<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jasveen Singh</title>
    <description>The latest articles on DEV Community by Jasveen Singh (@jasveensingh22).</description>
    <link>https://dev.to/jasveensingh22</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F849982%2F0bbd1ef7-b432-4de4-b727-05666b18463c.jpg</url>
      <title>DEV Community: Jasveen Singh</title>
      <link>https://dev.to/jasveensingh22</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jasveensingh22"/>
    <language>en</language>
    <item>
      <title>Secure Access Service Edge (SASE) - A Detailed Overview</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Wed, 07 Sep 2022 07:33:42 +0000</pubDate>
      <link>https://dev.to/hughes-systique/secure-access-service-edge-sase-a-detailed-overview-j61</link>
      <guid>https://dev.to/hughes-systique/secure-access-service-edge-sase-a-detailed-overview-j61</guid>
      <description>&lt;p&gt;Today's rapidly evolving enterprise networks are highly reliant on cloud-based applications to run a multitude of business operations and use cases. In addition, the growth in the need for connectivity for business use-cases and mobile/remote users has resulted in the traditional enterprise network expanding beyond the network edge, thus bringing in a challenge to guard, secure and manage the network edge against vulnerabilities. Therefore, it is imperative for network owners to keep up with the latest &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;security&lt;/a&gt; practices, frameworks and tools, rendering VPN-only solutions obsolete.&lt;/p&gt;

&lt;p&gt;For enterprises to remain safeguarded and competitive in today's network landscape with a zero-downtime, all network endpoints must be secured and managed with the same security and networking policies as their on-premises infrastructure. This is what makes a use case for &lt;strong&gt;SASE&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The term SASE was coined by Gartner in 2019 &amp;amp; was introduced to bring a highly customizable network with security services seamlessly stitched into the cloud platform. &lt;a href="https://www.fortinet.com/resources/cyberglossary/sase"&gt;Secure Access Service Edge (SASE)&lt;/a&gt; architecture refers to a cybersecurity environment that brings advanced protection right out to the farthest edge of the network: the endpoints of users. In this SASE architecture definition, users are provided robust security features directly to their devices from the cloud, enabling them to connect securely from anywhere.&lt;/p&gt;

&lt;p&gt;SASE brings multiple cloud-native security technologies together—Secure Web Gateway (SWG), Cloud Access Security Bearer (CASB), Zero Trust Network Access (ZTNA), and Firewall Solution as a service (FWaaS) with WAN capabilities to help users and systems connect securely to a service or any application; anytime and anywhere. Furthermore, since there is a need to make the ecosystem operations agile, the network's security is delivered as a service from a centrally managed cloud.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Market Predictions for SASE
&lt;/h2&gt;

&lt;p&gt;With a 20% adoption rate expected by 2023, &lt;a href="https://www.frontier-enterprise.com/getting-started-with-sase-a-guide-to-secure-and-streamline-your-network-infrastructure/"&gt;Gartner&lt;/a&gt; claimed that the demand for SASE capabilities would "redefine enterprise network and network security architecture and reshape the competitive landscape". While SASE frameworks won't be implemented in a day, the route to SASE is gaining speed and urgency. Another research by &lt;a href="https://www.gartner.com/doc/reprints?id=1-2AFG4P9S&amp;amp;ct=220627&amp;amp;st=sb"&gt;Palo Alto Networks and Gartner&lt;/a&gt; predicts the following for the future of SASE:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access using a SASE/SSE architecture, up from 20% in 2021.&lt;/li&gt;
&lt;li&gt;By 2025, 65% of enterprises will have consolidated individual SASE components into one or two explicitly partnered SASE vendors, up from 15% in 2021.&lt;/li&gt;
&lt;li&gt;By 2025, 50% of SD-WAN purchases will be part of a single vendor SASE offering, up from less than 10% in 2021.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  SASE Architecture and Components:
&lt;/h2&gt;

&lt;p&gt;SASE network architecture provides cloud security to the farthest end of the network without relying on specific infrastructure. It allows users to connect directly to the cloud while enjoying security running on their devices. It enables a secure connection and decrease in latency resulting from backhauling to the data centre's firewall.&lt;/p&gt;

&lt;p&gt;SASE services involve cloud-hosted security, zero-trust network access (ZTNA) components, and network services components.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud-hosted Security:&lt;/strong&gt;&lt;br&gt;
Cloud-hosted security enables devices to be independent of relying on security hosted on a physical data centre.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Firewall-as-a-Service (FWaaS)&lt;/strong&gt;: FWaaS provides standard hardware firewall services using software in the cloud. Users do not have to connect to a physical firewall &amp;amp; data transmissions are protected through the cloud-hosted software.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secure Web Gateway (SWG)&lt;/strong&gt;: Secure Web Gateway blocks unauthorized traffic from getting into the network, thus protecting the network from intrusions. In SASE architecture, an SWG is implemented for every device connected to your network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloud Access Security Broker (CASB)&lt;/strong&gt;: CASB is positioned between the user and the cloud-based application they are trying to access. It monitors, implements and enforces an enterprise's security policies.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Zero-trust Network Access (ZTNA) Components:&lt;/strong&gt;&lt;br&gt;
Zero trust network access (ZTNA), also known as the &lt;a href="https://www.zscaler.com/resources/security-terms-glossary/what-is-software-defined-perimeter"&gt;software-defined perimeter (SDP)&lt;/a&gt;, is a set of technologies and functionalities that enable secure access to internal applications for remote users. It operates on an adaptive trust model, where trust is never implicit, and access is granted on a need-to-know, least-privileged basis defined by granular policies.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt;: Authentication involves verifying the user and device they claim to be. This is usually achieved using multi-factor authentication (MFA).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authorization and Control&lt;/strong&gt;: Authorization involves choosing where a user is authorized to access a network. Control includes restricting their movement within the network's environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitoring&lt;/strong&gt;: Monitoring in a SASE architecture is critical to security. It involves checking which devices are connected, their activity, quality and volume of data exchange using those devices, etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Network Services Components&lt;/strong&gt;&lt;br&gt;
Network services components facilitate optimized path selection and application-based routing within the SASE architecture.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Optimized Path Selection: Optimized path selection involves ensuring the paths of different traffic brackets are directed to the right resources at the appropriate times. This is usually achieved using an SD-WAN solution that can decide the network traffic routing and its management to ensure low latency and a high-efficiency network.&lt;/li&gt;
&lt;li&gt;Application-based Routing: Application-based routing gives the user access to the specific applications they need access to complete their designated work. This allows a SASE architecture to provide seamless &amp;amp; safe remote access to workers anytime and anywhere.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i7OtO5cf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3ewpr4edfp5qexv5sdf4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i7OtO5cf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3ewpr4edfp5qexv5sdf4.png" alt="high level SASE Architecture" width="602" height="342"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Benefits of SASE:
&lt;/h2&gt;

&lt;p&gt;Traditionally, network security was hosted on the network edge within the corporate perimeter and the data centre, with all traffic routed through the data centre for validation and check. A SASE-based approach moves these capabilities to the cloud, where multiple applications are hosted, reducing the latency between the user and application and backhaul requirements.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uF0hRg6V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zt22fxsyeatejqdt8l8h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uF0hRg6V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zt22fxsyeatejqdt8l8h.png" alt="Benefits of SASE" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Higher Efficiency in Hybrid/Remote Work Model:&lt;/strong&gt; The legacy and traditional remote security models are increasingly becoming outdated and vulnerable to hackers due to broad use. A unified security service over a single cloud platform eliminates delays as traffic 'trombones' between different point security solutions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Higher IT Operational Efficiency:&lt;/strong&gt; One of the benefits of SASE is that IT teams no longer need VPN licenses for each user and troubleshoot network security hardware or provide different security access systems within the same network. This increases the IT team's operational efficiency.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reduce Hardware Costs:&lt;/strong&gt; Buying network security hardware is expensive as a standalone device as purchasing network firewalls and DDoS mitigation boxes do not help. The costs incurred are always on the higher side with CAPEX and OPEX involved (installation, warranties, repairs, patch management, updates, etc.). These costs can be eliminated by moving network security to the cloud can create additional savings.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A centralized policy with local enforcement:&lt;/strong&gt; SASE enables Cloud-based centralized security management with distributed enforcement and decision-making for the network stakeholders and users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Agility &amp;amp; transparency:&lt;/strong&gt; SASE promises a consistent application experience anywhere &amp;amp; on any device. It also reduces operational overhead by recognizing and updating new threats and policies without new hardware or software.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The approach to adopting SASE:
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.juniper.net/content/dam/www/assets/eguides/us/en/sase-beyond-the-hype.pdf"&gt;Juniper Networks&lt;/a&gt; recommends the following approach for the adoption of SASE:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Data distribution model: Looking at the data holistically as the data would likely be stored in multiple places.&lt;/li&gt;
&lt;li&gt;Protection for data in transit and at rest: Ensuring consistency in policies and procedures over data within the environment (both edge and at rest). Access control, encryption and segmentation of data.&lt;/li&gt;
&lt;li&gt;Centralized visibility and policy control: A transparent approach to documenting people within the network, the data shared by them, the connections accessed by them, access authorization, policy towards handling noncompliance, etc. Ensuring attention is focused on the entire network and not just the edge.&lt;/li&gt;
&lt;li&gt;Improvement areas, addressing efficiency: Looking cohesively at the current projects &amp;amp; if they would need to accommodate cloud-hosted services in the next 2-4 years, backup services considerations (local or cloud-based), dealing with sensitive services.&lt;/li&gt;
&lt;li&gt;Data segmentation over data centre and multiple public clouds: Handling security mishaps at the edge. Adopting a fool-proof approach to protect sensitive data residing at the data centre. Keeping visibility throughout the environment, not just at the edge, keeps the data protected.&lt;/li&gt;
&lt;li&gt;Data flow path and migration: Inspecting the current data flow in the organization's on-premises deployment and ensuring smooth flow by making appropriate changes. A comprehensive plan to identify how the data would move to ensure its integrity across environments.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Conclusion:
&lt;/h2&gt;

&lt;p&gt;The focus on adopting SASE and Secure Edge within organizations continues to grow, pushing a broader basket of integrated cloud-based cybersecurity technologies into a more consumable form. The industry would see some consolidation, integration, and M&amp;amp;A in the SASE market over the years as the number of players in the SASE market continue to grow globally. SASE promises to handle vulnerabilities at every network edge: data centre, branch, cloud &amp;amp; mobile. Currently, these solutions come from varied vendors; hence interoperability will be critical for all vendors. This could also drive their consolidation approaches from enterprises &amp;amp; demand for the adoption of unified SASE solutions.&lt;/p&gt;

</description>
      <category>network</category>
      <category>productivity</category>
      <category>cloud</category>
      <category>security</category>
    </item>
    <item>
      <title>The Intersection of 5G &amp; Artificial Intelligence</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Tue, 23 Aug 2022 05:48:13 +0000</pubDate>
      <link>https://dev.to/hughes-systique/the-intersection-of-5g-artificial-intelligence-9k3</link>
      <guid>https://dev.to/hughes-systique/the-intersection-of-5g-artificial-intelligence-9k3</guid>
      <description>&lt;p&gt;Before we delve into the topic, let us first develop a rudimentary understanding of what a 5G network actually is. These are digital cellular networks whose area of service is subdivided into small geographic sections called cells.&lt;/p&gt;

&lt;p&gt;5G technology, like 4G, operates on a wide variety of radio spectrum allotments, although it can cover a larger area than existing networks. There are two separate frequency bands in 5G, each of which works in a different way. Sub-6 is the most popular type of 5G; however, there is also mmWave.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZyCSjS1g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/puzdm5hma6wrqa6l1kdn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZyCSjS1g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/puzdm5hma6wrqa6l1kdn.png" alt="5G Millimeterwave" width="880" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source: &lt;a href="https://www.accton.com/Technology-Brief/the-emergence-of-5g-mmwave/"&gt;accton.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sub-6&lt;/strong&gt;: Encompasses all &lt;a href="https://hsc.com/Resources/Blog/How-5G-Is-Enabling-Network-as-a-Service"&gt;5G operations&lt;/a&gt; below 6Ghz. Due to existing 4G LTE networks (which run at lower frequencies), all carriers possess a Sub-6 network in some capacity. The Sub-6 spectrum is critical to the widespread rollout of 5G due to the expansion possibilities without building new cell towers and the ability to travel longer distances and penetrate objects. Essentially, Sub-6 is the component of 5G which allows for better coverage and signal strength.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mmWave&lt;/strong&gt;: Short for millimeter wave, this is the component of 5G offering with supercharged data transfer rates and low latencies through extremely high-frequency radio waves ranging from 24GHz to 100GHz. The caveat with these ultra-short wavelengths is the limited range and inability to pass simple objects. Hence, the idea of these two frequency bands (Sub-6 and mmWave) is to account for the inefficiencies of each other.&lt;/p&gt;

&lt;p&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/5G-Networks-The-evolution-and-trends-today"&gt;5G Networks: The evolution and trends today&lt;/a&gt;)&lt;/p&gt;

&lt;h2&gt;
  
  
  AI Solves the Problem of 5G Spectrum Allocation
&lt;/h2&gt;

&lt;p&gt;Traditionally, the radio spectrum has not been allocated in the most efficient manner possible. The government divides it into mutually incompatible frequency bands, after which the bands are allocated to various commercial and government agencies for exclusive usage. While the procedure helps services avoid interfering with one another, the owner of a piece of spectrum seldom utilizes it entirely all time. As a result, at any one time, a considerable portion of the allocated frequencies is unusable. &lt;/p&gt;

&lt;p&gt;Agencies such as DARPA have sought to solve this spectrum allocation issue through artificial intelligence. The concern behind the initiative was that the increasing application of &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Wireless-Engineering/"&gt;wireless technologies &lt;/a&gt;carries the risk of overcrowded airwaves that our devices require to communicate.&lt;/p&gt;

&lt;p&gt;The idea was to create new communication equipment that does not always transmit on the same frequency. The proposed solution was to employ machine-learning techniques to discover the accessible frequencies. They seek to transition from a system controlled by ‘pen and paper’ to one controlled by AI algorithms autonomously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How AI can help in spectrum allocation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Precise Cognition&lt;/strong&gt;: AI can manage the usage of the spectrum pool and avoid radio frequency interference as it can monitor the situation of all nodes well, even in weak environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intelligent Scheduling&lt;/strong&gt;: Due to multi-system (4G &amp;amp; 5G) coexistence, the changes in network traffic hotspots are harder to predict. Based on the actual traffic demand, the algorithm can adapt the system capacity between 4G and 5G. This allows all equipment to maintain optimal performance intermittently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deployment Efficiency&lt;/strong&gt;: To support a wide range of business demands, rapid application development, and gain a quick return on investment from users, it’s critical to assist customers in getting the most out of 5G. This can be done by swiftly launching apps using AI’s efficient deployment capabilities. The top planners, operators, developers, infrastructure suppliers, and other stakeholders can work together to achieve rapid deployment through AI.&lt;/p&gt;

&lt;h2&gt;
  
  
  AI-Driven Data Analytics
&lt;/h2&gt;

&lt;p&gt;Using multidimensional correlation across the place, time, context, and state, AI can expose the linkages, dependencies, co-occurrences, and casualties. Thus, reducing alerts to focused, prioritized actions. Some key dimensions to consider are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Space&lt;/strong&gt;: Network and service topology that connects infrastructure to user location and experience&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Time&lt;/strong&gt;: Flow metrics, telemetry, and streaming data from passive and active monitoring&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Context&lt;/strong&gt;: metadata such as customer profiles, sentiment, external events such as weather, etc.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;State&lt;/strong&gt;: Status and configuration of traffic policies, network elements, port and flow statistics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AI can correlate events that would otherwise be separated across siloed systems by examining varied data sets across several dimensions. In other words, it has the ability to expose the unseen.&lt;/p&gt;

&lt;h2&gt;
  
  
  Other Uses of AI in 5G
&lt;/h2&gt;

&lt;p&gt;By increasing network quality and providing individualized services, AI is already being utilized to improve customer service and increase consumer experience through chatbots and virtual assistants.&lt;/p&gt;

&lt;p&gt;The greatest option for recouping the costs of transitioning networks to 5G is to use AI in network design.&lt;/p&gt;

&lt;p&gt;AI efforts are also being applied to improve network performance management.&lt;/p&gt;

&lt;p&gt;Managing SLAs, product life cycles, networks, and revenue are some areas where cellular decision-makers want to invest in AI.&lt;/p&gt;

&lt;p&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/Adopting-Multi-Access-Edge-Computing-MEC-into-5G-Networks"&gt;Adopting Multi-Access Edge Computing (MEC) into 5G Networks&lt;/a&gt;)&lt;/p&gt;

&lt;h2&gt;
  
  
  How AI Benefits from 5G
&lt;/h2&gt;

&lt;p&gt;Though AI has widespread adoption, &lt;a href="https://hsc.com/Resources/Blog/The-Evolution-of-5G-Networks"&gt;5G &lt;/a&gt;can still help bring advancements to the field of AI. For instance, &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Wireless-Engineering/"&gt;Machine Learning&lt;/a&gt; (ML) models require large data volumes to train, and as these models get more complex and powerful, they will need larger datasets.&lt;/p&gt;

&lt;p&gt;The low latency and high speed of 5G will allow analysts to swiftly gather, clean, and analyze enormous amounts of data. This will prompt the development of new analytics technologies in the near future.&lt;/p&gt;

&lt;p&gt;For example, driverless automobiles were previously limited and a pipedream due to the significant latency supplied by 2G, 3G, and even 4G networks. However, 5G networks will provide minimal latency and improved information processing in real-time. In fact, more broadly, the biggest impact that 5G will have on analytics is real-time data exchange and insights.&lt;/p&gt;

&lt;p&gt;Other AI applications such as automation, smart devices, AR, VR, and many others which form the basis of Industry 4.0 will be transformed with the help of 5G.&lt;/p&gt;

&lt;h2&gt;
  
  
  5G Network Architecture and URLLC
&lt;/h2&gt;

&lt;p&gt;The 5G architecture is comprised of 3 key service areas:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Massive Machine-Type Communications (mMTC)&lt;/strong&gt;: This component supports large numbers of simultaneously connected devices and hence will help transform industries such as IoT (Internet-of-Things) and Smart Cities. &lt;br&gt;
&lt;strong&gt;Enhanced Mobile Broadband (eMBB)&lt;/strong&gt;: This component supports high bandwidth demands and can transform industries such as AR, VR, and streaming.&lt;br&gt;
&lt;strong&gt;Ultra-reliable Low-Latency Communication (URLLC)&lt;/strong&gt;: This component will enable low latency and guaranteed connections.&lt;/p&gt;

&lt;p&gt;URLLC offers use cases that need high network dependability (above 99.999%) and extremely low data transfer latency (less than 1 millisecond). As safety requirements demand ultra-reliable connections, data would have to be shared in real-time with minimal delay. Because of the considerable danger involved, autonomous driving, for example, would necessitate such a connection.&lt;/p&gt;

&lt;p&gt;Autonomous driving has numerous advantages, ranging from time savings to increased safety due to the elimination of human mistakes. However, all vehicles would need to be connected vehicle-to-vehicle and vehicle-to-infrastructure, such as traffic light systems, emergency services, and road maintenance programs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smart factories and Industry 4.0&lt;/strong&gt; have comparable requirements, requiring real-time interaction between machinery and robotics. They may also need real-time data from other sensors located throughout the manufacturing facility. Low-latency solutions enable these machine-operated systems to improve manufacturing lines in a safe and effective manner.&lt;/p&gt;

&lt;p&gt;Other possible use-cases are remote and augmented reality healthcare, such as remote surgery, smart electricity distribution, and cloud-based gaming and entertainment.&lt;/p&gt;

&lt;p&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/An-Introduction-To-OpenRAN-ORAN"&gt;An Introduction to OpenRAN (ORAN)&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--axhgLa9u--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m3fd6ppzxyc6gi6uf0oc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--axhgLa9u--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m3fd6ppzxyc6gi6uf0oc.png" alt="LTE-5G" width="711" height="711"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source:&lt;a href="https://www.ericsson.com/en/reports-and-papers/ericsson-technology-review/articles/evolving-lte-to-fit-the-5g-future"&gt; ericsson.com&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Network Slicing
&lt;/h2&gt;

&lt;p&gt;Network slicing (also known as &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Network-Infrastructure-Engineering-Services/SDN"&gt;software-defined networking&lt;/a&gt; or SDN) will be another important 5G application. In addition to its low latency, it allows telecommunication companies to run several virtual networks on a single physical link. Providers will be able to ‘slice’ the network with 5G, meaning different networks and virtual layers will bring value to the business. Through data monetization, &lt;a href="https://hsc.com/Resources/Blog/Network-Slicing-in-5G-A-Move-For-Better-Performance"&gt;network slicing&lt;/a&gt; will enable the creation of new business models.&lt;/p&gt;

&lt;p&gt;Each slice functions as its own network, with its own provisioning, security, and service quality needs. As a result, mMTC, which has low security and bandwidth requirements, is isolated from URLLC, which has strong security and reliability requirements. Despite this, all these slices are connected by the same physical network architecture. &lt;/p&gt;

&lt;p&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/RAN-Slicing-Efficiency-Performance-Assurance"&gt;RAN Slicing: Efficiency, Performance, Assurance&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pMUwttvr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hu1obcf0x9f7oq4x1o6n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pMUwttvr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hu1obcf0x9f7oq4x1o6n.png" alt="5G Network Slicing" width="395" height="233"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source: &lt;a href="https://www.vanillaplus.com/2017/01/31/24983-network-slicing-unleashes-5g-opportunities-service-quality-can-assured-part-2/"&gt;vanillaplus.com&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Future Concerns with Increased Connectivity and Way Ahead
&lt;/h2&gt;

&lt;p&gt;As 5G networks adopt AI and thus increase reliance on software, the potential cybersecurity risks related to design flaws (from poor development processes) will begin to matter more. We can already see cases where entities must perform their due diligence to secure their networks. The best example is the ban imposed by many governments on Huawei as a 5G equipment supplier.&lt;/p&gt;

&lt;p&gt;Network equipment such as base stations and management functions are becoming more vulnerable to attacks. The dependence of mobile network operators on suppliers means an increase in the possible modes of attack. As a result, suppliers with low-risk profiles will be preferred. &lt;/p&gt;

&lt;p&gt;The consequence is that 5G security companies will need to expand to tackle the multidimensional security problem that comes with the next-generation technology. Simply banning a single provider would not be enough.&lt;/p&gt;

&lt;p&gt;It will take years to implement fully functioning 5G networks because the connectivity standards have yet to be established, and some aspects of the network have yet to be tested. Some businesses will gradually integrate it into their systems, while other industries, such as Data Analytics, will be quick to embrace 5G. Because it already deals with the challenge of managing petabytes of data that comes with present connectivity, the data analytics business may be the sector where 5 G’s promise will be fully realized. However, with 5 G’s promise of quick and real-time data analyses, the analytics and complex technologies derived from it will bring more potential for improvement.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>5g</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Understanding 5G Wireless Technology</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Wed, 03 Aug 2022 05:40:00 +0000</pubDate>
      <link>https://dev.to/hughes-systique/understanding-5g-wireless-technology-4kp6</link>
      <guid>https://dev.to/hughes-systique/understanding-5g-wireless-technology-4kp6</guid>
      <description>&lt;p&gt;Communication technology has been evolving at a fast pace for past two decades. During this time, &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Wireless-Engineering"&gt;wireless technology&lt;/a&gt; has also gone through many changes. From 3G and 4G, now we have companies expecting and preparing for 5G wireless technology. It’s the fifth-generation technology that might not have arrived yet, but OEMs have already started to make 5G enabled equipment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding 5G Wireless Technology
&lt;/h2&gt;

&lt;p&gt;In simple words, it is the improved wireless internet technology that will allow faster speeds and reduced latency. According to the recent estimates, data speeds using &lt;a href="https://searchnetworking.techtarget.com/definition/5G"&gt;5G technology&lt;/a&gt; can be up to 20Gbps with less than one millisecond latency. However, those figures are only theoretical now. Keep in mind that LTE-A technology can also achieve speeds of 300Mbps on paper, but you mostly end up with less than 50Mbps downloading speeds.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detailed Understanding of the 5G Technology
&lt;/h2&gt;

&lt;p&gt;A comparison between the 4G and 5G technology can give you a better idea of the changes that have come with the fifth generation wireless. Large cells using high power and generating the signals for the 4G network are now going to get replaced with smaller cell sites. The small stations will not be as high-power as the large cellular towers used for 4G technology and hence they will be located closer to each other. The reason for locating these small cells closer to each other is because installing them far apart would invite signal interruptions due to objects and weather.&lt;/p&gt;

&lt;p&gt;Rooftops and the top of the poles will be the perfect places to install the 5G cell stations. The new &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Wireless-Engineering/5G"&gt;5G&lt;/a&gt; technology will be energy efficient too. According to GSMA, a connection must fulfill the criterion of reducing 90% of energy consumption to qualify as a 5G network.&lt;/p&gt;

&lt;h2&gt;
  
  
  How 5G Will Enable Network as a Service
&lt;/h2&gt;

&lt;p&gt;One of the major features of 5G architecture is the end-to-end slicing. The idea of network slicing involves parting an existing physical infrastructure into many smaller virtual sections. Each virtual network will be a complete infrastructure on its own. This feature will allow service providers to create multiple network infrastructures for the varying needs of the customers.&lt;/p&gt;

&lt;p&gt;If you look at the current network configurations, a company providing broadband services has the same connection for its customers regardless of their usage differences. Not to mention, internet of things is not even a consideration in the existing networking services. For a customer, internet speed might not be as important as low latency, but the service providers had to no control over this factor with 4G technology.&lt;/p&gt;

&lt;p&gt;Network slicing in 5G will allow a network service provider to create multiple virtual networks, segment the customers based on their needs, and dedicate a connection to the customer based on those needs. The new networks or slices will have their own properties, protocols, architecture and configurations.&lt;/p&gt;

&lt;h2&gt;
  
  
  NaaS for Businesses
&lt;/h2&gt;

&lt;p&gt;While companies and individuals at homes will benefit greatly from the new technology, it is the businesses that will experience the revolutionary improvements 5G will bring with it. The availability of Network as a Service will allow businesses to manage their costs in a much better way. First, they won’t have to own their own network infrastructures now that there will be companies that can take care of this task for them. Secondly, they can have different connections enabled for different segments with their organizations.&lt;/p&gt;

&lt;p&gt;For example, they won’t have to use a very high bandwidth connection with tremendously fast speeds for internet of things application. When it comes to &lt;a href="https://hsc.com/Markets/IoT"&gt;IoT&lt;/a&gt;, low internet speeds are not a big problem because the amount of data packets to be sent is very low. However, they will need large capacity because there could be hundreds and thousands of devices connected to the same network.&lt;/p&gt;

&lt;p&gt;Network service providers now can monetize their service further through slicing. They can introduce different data packages for different applications and sell them separately to their customers. An important thing to keep in mind here is that the presence of many different types of virtual networks will not affect each other’s performances. Every network is a separate entity whose speed and transfer rate will not affect the speed and transfer rate of the other virtual network.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;If you did not know, large tech companies have already started to &lt;a href="https://www.techworld.com/apps-wearables/what-is-5g-everything-you-need-know-about-5g-3634921/"&gt;invest in 5G technology&lt;/a&gt;. 5G has not arrived yet but companies like Samsung, Qualcomm and Nokia have already started to work on various devices that are 5G enabled. Samsung is currently working on introducing a router for household usage that will be ready for 5G wireless broadband. Qualcomm is also putting in the efforts to come up with a 5G-enabled modem. Companies like Ericsson and Nokia are not focusing on end users instead they are targeting mobile service providers by offering them platforms that are compatible with 5G technology.&lt;/p&gt;

&lt;p&gt;It is good news that &lt;a href="https://hsc.com/campaigns/Next-Generation-Network-5G-Application-Development-Company"&gt;5G technology&lt;/a&gt; is not all about increased speed. It has come with new ways for operators to monetize their services, and features that will lay the groundwork for future technologies like artificial intelligence, internet of things, etc.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reference
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://searchnetworking.techtarget.com/definition/5G"&gt;https://searchnetworking.techtarget.com/definition/5G&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://5g.co.uk/guides/how-fast-is-5g/"&gt;https://5g.co.uk/guides/how-fast-is-5g/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.techradar.com/news/what-is-5g-everything-you-need-to-know"&gt;https://www.techradar.com/news/what-is-5g-everything-you-need-to-know&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://netmanias.com/en/post/blog/13311/5g/5g-network-as-a-service-how-5g-enables-the-telecom-operators-to-lease-out-their-network"&gt;https://netmanias.com/en/post/blog/13311/5g/5g-network-as-a-service-how-5g-enables-the-telecom-operators-to-lease-out-their-network&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.techworld.com/apps-wearables/what-is-5g-everything-you-need-know-about-5g-3634921/"&gt;https://www.techworld.com/apps-wearables/what-is-5g-everything-you-need-know-about-5g-3634921/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>An Overview of ITIL: Framework &amp; Best Practices</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Tue, 12 Jul 2022 07:49:22 +0000</pubDate>
      <link>https://dev.to/hughes-systique/an-overview-of-itil-framework-best-practices-296j</link>
      <guid>https://dev.to/hughes-systique/an-overview-of-itil-framework-best-practices-296j</guid>
      <description>&lt;p&gt;ITIL is the acronym for &lt;em&gt;Information Technology Infrastructure Library&lt;/em&gt;, which is a framework that encompasses a set of best practices for delivering IT services. ITIL provides a standardized approach to build and manage stable &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Network-Infrastructure-Engineering-Services"&gt;IT Infrastructure&lt;/a&gt; that offers lesser risks, higher efficiency, and scalability for growth.&lt;/p&gt;

&lt;p&gt;As one of the most popular and widely accepted framework for IT service management today, organizations use the best practices laid down by ITIL for increasing operational efficiency and IT service improvement. The nucleus of ITIL is structured around a Service Lifecycle which consists of the five phases below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HBUi8HuJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mm0dx6nkft0cyo0gx7oq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HBUi8HuJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mm0dx6nkft0cyo0gx7oq.png" alt="Phases of ITIL" width="833" height="951"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In a practical scenario, organizations use a systematic approach to select, plan, support, and deliver IT services. It is easier said than done since it is a herculean task for an organization to align itself with business. In the real world, it is not simple to offer quality service to customers amongst constraints such as unplanned change management, less proactive helpdesks, and less comprehensive SLAs that lack clarity.&lt;/p&gt;

&lt;p&gt;The framework of ITIL is divided into five broad stages or categories:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;- &lt;strong&gt;Guiding principles&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;- &lt;strong&gt;Governance&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;- &lt;strong&gt;Service value chain&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;- &lt;strong&gt;Continual improvement&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;- &lt;strong&gt;Practices&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zfZZ9BwT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rei8rmm2n7nncma31udi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zfZZ9BwT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rei8rmm2n7nncma31udi.png" alt="ITIL framework" width="880" height="468"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  1)Guiding principles
&lt;/h2&gt;

&lt;p&gt;Guiding principles form the strategy laid down for the management of IT Infrastructure for secure collaboration and increased business value.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Focus on value&lt;/strong&gt;:  Question the current strategy and evaluate the business value. All plans within the strategy should add value to achieve the business objective.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Start where you are&lt;/strong&gt;:  Assess existing process, identify areas of improvement, and seek to enhance it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Progress iteratively with feedback&lt;/strong&gt;: Focus onsmall improvement steps and evaluate progress. Select manageable and measurable changes. Once these are embedded, move forward on to the next iteration&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Collaborate and promote visibility&lt;/strong&gt;: Understand end-users and work with them to plan improvements, then review failures and successes together&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Think and work holistically&lt;/strong&gt;: Organization does not limit thoughts to hardware or software but focuses on the latest technology to reduce dependencies&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Keep it simple and practical&lt;/strong&gt;: Focus only on required processes as many things change&lt;/li&gt;
&lt;li&gt;Optimize and automate: Emphasize on optimizing process first and then automate to improve inefficiencies. &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2) Governance:
&lt;/h2&gt;

&lt;p&gt;Governance is a critical part and more like a Framework to align our organization with the activities. It also allows controlling and ensures that all activities comply with the guiding principles of ITIL to achieve the final goal.&lt;/p&gt;

&lt;h2&gt;
  
  
  3) Service value chain (SVS):
&lt;/h2&gt;

&lt;p&gt;The SVS is a set of interconnected activities required to realize the value and deliver results to the end-users. There are six main activities within the service value chain:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Plan&lt;/strong&gt;: Involves creating a layout along with the policies to define the approach needed to achieve the organization objective&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improve&lt;/strong&gt;: Devise strategies that target to improve the practices, services, and products continually.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Engage&lt;/strong&gt;: This activity will facilitate the engagement with collaborators to obtain their precise requirements needs and pain points&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design&lt;/strong&gt; and transition: Create new services and enhance existing services&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Obtain/build&lt;/strong&gt;: Obtain customer specifications and create the service modules for meeting their requirements&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Deliver and support&lt;/strong&gt;: Push out the services that are being used by the relevant stakeholders, meet their specifications&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  4) Continual improvement:
&lt;/h2&gt;

&lt;p&gt;Implement a continuous improvement across the entire service lifecycle. ITIL 4 offers a Continual Improvement model which is applied to all facets of products and services alike. However, organizations use alternative improvement approaches like Lean, Six Sigma as well.&lt;/p&gt;

&lt;h2&gt;
  
  
  5) Practices:
&lt;/h2&gt;

&lt;p&gt;Practices are one of the most critical parts of the service value chain that allows us to deliver valuable services to the end-user. ITIL 4 specifications separate practices into four broad categories:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z7d47op7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h6g3uq92jdyp0htvfhlb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z7d47op7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h6g3uq92jdyp0htvfhlb.png" alt="ITIL-4-specifications-broad-categories" width="880" height="588"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Organizations and people&lt;/strong&gt;: Define and assess the systems and culture, roles and skills to deliver the services&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Information and technology&lt;/strong&gt;: To deliver services, organizations select the available hi-tech and data at their disposal&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Partners and suppliers&lt;/strong&gt;: Forge strong relationships with stakeholders including third parties for service delivery&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Value streams and processes&lt;/strong&gt;: Define all the processes, workflows, and activities that add value to the service. Thirty-four practices are divided into three management areas (the practices may be referred to in ITIL documentation).

&lt;ul&gt;
&lt;li&gt;General Management: 14 practices&lt;/li&gt;
&lt;li&gt;Service Management: 17 practices&lt;/li&gt;
&lt;li&gt;Technical management: 3 practices&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To extract maximum benefit from ITIL, an organization need not employ all the practices. The trick to success is to use the ones that add value and align to strategic objectives. For example, many organizations tried to use virtualization and network transformation that needs ITIL Framework, but lack of expertise has resulted in overkill at an extensive cost.&lt;br&gt;
(&lt;em&gt;Also read: &lt;a href="https://hsc.com/Resources/Blog/Why-Businesses-Should-Adopt-Managed-Cloud-Security-Services"&gt;Why Businesses Should Adopt Managed Cloud Security Services&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.happiestminds.com/whitepapers/Adopting-ITIL-Framework.pdf"&gt;https://www.happiestminds.com/whitepapers/Adopting-ITIL-Framework.pdf&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.axelos.com/best-practice-solutions/itil/what-is-itil"&gt;https://www.axelos.com/best-practice-solutions/itil/what-is-itil&lt;/a&gt;&lt;br&gt;
&lt;a href="http://www.ipedr.com/vol5/no1/8%E2%80%90H00038.pdf"&gt;http://www.ipedr.com/vol5/no1/8‐H00038.pdf&lt;/a&gt;&lt;br&gt;
&lt;a href="https://stephenmann.wordpress.com/"&gt;https://stephenmann.wordpress.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>community</category>
      <category>itil</category>
    </item>
    <item>
      <title>6 Software Testing Essentials For Better E-commerce Portals</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Tue, 28 Jun 2022 07:37:50 +0000</pubDate>
      <link>https://dev.to/hughes-systique/6-software-testing-essentials-for-better-e-commerce-portals-4pl7</link>
      <guid>https://dev.to/hughes-systique/6-software-testing-essentials-for-better-e-commerce-portals-4pl7</guid>
      <description>&lt;p&gt;&lt;strong&gt;Are Website Glitches Knocking Down Your Sales?&lt;/strong&gt;&lt;br&gt;
So, you have an e-commerce portal with payment gateways and shopping carts. Not to forget, you are looking after an extensive set of features like product catalogues, customer data, marketing automation and lots more. This calls for some stringent software testing!&lt;/p&gt;

&lt;p&gt;Running an e-commerce portal can be frustrating especially if your website is vulnerable to glitches and doesn’t perform up to the mark. Some of the most common problems eCommerce portal owners come across include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The failure to satisfy online customers due to overly complicated product categorization and a search panel.&lt;/li&gt;
&lt;li&gt;The ability to handle scalability of customer and shopping cart data.&lt;/li&gt;
&lt;li&gt;Problems in handling payment processes&lt;/li&gt;
&lt;li&gt;Difficulty in managing and verifying customer profiles and transaction reports&lt;/li&gt;
&lt;li&gt;Problems in optimizing the sales funnel&lt;/li&gt;
&lt;li&gt;Difficult in identifying and running marketing campaigns on the portal&lt;/li&gt;
&lt;li&gt;The inability to maintain website standards across different platform, geographical regions and ‘smart’ devices.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The good news is that you can implement software testing of your eCommerce portal to eliminate functional flaws. You can also check the performance and usability of your online portal and at the same time optimize the ‘customer appeal’ of your website.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why should you test E-Commerce websites?
&lt;/h2&gt;

&lt;p&gt;Sometimes you would make a minor change to your online portal and later find out that the entire content is poorly formatted.  Perhaps the worst nightmare for eCommerce owners is when shopping cart changes trigger security alert and the customers are forced to run away.&lt;/p&gt;

&lt;p&gt;More and more customers today are using mobile devices to access online shopping portals, and this is exactly the reason why you should invest in a separate mobile responsive website with device friendly templates and HTML coding. eCommerce problems can also appear due to changes in the versions of the Android/iOS operating systems and the variety of screen sizes and mobile devices.&lt;/p&gt;

&lt;p&gt;Remember that you should test your eCommerce portal for:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Changes in content – headlines, promotional banners, and slider images&lt;/li&gt;
&lt;li&gt;Differences in formatting&lt;/li&gt;
&lt;li&gt;Changes in a shopping cart, secure checkout&lt;/li&gt;
&lt;li&gt;Addition or removal of links and promotional marketing campaigns&lt;/li&gt;
&lt;li&gt;Modifications in site navigation or template&lt;/li&gt;
&lt;li&gt;Adding promotional coupons, and discounts&lt;/li&gt;
&lt;li&gt;Adding, removing or modifying landing pages and product category pages&lt;/li&gt;
&lt;li&gt;Upgrading the operating system or app software&lt;/li&gt;
&lt;li&gt;Changes in the Login process&lt;/li&gt;
&lt;li&gt;Adding new ad campaigns&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;(Explore:&lt;a href="https://hsc.com/Services/Product-Engineering-Services/OTT-Video/OTT-Media-Testing"&gt;OTT Video Testing Services&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Checklist for Testing E-commerce Websites:
&lt;/h3&gt;

&lt;p&gt;Some of the critical elements that need to be testing when you are the owner of an eCommerce website are as follows:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(Read:&lt;a href="https://hsc.com/Resources/Blog/Test-Automation-Tools-for-Mobile-Applications-A-brief-survey"&gt;Test Automation Tools for Mobile Applications: A brief survey&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Homepage&lt;/strong&gt;&lt;br&gt;
Your homepage will have a lot going on. Make sure you check the interval at which images will be refreshed and whether the banners/images can be clicked on. Also, the page should load fast and the rest of the content should be viewed correctly across different browsers and screen resolutions. With lots of scripts running on the pages these days, ensure that the images and content are loading fast enough and rich media does not hamper the user experience&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Search Bar&lt;/strong&gt;&lt;br&gt;
Search algorithms are important for the success of the eCommerce platform. Your customers should be able to search for products or specific brands or something more specific. More importantly, search results must be relevant.&lt;/p&gt;

&lt;p&gt;The most important and relevant features that need to be tested are sorting, filtering and pagination. The search results page should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Display relevant products&lt;/li&gt;
&lt;li&gt;Display product image, information, price and maybe customer ratings&lt;/li&gt;
&lt;li&gt;Number of products per page according to the requirement&lt;/li&gt;
&lt;li&gt;Results must be sortable based on the typical fields like price, ratings etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Pagination checks that all items displayed on a page are different from the previous page. Remember, there should be no duplicates. If there are any ad-based items inserted in the list for promotions, they should be aptly marked so.&lt;/p&gt;

&lt;p&gt;Filtering should allow customers to select 3, 4 or 5 different options from your drop-down menu.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Products Information Page&lt;/strong&gt;&lt;br&gt;
This is the most important page which determines whether there will be a sale or not. The product detail page has an image of the product, product specifications, reviews, shipping options, delivery information, check out options, promotional details, stock information, and color variations available. All this information must be correctly verified and should match the correct backend systems related to logistics and stock, also the promotional and current offer running should display on the correct category items.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Shopping Cart&lt;/strong&gt;&lt;br&gt;
The shopping cart can decide the fate of your sales. In fact, this is the stage before the customer commits to the purchase. You should test the following scenarios:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How customers can add items to the shopping cart and continue shopping?&lt;/li&gt;
&lt;li&gt;The total number of items in the cart should get incremented as the customer continues to shop&lt;/li&gt;
&lt;li&gt;Total price, the number of items and their totals should be displayed clearly in the cart.&lt;/li&gt;
&lt;li&gt;Any taxes and shipping charges available should be displayed in the cart&lt;/li&gt;
&lt;li&gt;Cart total should reflect all additions/changes a user makes – for example adding items to the item, removing items&lt;/li&gt;
&lt;li&gt;Shopping cart page should have the option where customers can proceed to checkout and choose their preferred shipping option&lt;/li&gt;
&lt;li&gt;The cart should allow customers to apply coupons, calculate discounts&lt;/li&gt;
&lt;li&gt;There should be an option titled “don’t check out.” In this case, customers can close the website and come back later to complete their purchase.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;5. Payment/Purchase&lt;/strong&gt;&lt;br&gt;
Payment page should display different payment options and whether users can simply check out as guests. There must be a separate sign-in for returning customers and new user sign up. If you are storing credit card information, perform security testing and make sure the login session has a specific time threshold. If your session does expire, make sure the user is timed out completely. Any failed transactions are appropriately reported, and any financial transactions should be reversed in such failure cases. The payment history should also be available in the account history and should be verified too.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Post Purchase Testing&lt;/strong&gt;&lt;br&gt;
This involves testing actions users can do after placing their order. For example, they should be able to change their order or review order history. Customers should also have the option to make changes to their user account if applicable.&lt;/p&gt;

&lt;p&gt;Other functionalities that can be tested as part of e-commerce platform include recommendations, the database of product, warehouse system and contacting customer care.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(Explore:&lt;a href="https://hsc.com/Solutions/Unified-Test-Automation-Framework"&gt;Unified Test Automation Framework&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;To summarize, each feature of an e-commerce website needs to be tested to make sure it is correctly implemented. Moreover, as the business owner, you should perform routine checks so that your website keeps running smoothly. Looking for a software testing partner to help you set up a robust and fully functional eCommerce site? Reach out to us and let us help you in your e-Commerce endeavors.&lt;/p&gt;

</description>
      <category>testing</category>
      <category>discuss</category>
      <category>webdev</category>
      <category>security</category>
    </item>
    <item>
      <title>Growing importance of NetOps in Network Management</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Mon, 20 Jun 2022 07:06:55 +0000</pubDate>
      <link>https://dev.to/hughes-systique/growing-importance-of-netops-in-network-management-na</link>
      <guid>https://dev.to/hughes-systique/growing-importance-of-netops-in-network-management-na</guid>
      <description>&lt;p&gt;With the continuous adoption of software-defined networking (&lt;a href="https://hsc.com/Services/Product-Engineering-Services/Network-Infrastructure-Engineering-Services/SDN"&gt;SDN&lt;/a&gt;), the introduction of advanced data center fabric designs, large-scale implementation of hybrid cloud, networks are becoming even more fragmented, complex, and harder to manage. This has been further amplified by the pandemic which pushed enterprise networks to evolve rapidly to serve the sudden growth in userbase which required a broad spectrum of services. As a result of this increased usage, network security threats evolved in parallel. To enhance their network resilience, organizations globally have been adopting NetOps to make their networking operations and functions faster and more accessible.&lt;/p&gt;

&lt;p&gt;In a recent survey commissioned by Opengear, 87% of network managers, network architects, and network engineers confirmed that their organizations have increased their &lt;a href="https://technative.io/why-netops-is-the-next-step-forward-for-networking/"&gt;investment in NetOps&lt;/a&gt; over the past two years, while 48% of organizations revealed that they have increased NetOps spending by around 50% or more.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is NetOps?
&lt;/h2&gt;

&lt;p&gt;NetOps is much more than just putting together two words, Network, and Operations. NetOps is in essence an evolution of DevOps that prioritizes agility and rapid deployments in network operations. By incorporating techniques like automation, virtualization, and orchestration, NetOps helps organizations create and maintain a highly available and agile network in the deployment and configuration stages. Akin to DevOps, Automation or Software Defined Networking, NetOps also involves the people, skills, and tools that an organization deploys to deliver a network of services for its employees and customers. Thus, it helps break down the silos that exist between network, operations, and data teams.&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://dev.to/hughes-systique/devops-and-its-benefits-2pc6"&gt;DevOps and its benefits&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Evolution of NetOps:
&lt;/h2&gt;

&lt;p&gt;Let us now understand how &lt;a href="https://blogs.cisco.com/datacenter/netops-evolution-into-the-cloud"&gt;NetOps&lt;/a&gt; evolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NetOps 1.0:&lt;/strong&gt;&lt;br&gt;
The differentiating features of NetOps 1.0 are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reactive mindset - put out fires as they occur&lt;/li&gt;
&lt;li&gt;Manual intervention/CLI-focussed&lt;/li&gt;
&lt;li&gt;Siloed networking teams who focus more on technology&lt;/li&gt;
&lt;li&gt;Automation averse&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the earlier days of legacy networks which were hardware-centric, complex, and inflexible, network-related issues would be handled in a reactive manner. Whenever any issue arose, the network tasks required manual intervention and were executed through CLI scripting, with network teams working in isolation from application and security teams. As the focus was more on technology rather than business needs, the network engineers were automation averse. In fact, a Gartner survey confirmed that many network changes were still manually configured as of 2018.&lt;/p&gt;

&lt;p&gt;In the pre-DevOps era, maintaining uptime was sacrosanct as availability trumped agility. Temporarily, NetOps 1.0 promotes maximum network availability with minimal disruption. However, it has long-term adverse ramifications as it creates an unrelenting, complex infrastructure that is not amenable to change or scale and is an obstacle to agile development. And this spurred the next phase of NetOps, i.e. NetOps 2.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NetOps 2.0:&lt;/strong&gt;&lt;br&gt;
With the advent and widespread adoption of the cloud, developers tuned in to the intricacies of networking, and network teams sought after developer approaches to adapt to the changing business landscape. Here’s what changed in NetOps 2.0:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Proactive and Analytics driven problem solving i.e. preventing fires before they start&lt;/li&gt;
&lt;li&gt;Use of programmatic APIs, &lt;a href="https://www.techtarget.com/whatis/definition/intent-based-networking-IBN"&gt;intent-based networking&lt;/a&gt;, automation, AI/ML, virtualization, and orchestration to automate administrative tasks across a network&lt;/li&gt;
&lt;li&gt;Better coordination and collaboration between DevOps and DevSecOps teams&lt;/li&gt;
&lt;li&gt;Focus on business goals rather than technology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The topmost priority of all digital enterprises today is to be more agile so that they can match customer expectations. By combining the principles of DevOps into Network Operations such as continuous network automation and validation, network operations can be further simplified leading to an increase in speed, efficiency, availability, and agility while also fostering innovation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Implementing NetOps 2.0
&lt;/h2&gt;

&lt;p&gt;The success stories of some of the biggest cloud service providers have triggered the enterprise IT businesses to follow their lead by adopting the two pillars of NetOps, i.e. Automation and Virtualization, to optimally ramp up their &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Network-Infrastructure-Engineering-Services"&gt;network infrastructures&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Implementing NetOps2.0 in organizations requires both top-down and bottom-up initiatives. This can include adjustments in cultural values to accommodate managed risk-taking, awarding innovative initiatives, and promoting a spirit of enquiry that challenges the status quo. Effective collaborations between Networking, DevOps, and DevSecOps teams should be encouraged so that everybody is connected and works towards business success.&lt;/p&gt;

&lt;h2&gt;
  
  
  DevOps + NetOps
&lt;/h2&gt;

&lt;p&gt;One of the primary goals of DevOps practitioners is to automate as many of the software release pipelines as possible. Similar levels of production and programmability are making their way into networking which accounts for the similarity between &lt;a href="https://thenewstack.io/devops-demands-netops/"&gt;DevOps and NetOps&lt;/a&gt;. Just like DevOps, NetOps can be implemented using technology.&lt;/p&gt;

&lt;p&gt;At the same time, NetOps and DevOps teams can come together to deal with network issues by collaborating and sharing tools that can aid and bolster IT as a whole.&lt;/p&gt;

&lt;p&gt;Different NetOps tools are designed to help automate network workflows including network implementations and network operations. DevOps teams can make use of these tools to perform configuration changes and update the devices automatically, such as Alarm &amp;amp; Alert detection services and monitoring to avoid overdue estimated network device licensing, renewals, upgrades, and incident management services. Thus, the application of DevOps tools to Networking has brought in agility, availability, and automation in Networks.&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://hsc.com/Resources/Blog/SecOps-Bridging-Security-IT-Operations-To-Proactively-Address-Security-Concerns"&gt;What is SecOps and Its Benefits&lt;/a&gt;)&lt;/em&gt;&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://dev.to/hughes-systique/role-of-a-secops-center-secops-team-secops-with-ai-5abk"&gt;Role of a SecOps Center, SecOps team, &amp;amp; SecOps with AI&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Benefits of Implementing NetOps in an Enterprise:
&lt;/h2&gt;

&lt;p&gt;89%, who had introduced NetOps, said that it had made their organization’s network more reliable.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Strengthening an Enterprise’s Digital Initiative -Organizations worldwide are adopting NetOps to accelerate their digital initiatives. With faster software development, the new features are quickly delivered to the end-user(s), creating a competitive advantage, and high sales.&lt;/li&gt;
&lt;li&gt;Flexibility &amp;amp; Agility -NetOps has two main themes: virtualization and automation. As network teams move away from fixed hardware, they move toward software that provides more flexibility and agility in the network.&lt;/li&gt;
&lt;li&gt;Resilience - Enterprises that respond more quickly to unfavorable conditions or unanticipated circumstances will be better position to achieve everyday business objectives. This is further strengthened by an experienced NetOps Engineer who ensures the underlying physical layer is error-free and always available. After all, healthy networks form the backbone of a healthy enterprise.&lt;/li&gt;
&lt;li&gt;Transparency -The NetOps approach uses software to monitor network performance by collecting and analyzing usage data. This way, potential problems are spotted early and removed before they become actual issues.&lt;/li&gt;
&lt;li&gt;Tool Integration- The legacy networking architectures and tooling were not designed for today’s cloud and digital-centric world. For example, due to the manual practice of making changes one router at a time by using CLI commands, even minor configuration changes can take weeks to implement globally. Now, there are different automation tools integrations for customer networks that provide a holistic view of customer networks for utilization and consumption. This visibility helps in planning network transitions accordingly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Network &amp;amp; Security:
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;Security&lt;/a&gt; is essential to avoid network downtime, as the consequences negatively affect customer satisfaction and profit. Now, with networks more layered than ever, and subsequently more vulnerable than ever organizations are investing in NetOps to enhance security and reduce the potential for downtime. NetOps tools and practices have helped in remediating and resolving network and system issues by enabling network management and network monitoring.&lt;/p&gt;

&lt;p&gt;In a survey conducted by Enterprise Management Associates where 366 IT professionals participated, &lt;a href="https://thenewstack.io/devops-demands-netops/"&gt;83%&lt;/a&gt; of organizations said they saw increased collaboration between their network and security teams. The security's team need to analyze network data has fuelled this collaboration. The data-sharing and optimizing incident response times between the &lt;a href="https://www.csoonline.com/article/3644471/lessons-from-the-pandemic-a-new-urgency-for-netops-secops.html"&gt;Network and Security teams&lt;/a&gt; has led to a new thought process NetSecOps. But that is a blog for another day!&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://hsc.com/Resources/Blog/Security-as-a-Service-SECaaS-A-Detailed-Overview"&gt;Security as a Service (SECaaS) – A Detailed Overview&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;NetOps is a proactive, data-driven approach to Networking that helps modernize networks and increase their resilience. It is more than the integration of new solutions. It entails a mindset shift both top-down and bottom-up of the profeFssionals that work within it. By transitioning into the NetOps culture, enterprises and engineers will ensure effective integration of NetOps with other key teams such as DevOps and SecOps and enable a smoother digital transformation journey.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>netops</category>
      <category>secops</category>
      <category>security</category>
    </item>
    <item>
      <title>Automated Deployment Of CI/CD</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Mon, 13 Jun 2022 04:41:51 +0000</pubDate>
      <link>https://dev.to/hughes-systique/automated-deployment-of-cicd-4neg</link>
      <guid>https://dev.to/hughes-systique/automated-deployment-of-cicd-4neg</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Automated Deployment enables an organization to deploy software releases with a single command or simply by clicking on a control panel. Automation is essential to streamline the deployments in the production environment and reduce the associated risks. Web application deployment needs some well-defined steps to be followed so that the software changes are shipped from the development environment to the staging/ production environment. It is done so that the updated software (which includes new features and corrections) is available for the end-users.&lt;/p&gt;

&lt;p&gt;Automated deployment reduces the human effort and avoids any manual intervention required to deploy code to the various environments like DEV(Development), QA (&lt;a href="https://hsc.com/Services/Testing-Services"&gt;Quality Assurance&lt;/a&gt;), UAT(User Acceptance Testing), and PROD(Production). Automated deployment is closely linked to CI/CD (Continuous Integration &amp;amp; Continuous Delivery).&lt;br&gt;
CI/CD is one of the current industry best practices to deliver applications to customers more frequently and reliably by introducing automation into the stages of application development.&lt;br&gt;
&lt;em&gt;(Read: &lt;a href="https://www.redhat.com/en/topics/devops/what-is-ci-cd"&gt;What is CI/CD&lt;/a&gt;)&lt;/em&gt;&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://hsc.com/Resources/Blog/Why-DevOps-Is-Crucial-For-Your-Business"&gt;Why DevOps Is Crucial For Your Business&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Automated Deployment Characteristics
&lt;/h2&gt;

&lt;p&gt;Some of the salient features of automated deployment are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deployment can be triggered by clicking on a button or running a single command from CLI&lt;/li&gt;
&lt;li&gt;There is little or no human intervention from the start to the end&lt;/li&gt;
&lt;li&gt;Better visibility, i.e. it shows the deployment progress as it happens&lt;/li&gt;
&lt;li&gt;It should be atomic, which means either all the steps are completed, or nothing happens&lt;/li&gt;
&lt;li&gt;Uninstallation of previous release or rollback of failed deployment should be easy and quick&lt;/li&gt;
&lt;li&gt;Smoke testing should be done after automated deployment to ensure nothing is broken&lt;/li&gt;
&lt;li&gt;It consists of pre-defined steps and a series of workflows. The next step should not be initiated until the previous steps successful&lt;/li&gt;
&lt;li&gt;It should be transparent with clear indications/notifications to the team about the success or failure of each step&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(Read:&lt;a href="https://hsc.com/Resources/Blog/CICD-Enabler-Framework-for-Google-Cloud-Platform"&gt;CI/CD Enabler Framework for Google Cloud Platform&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem To be Solved
&lt;/h2&gt;

&lt;p&gt;As part of the deployment of a new software release, the following tasks are routinely followed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Manually download software build from the build server to the target platform.&lt;/li&gt;
&lt;li&gt;Manually deploy build in the appropriate location/ container (on staging or production server).&lt;/li&gt;
&lt;li&gt;Manual smoke test to verify the key functionalities are working fine.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After providing so much manual effort if smoke testing fails then a new build is required and the complete cycle should be repeated. This requires a lot of manual effort again, which can be avoided.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The key shortcomings of the current process are the lack of the following:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automation deployment&lt;/li&gt;
&lt;li&gt;Automation sanity testing&lt;/li&gt;
&lt;li&gt;Automation smoke testing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Software development teams should not worry about how code is going into production. They should only focus on the business requirements, design, implementation, unit tests, integration tests, and regression tests. So, by excluding manual tasks and including automated tasks we can reduce a lot of additional efforts.&lt;/p&gt;

&lt;h2&gt;
  
  
  Solution: Automated Deployment
&lt;/h2&gt;

&lt;p&gt;To achieve &lt;a href="https://hsc.com/Services/Product-Engineering-Services/DevOps-Practices-and-Offerings"&gt;automated deployment&lt;/a&gt;, use Ansible which is an automation configuration tool. Keep Ansible as a controller entity that is used to interact with the required servers and executes the required shell script on managed nodes to achieve the desired result.&lt;/p&gt;

&lt;p&gt;The framework which helps in executing the workflow is as shown below:&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_LQgt82u--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1sfh0ancr3u0d4ynv7t7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_LQgt82u--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1sfh0ancr3u0d4ynv7t7.png" alt="HSC Automated-Deployment-Flow-Diagram" width="800" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Write plays in such a way that Ansible can support N&amp;gt;0 number of servers at any tier.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ansible verifies the reachability and memory usage of each server before continuing with deployment.&lt;/li&gt;
&lt;li&gt;Ansible integration with collaboration tools helps to notify the team about continuous progress.&lt;/li&gt;
&lt;li&gt;For each environment inventory files are there i.e. DEV, QA, UAT, and PROD.&lt;/li&gt;
&lt;li&gt;In automation deployment, Ansible uses to run smoke testing before deployment of the build.&lt;/li&gt;
&lt;li&gt;Ansible uses FTP so that release can be downloaded and deployed to DEV and QA env.&lt;/li&gt;
&lt;li&gt;Ansible interacts with Artifactory to download/ deploy release on UAT and PROD env.&lt;/li&gt;
&lt;li&gt;To ensure the integrity of the build, Ansible uses to evaluate some of the builds.&lt;/li&gt;
&lt;li&gt;Ansible interacts with a load balancer to stop traffic.&lt;/li&gt;
&lt;li&gt;Ansible interacts with the database server via the application server to upgrade the database.&lt;/li&gt;
&lt;li&gt;Ansible interacts with the application server to download and deploy build.&lt;/li&gt;
&lt;li&gt;Ansible does a predefined number of retries and waits for services to come up on the application server.&lt;/li&gt;
&lt;li&gt;Ansible stops immediately if anything goes wrong and triggers rollback followed by verification of services.&lt;/li&gt;
&lt;li&gt;Ansible interacts with selenium to trigger smoke testing after deployment of build on various environments.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Key Components of Automated Deployment Framework
&lt;/h2&gt;

&lt;p&gt;The diagram below illustrates the key components of the automated deployment:&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FcV1tmdw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6kqisiuo21wduhqxahlk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FcV1tmdw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6kqisiuo21wduhqxahlk.png" alt="Automated-Deployment-Components" width="880" height="648"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deployment tool&lt;/strong&gt;: Ansible is used as a deployment tool and plays the role of a controller. It decides which steps to execute next, based on the outcome of the previous step. It interacts with various servers to execute predefined steps which are part of Automated deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bash script&lt;/strong&gt;: Ansible interacts with various servers and runs a script on the server to accomplish various tasks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FTP / Artifactory&lt;/strong&gt;: The location from where Ansible downloads the software release. Based on our needs according to the environment, we can choose any location.&lt;br&gt;
Notification: Automated Deployment framework notifies team in the various slack channel to show deployment progress.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-validation&lt;/strong&gt;: Framework verifies the services running on the environment before initiating deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Health check&lt;/strong&gt;: Framework verifies the health of the server with which it will interact. If health is not good, then it does not proceed with deployment and notifies the team about the same via a slack channel.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Post-validation&lt;/strong&gt;: After upgrading services, the framework verifies services to ensure the software release has been successfully upgraded.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Rollback&lt;/strong&gt;: Framework has the capability to trigger rollback and restore services if any step fails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Selenium&lt;/strong&gt;: Deployment framework verifies services in pre-validation and post-validation by initiating selenium scripts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Server reachability&lt;/strong&gt;: Before initiating deployment, it verifies if all servers are reachable to avoid any risk during deployment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Benefits:
&lt;/h2&gt;

&lt;p&gt;The automation of the deployment has helped us achieve the following direct benefits in some of our customer's projects:&lt;/p&gt;

&lt;p&gt;Planned downtime in production for new build deployments is reduced from 3 hours to 1 hour.&lt;br&gt;
No manual testing required after software release up-gradation.&lt;br&gt;
Parallel deployment can be initiated for multiple sites.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://stackify.com/what-is-cicd-whats-important-and-how-to-get-it-right/"&gt;https://stackify.com/what-is-cicd-whats-important-and-how-to-get-it-right/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://semaphoreci.com/cicd"&gt;https://semaphoreci.com/cicd&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.digitalocean.com/community/tutorials/an-introduction-to-ci-cd-best-practices"&gt;https://www.digitalocean.com/community/tutorials/an-introduction-to-ci-cd-best-practices&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html"&gt;https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.ansible.com/ansible/latest/user_guide/playbooks_best_practices.html"&gt;https://docs.ansible.com/ansible/latest/user_guide/playbooks_best_practices.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://galaxy.ansible.com/"&gt;https://galaxy.ansible.com/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.ansible.com/ansible/latest/user_guide/playbooks_reuse_roles.html"&gt;https://docs.ansible.com/ansible/latest/user_guide/playbooks_reuse_roles.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.ansible.com/ansible-tower/"&gt;https://docs.ansible.com/ansible-tower/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>devops</category>
      <category>automation</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Need for Security Testing of Mobile Apps</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Mon, 30 May 2022 05:11:11 +0000</pubDate>
      <link>https://dev.to/hughes-systique/need-for-security-testing-of-mobile-apps-50ia</link>
      <guid>https://dev.to/hughes-systique/need-for-security-testing-of-mobile-apps-50ia</guid>
      <description>&lt;p&gt;Bring-Your-Own-Device (BYOD) policy is hardly a novelty these days as enterprises now allow employees to access sensitive business data on their personal mobile devices. Hence, a large percentage of users utilize the same mobile devices for both business and own purposes. Also, they store a variety of personal and business data on their smartphones and tablets. With the WhatsApp security breach fresh in our minds, it is not incorrect to say that mobile apps are vulnerable to critical security attacks. This, in turn, makes security testing of mobile apps imperative.&lt;br&gt;
(&lt;em&gt;Bonus Read:&lt;a href="https://hsc.com/Resources/Blog/Managing-Enterprise-Mobility-Through-Mobile-Device-Management"&gt; Managing Enterprise Mobility Through Mobile Device Management&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;Users all over the world opt for mobile apps that enable them to accomplish specific tasks. Simultaneously, they do not want to compromise the security and privacy of the data stored on their mobile devices. Businesses must incorporate &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;robust security&lt;/a&gt; features and perform elaborate &lt;a href="https://hsc.com/Services/Testing-Services"&gt;security testing&lt;/a&gt; while developing a mobile app. It enables them to secure the personal and professional data of users despite targeted malware attacks and the presence of a virus on the devices. Security testing helps the testing professionals check the vulnerability of the app to targeted security attacks. It also helps to identify the loopholes that make the app vulnerable to targeted malware attacks. Hence, security testing results enable enterprises to enhance the credibility and profitability of the mobile app in the longer run. There are also several reasons why each enterprise must perform elaborate security testing of mobile apps.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Must Each Business Perform Elaborate Security Testing of Mobile Apps?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oaLWEDjU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u0mel7qfo1cfgdo5f305.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oaLWEDjU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u0mel7qfo1cfgdo5f305.png" alt="HSC || Security testing for mobile apps" width="880" height="605"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Eliminate Common Security Vulnerabilities
&lt;/h3&gt;

&lt;p&gt;Several studies have shown that each mobile app contains some form of security vulnerabilities. A large percentage of modern mobile apps even contain the most commonly identified vulnerabilities. The testers must locate and eliminate the commonly identified vulnerabilities to protect the application from both existing and emerging security threats. Security vulnerabilities can also be fixed easily before the commercial launch of the mobile app.&lt;/p&gt;

&lt;h3&gt;
  
  
  Secure the Application Code
&lt;/h3&gt;

&lt;p&gt;Many cybercriminals execute targeted malware by taking advantage of the loopholes in the source code of the mobile app. The malware helps them take control of the user’s device and subsequently access the data stored on it. While performing security testing, the testing professionals assess the quality of the entire application code. This helps them to identify the weaker pieces of code that make the app vulnerable to security attacks. The three common methods to do this are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Static analysis&lt;/strong&gt;: Using code or application binary. Several tools are available for both Android and iOS&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dynamic analysis&lt;/strong&gt;: Analyzing the application when it’s executing on the device, communication with servers/web services. Typically done by proxy-based tools, analyzing and interpreting communication of use with the external world&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Forensic analysis&lt;/strong&gt;: Checking the residual files, data that has been left behind after the application has been run. Database based or simple tools like Android debug bridge (ADB) can be used for this purpose&lt;/p&gt;

&lt;h3&gt;
  
  
  Prevent Data Leaks
&lt;/h3&gt;

&lt;p&gt;As noted earlier, a user nowadays stores both personal and business data on the same mobile device. Most apps access the personal information of the user to deliver a more personalized experience. Hence, the vulnerabilities in a mobile app can result in data leaks in the future. The testing professionals eliminate the chances of data leaks by evaluating the hard-coded data. This includes the application code, the personal/business data stored on the device, and data in transit.&lt;/p&gt;

&lt;h3&gt;
  
  
  Prevent Real-Time Security Attacks
&lt;/h3&gt;

&lt;p&gt;Many cyber criminals nowadays distribute malware that attacks the mobile app at the time of execution. The malware tries to modify the functionality of the app by submitting malicious input at runtime. Hence, enterprises must explore ways to protect their mobile apps from real-time security attacks. The testers can easily identify the malicious input submitted at runtime by using robust technologies like runtime application self-protection (RASP). This would help them prevent the malware from modifying the app’s configuration.&lt;/p&gt;

&lt;h3&gt;
  
  
  Eliminate the Impact of Trojan Apps
&lt;/h3&gt;

&lt;p&gt;Many hackers nowadays distribute malware through mobile apps and games. The users fail to identify the malicious functionality of the app or game and install it on their mobile apps. The Trojan apps are explicitly designed to accomplish tasks like retrieving user data, changing the configuration of the app, monitor user activities, make unauthorized calls, and send unauthorized text messages. While performing security testing, the testers check how the application behaves in the presence of malware in the system. This knowledge helps them identify ways to make Trojan apps ineffective.&lt;/p&gt;

&lt;h3&gt;
  
  
  Secure Third-Party APIs And Services
&lt;/h3&gt;

&lt;p&gt;Nowadays, developers enhance the mobile app’s performance by integrating a variety of third-party APIs and services. Some of these APIs are provided by reputable companies, while others are open source and uploaded by the community. Hence, the quality of individual third-party APIs or services differ. Testers assess the security of third-party APIs independently after they are integrated into the app to evaluate the security of a mobile app.  Also, they monitor and assess data transmission to keep the user data safe and secure.&lt;/p&gt;

&lt;h3&gt;
  
  
  Implement Corporate Policy
&lt;/h3&gt;

&lt;p&gt;In addition to implementing the BYOD policy, enterprises also allow employees to access business data on their personal mobile devices. But the enterprises do not have full control over the app installed by employees on their own devices. Hence, it becomes essential for enterprises to implement a robust policy to ensure that the business data is accessed only by an authorized employee. The employees also have to comply with the required authorization and authentication process. The testers will assess the security, authentication, and authorization features of the mobile app while performing security tests. It helps them to ensure that any unauthorized user does not access the business data.&lt;/p&gt;

&lt;h3&gt;
  
  
  Get Higher Returns
&lt;/h3&gt;

&lt;p&gt;Each business has to invest in robust security testing tools and experienced testing professionals to get more reliable security testing results. But according to several studies, most users will switch to a more secure mobile app without any delay. Hence, the initial investment will help the business to enhance the app’s popularity and profitability in the longer run. Also, the business can get all security loopholes in the mobile app fixed before its deployment to beat the competition in the long-run.&lt;/p&gt;

&lt;p&gt;Usually, experienced testing professionals can think like a hacker and identify all critical security vulnerabilities in the app. At the same time, the security testing tools will enable the testers to assess the security of the mobile app under different environments and within a shorter amount of time.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Coming back to the recent WhatsApp security lapse and the Facebook security breach which happened a few years ago, security experts say that even the most vaulted applications can also get hacked. The mobile network has made our lives comfortable by empowering users to do any transaction viz. social, financial, and business. However, as end-users of mobile applications, it is always advisable to update all the apps with their latest security patches. Mobile app companies have been continuously testing their mobile apps under stringent conditions. Security testing of mobile apps helps to prohibit hackers from stealing our personal information and maliciously utilizing them.&lt;/p&gt;

</description>
      <category>security</category>
      <category>mobile</category>
      <category>application</category>
      <category>testing</category>
    </item>
    <item>
      <title>Managed Cloud Security: Benefits &amp; Services</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Tue, 17 May 2022 04:55:31 +0000</pubDate>
      <link>https://dev.to/hughes-systique/managed-cloud-security-benefits-services-3m2a</link>
      <guid>https://dev.to/hughes-systique/managed-cloud-security-benefits-services-3m2a</guid>
      <description>&lt;p&gt;According to a research conducted by Gartner, the average cost of downtime could be as costly as $5600/minute.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L4iooaM1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qakznapbd7d1cgi34bla.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L4iooaM1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qakznapbd7d1cgi34bla.png" alt="Cloud Security Image- Hughes Systique" width="880" height="495"&gt;&lt;/a&gt;&lt;br&gt;
While Cloud adoption is increasing across many industries, security is still one of the major hindrances. So, &lt;a href="https://hsc.com/Resources/Blog/While-Cloud-Adoption-May-Be-An-Obvious-Choice-Is-It-Really-Secure"&gt;is cloud adoption really secure&lt;/a&gt;? &lt;/p&gt;

&lt;p&gt;Security is frequently viewed as the largest impediment to a digital transformation journey, but it can also be its greatest enabler.  &lt;/p&gt;

&lt;p&gt;A lack of a strong cloud security system in place is like a time-bomb waiting to explode. There are various potential issues with not having a solid security system such as: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operational Inefficiency &lt;/li&gt;
&lt;li&gt;High Cost&lt;/li&gt;
&lt;li&gt;Potential Harm to a Company's Image in case of a breach &lt;/li&gt;
&lt;li&gt;Regulatory Compliance Challenges&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All these difficulties are addressed by using Managed Cloud Security Services. It also allows the company's internal IT team to focus on new business initiatives while an external security team with extensive experience manages all elements of providing enterprise-grade cloud security. &lt;br&gt;
(&lt;em&gt;Read:&lt;a href="https://hsc.com/Resources/Blog/Importance-Of-Cloud-Migration"&gt;Importance of cloud migration&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;

&lt;h2&gt;
  
  
  Some of the advantages a business avails from Managed Cloud Security Services are:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Business Continuity and Disaster Recovery (BCDR) &lt;/li&gt;
&lt;li&gt;Automation &lt;/li&gt;
&lt;li&gt;Overcome Business Specific Challenges &lt;/li&gt;
&lt;li&gt;Accelerate Innovation
&lt;/li&gt;
&lt;li&gt;Cost-Effective &lt;/li&gt;
&lt;li&gt;Overcome Compliance Challenges &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What are the major security services offered in the cloud?
&lt;/h2&gt;

&lt;p&gt;SECaaS (&lt;a href="https://dev.to/hughes-systique/security-as-a-service-secaas-a-detailed-overview-4b3b"&gt;security-as-a-service&lt;/a&gt;) is a fast-expanding area that provides &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;cybersecurity&lt;/a&gt; services that complement the traditionally managed security service provider.&lt;/p&gt;

&lt;h3&gt;
  
  
  9 of the major security services offered are:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Identity and Access Management (IAM)
&lt;/li&gt;
&lt;li&gt;Data Loss Prevention
&lt;/li&gt;
&lt;li&gt;Web Security
&lt;/li&gt;
&lt;li&gt;Email Security
&lt;/li&gt;
&lt;li&gt;Security Assessments
&lt;/li&gt;
&lt;li&gt;Intrusion Management
&lt;/li&gt;
&lt;li&gt;Security, Information and Event Management (SIEM)
&lt;/li&gt;
&lt;li&gt;Encryption &lt;/li&gt;
&lt;li&gt;Network Security&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;(&lt;em&gt;Bonus read: A detailed blog about &lt;a href="https://hsc.com/Resources/Blog/Security-as-a-Service-SECaaS-A-Detailed-Overview"&gt;SECaaS&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;Any &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Application-Engineering/Cloud"&gt;cloud computing service&lt;/a&gt; must be sufficiently secure. As more organizations move their vital data online and into the cloud, the risk of security breaches or cyber-attacks is growing. Maintaining a responsible cloud presence entails meeting strict security and compliance regulations as well as employing smart security techniques. &lt;/p&gt;

</description>
    </item>
    <item>
      <title>DevOps and its benefits</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Mon, 09 May 2022 07:01:21 +0000</pubDate>
      <link>https://dev.to/hughes-systique/devops-and-its-benefits-2pc6</link>
      <guid>https://dev.to/hughes-systique/devops-and-its-benefits-2pc6</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xjLLi2pG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zkb4qbifhgxusmbud0z2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xjLLi2pG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zkb4qbifhgxusmbud0z2.png" alt="DevOps || Hughes Systique" width="880" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In 2015, Brett Hofer, in his 4 part blog series, Art of DevOps, drew a parallel between the Art of War and Art of DevOps. He wrote, &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Ultimately, we're fighting for the absolute best services and features that we can deliver to our customers as quickly as we possibly can. We seek to be victorious over our competition, successful in informing and meeting or exceeding the expectations of our commanding officers while preventing and mitigating casualties caused by critical issues and poor performance."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h1&gt;
  
  
  So what exactly is DevOps?
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://hsc.com/Resources/Blog/Why-DevOps-Is-Crucial-For-Your-Business"&gt;DevOps&lt;/a&gt; is Devlopment+Operations. It is the working of the development and operations teams to enable faster development and efficient maintenance of deployments. &lt;br&gt;
By Wikipedia definition, &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To understand why DevOps is different, we need to understand what used to happen before the &lt;a href="https://hsc.com/Services/Product-Engineering-Services/DevOps-Practices-and-Offerings"&gt;DevOps methodology&lt;/a&gt; was in place. So, before DevOps, we had something called a Waterfall Model. In the Waterfall model, everybody worked in silos- the developers worked on writing code for an application, the QA team worked around the code's flaws and quality, and then the system admins had the job of making sure everything ran smoothly during deployment. In general, the communication between the teams was limited as they worked in their separate environment. So, whenever any error or bug arose, it became very chaotic:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The developers would sort the bug out.&lt;/li&gt;
&lt;li&gt;The QA team would again check it for quality.&lt;/li&gt;
&lt;li&gt;The changes would be pushed again for deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even a small issue would create a substantial amount of mess. When the number of releases increases, the situation would spiral out of hand. And the blame game would start, with each team blaming the other one.&lt;/p&gt;

&lt;p&gt;DevOps methodology breaks these silos and makes sure that developers are consulted and kept in the loop during deployment; QA guys do more than testing, and system admins can write scripts. All of this is possible as DevOps makes sure that a proper communication channel is maintained between the teams. This way, all the teams understand the issues faced by other teams.&lt;/p&gt;

&lt;h1&gt;
  
  
  Some benefits of DevOps Methodology:
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--K-qkAbZl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/igopobq0itfqnhpt3ii1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--K-qkAbZl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/igopobq0itfqnhpt3ii1.png" alt="benefits of DevOps Methodology || HSC" width="880" height="554"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improved software quality enabled by automation&lt;/li&gt;
&lt;li&gt;Improved monitoring and quicker service recovery
-Quicker turnaround of change requests 
-Greater synergies between development, testing, and operations 
teams&lt;/li&gt;
&lt;li&gt;Continuous and iterative deliveries&lt;/li&gt;
&lt;li&gt;Reduced Operational Costs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To enhance DevOps, security is introduced during the early part of the SDLC. Security + DevOps= SecDevOps or simply &lt;a href="https://hsc.com/Resources/Blog/SecOps-Bridging-Security-IT-Operations-To-Proactively-Address-Security-Concerns"&gt;SecOps&lt;/a&gt;.&lt;br&gt;
(&lt;em&gt;Read about the &lt;a href="https://dev.to/hughes-systique/role-of-a-secops-center-secops-team-secops-with-ai-5abk"&gt;role of SecOps centre&lt;/a&gt;&lt;/em&gt;)&lt;br&gt;
&lt;em&gt;(Read:&lt;a href="https://dev.to/hughes-systique/automated-deployment-of-cicd-4neg"&gt;Automated Deployment Of CI/CD&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>secops</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Role of a SecOps Center, SecOps team, &amp; SecOps with AI</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Wed, 04 May 2022 06:22:07 +0000</pubDate>
      <link>https://dev.to/hughes-systique/role-of-a-secops-center-secops-team-secops-with-ai-5abk</link>
      <guid>https://dev.to/hughes-systique/role-of-a-secops-center-secops-team-secops-with-ai-5abk</guid>
      <description>&lt;p&gt;&lt;em&gt;Read &lt;a href="https://dev.to/hughes-systique/what-is-secops-and-its-benefits-3l37"&gt;what is SecOps and its benefits.&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Role of a SecOps Center
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Constant Network Monitoring-
&lt;/h2&gt;

&lt;p&gt;SecOps teams monitor the network around the clock to immediately be aware of impending security threats. Advanced tools are used to point out statistically inappropriate behaviour in the systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Incident Response and Remediation-
&lt;/h2&gt;

&lt;p&gt;One significant role of a SecOps team is to respond to any incurred threat immediately. &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Network-Infrastructure-Engineering-Services"&gt;Network monitoring&lt;/a&gt; tools generally detect the incidents before the ill-effects spill onto the end-users. The team is expected to take remedial actions and perform damage control (restore lost, affected and compromised files).&lt;/p&gt;

&lt;h2&gt;
  
  
  Forensics and Root Cause Analysis-
&lt;/h2&gt;

&lt;p&gt;After a security breach or another unexpected event, it is imperative to make sure why it took place. This investigation is necessary to avoid any such attacks in future. Various log data and other pieces of information are thoroughly analyzed to determine the source of the breach.&lt;/p&gt;

&lt;h2&gt;
  
  
  Threat Intelligence-
&lt;/h2&gt;

&lt;p&gt;To keep attackers at bay, the team needs to be prepared at all times. It must possess the knowledge of the newest &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;security&lt;/a&gt; technologies and trends in cybercrimes. Cybercriminals are ever innovating, and the team needs to be a step ahead of them to have an actionable plan to counter the attacks. This preparation method involves SecOps teams collaborating within as well as with other teams of various industries. &lt;/p&gt;

&lt;p&gt;It is also essential to have methods in place to prevent and proactively respond to threats. Thus, it is necessary to periodically maintain and update the existing security systems and security policies. &lt;/p&gt;

&lt;h1&gt;
  
  
  Key roles/positions on a SecOps team
&lt;/h1&gt;

&lt;p&gt;The structure of an organization's SecOps team defines its success in preventing cyber-attacks. Putting roles together piecemeal without an overall strategy will lead to an incoherent response. Instead, an organization requires a well-coordinated SecOps team with defined roles covering the full spectrum of cybersecurity threats and attacks. &lt;/p&gt;

&lt;h2&gt;
  
  
  5 key roles for every Security Operation Center (SOC) team:
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Incident responder:
&lt;/h3&gt;

&lt;p&gt;Is the 1st responder to hundreds of security threats/alerts received every day. He is responsible for configuring and monitoring the security tools.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security investigator
&lt;/h3&gt;

&lt;p&gt;Is responsible for identifying affected hosts and evaluating terminated processes. It is also a part of his duty to identify sources of attacks and methodologies used.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advanced security analyst
&lt;/h3&gt;

&lt;p&gt;Is responsible for conducting vulnerability tests and performing security analysis. He is responsible for assessing the security framework and fixing potential security lapses.&lt;/p&gt;

&lt;h3&gt;
  
  
  SOC manager
&lt;/h3&gt;

&lt;p&gt;Is responsible for hiring and training the staff. As a manager, he is also in charge of allocating resources and managing the team.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security engineer/architect
&lt;/h3&gt;

&lt;p&gt;Is a specialist whose responsibility is to maintain security aspects in the design of the information systems. &lt;/p&gt;

&lt;h1&gt;
  
  
  SecOps roadmap with AI tools Integration
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://hsc.com/Services/Product-Engineering-Services/Application-Engineering/RPA"&gt;Automation&lt;/a&gt; and Artificial Intelligence &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Application-Engineering/Machine-Learning"&gt;AI&lt;/a&gt; have found their way into SecOps tools, and organizations should aspire to automate as many functions as possible.&lt;/p&gt;

&lt;p&gt;There are numerous SecOps and SOC automation use cases, including incident detection, response, analysis, landscape analysis, emergent threat mitigation, human SOC analyst augmentation, and security training gamification.&lt;/p&gt;

&lt;p&gt;Teams can use automated functions to compile data on security incidents, assign risk scores, cluster for similarities, differentiate and prioritize distinct kinds of threats, recommend response or remediation steps, and more.&lt;/p&gt;

&lt;p&gt;SecOps teams benefit from automation by achieving awareness of the current state, understanding what could happen, and a plan of action. Increased threat vectors, such as IoT devices, necessitate SecOps teams having the outlook that AI can provide – insight that assists in detection and prevention. Automation also frees humans from time-consuming, manual tasks, focusing more on SecOps strategy.&lt;/p&gt;

&lt;p&gt;More and more enterprises are now adopting SecOps as a cost-effective way of developing applications. Companies incorporate security into their entire business process by implementing SecOps from the start. This approach ensures that requirements are fulfilled, and systems are designed with safety. This "shift left" enables security to work together to set up a security system. It also pushes members of the operations team to reconsider how they create and develop.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Bonus read-&lt;/em&gt; &lt;br&gt;
&lt;a href="https://hsc.com/Resources/Blog/Growing-importance-of-NetOps-in-Network-Management"&gt;&lt;em&gt;Growing importance of NetOps in Network Management&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>secops</category>
    </item>
    <item>
      <title>What is SecOps and Its Benefits</title>
      <dc:creator>Jasveen Singh</dc:creator>
      <pubDate>Mon, 02 May 2022 07:40:27 +0000</pubDate>
      <link>https://dev.to/hughes-systique/what-is-secops-and-its-benefits-3l37</link>
      <guid>https://dev.to/hughes-systique/what-is-secops-and-its-benefits-3l37</guid>
      <description>&lt;p&gt;There was a time when cyber-attacks were unheard of, and cyber-criminals weren't innovating continuously to find novel ways of breaking into an IT system. But today is different. As security attacks grow, the need to combine Security and Operations teams to provide a comprehensive security framework has become paramount.&lt;/p&gt;

&lt;p&gt;Although combining Security and Operations (SecOps) is the step forward, it still isn't widely followed. A report by Dark Reading found that 28% of the organizations bring the Security team at the beginning of the projects only when the project is critically important. Furthermore, most of the respondents agreed that the security teams are often not consulted at all during the initial phases. But this doesn't mean the trend towards adoption of SecOps is in anyways receding. A &lt;a href="https://www.forbes.com/forbesinsights/bmc/index.html"&gt;Forbes Insights&lt;/a&gt; report concluded that almost half the surveyed companies planned to combine security and operations teams to fortify the &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;security&lt;/a&gt; of their essential applications.&lt;/p&gt;

&lt;h1&gt;
  
  
  What is SecOps?
&lt;/h1&gt;

&lt;p&gt;SecOps is a collaborative effort between &lt;a href="https://hsc.com/Services/Product-Engineering-Services/Security"&gt;IT security&lt;/a&gt; and operations teams that unites tools, processes, and technology to maintain enterprise security while reducing risk. As a perceived harmful cyber-attack can affect an organization's best security tools by restricting or shutting down essential application's running time, it is crucial to address security threats that may undermine the working of an organization. SecOps is a methodology that aims to do just that by operationalizing and hardening security across the software lifecycle.&lt;/p&gt;

&lt;p&gt;Generally, cloud-hosted applications have a development team, an operations team, and an IT security team. IT organizations face numerous problems, the most common is establishing an effective collaboration between these teams. The role of a development team is to build new updates and program patches; the operations team is responsible for performance management, whereas the security team maintains the security framework to preempt security risks. Since the roles of these teams are very different from each other, it is very easy for these teams to work independently without much collaboration with each other. This working in silos leads to various security and operational issues. Let's understand this by an example- If a development team works without any collaboration with the security team, it can build an unstable patch. The operations team will then be left to manage the performance of a sub-optimal patch update. And in trying to push a sub-optimal patch, they might create various security issues.&lt;/p&gt;

&lt;h1&gt;
  
  
  Benefits of SecOps:
&lt;/h1&gt;

&lt;p&gt;Adopting a SecOps methodology has many benefits:&lt;/p&gt;

&lt;h2&gt;
  
  
  Return on investment:
&lt;/h2&gt;

&lt;p&gt;Compared to the traditional security environment, SecOps provides a higher Return on investment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security and operations become streamlined:
&lt;/h2&gt;

&lt;p&gt;Priorities are managed and consolidated more effectively, communication and information are integrated, and tools and technology are linked.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reduced resources:
&lt;/h2&gt;

&lt;p&gt;Key security protocols are done automatically for all streamlined security plans, and effective responses are orchestrated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Fewer cloud security issues:
&lt;/h2&gt;

&lt;p&gt;Fewer security breaches, vulnerabilities, and security distractions contribute to a safer security environment.&lt;br&gt;
&lt;em&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/While-Cloud-Adoption-May-Be-An-Obvious-Choice-Is-It-Really-Secure"&gt;Is Cloud really secure?&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Fewer app disruptions:
&lt;/h2&gt;

&lt;p&gt;Lesser configuration errors are caused, and modifications in application code are linked to deployment rules.&lt;/p&gt;

&lt;h2&gt;
  
  
  Better auditing procedures:
&lt;/h2&gt;

&lt;p&gt;Vulnerabilities that were observed can be addressed proactively. Policies for adhering to appropriate standards are checked and enforced automatically.&lt;/p&gt;

&lt;h2&gt;
  
  
  Earlier detection and prioritization:
&lt;/h2&gt;

&lt;p&gt;SecOps prefer to check smaller, more constructive sections rather than large batches or entire programs all at once&lt;/p&gt;

&lt;h2&gt;
  
  
  Increased transparency:
&lt;/h2&gt;

&lt;p&gt;Increased ties and collaboration among development, security, and operations can lead to increased transparency.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security improvements:
&lt;/h2&gt;

&lt;p&gt;SecOps enhances security to &lt;a href="https://hsc.com/Services/Product-Engineering-Services/DevOps-Practices-and-Offerings"&gt;DevOps&lt;/a&gt;' programming and operational elements.&lt;br&gt;
&lt;em&gt;(Read: &lt;a href="https://hsc.com/Resources/Blog/Security-as-a-Service-SECaaS-A-Detailed-Overview"&gt;Security as a Service&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Read the full article &lt;a href="https://hsc.com/Resources/Blog/SecOps-Bridging-Security-IT-Operations-To-Proactively-Address-Security-Concerns"&gt;here&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>secops</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
