Category Archives: Blog

New – AWS Step Functions Workflow Studio – A Low-Code Visual Tool for Building State Machines

AWS Step Functions allow you to build scalable, distributed applications using state machines. Until today, building workflows on Step Functions required you to learn and understand Amazon State Language (ASL). Today, we are launching Workflow Studio, a low-code visual tool that helps you learn Step Functions through a guided interactive interface and allows you to […]

It’s Officially Startup Season in Space

There was a time not so long ago that space was known as the final frontier—the exclusive domain of governments and a small handful of aerospace companies who could muster the technology and resources to depart the Earth’s atmosphere. Today, however—similar to what we’ve observed with technologies like artificial intelligence and quantum computing that were […]

Getting Future Ready with a Modernized Hybrid Cloud Environment

Hybrid cloud is the foundation in which modernized organizations are built, and organizations need a modern platform and infrastructure to get the most out of their hybrid cloud environments. Organizations need to deliver products and services without being hindered by the complexities of legacy environments, outdated infrastructure, and confusing operating models and workflows. Ronald van […]

Getting Future Ready with a Modernized Hybrid Cloud Environment

Hybrid cloud is the foundation in which modernized organizations are built, and organizations need a modern platform and infrastructure to get the most out of their hybrid cloud environments. Organizations need to deliver products and services without being hindered by the complexities of legacy environments, outdated infrastructure, and confusing operating models and workflows. Ronald van […]

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with access to the latest technology, top hackers, financing and often, nation-state backing. What is a company’s Chief Information Security Officer (CISO) to do when […]