by their software analogues offers a long list of benefits and advantages. But you need a standard for realizing them, which we’ll address in this white paper.
Click OK to continue browsing the GlobalLogic site. Be aware you can disable Cookies at any time.