Tag: Blog

Home / Blog / Page 7

Walkthrough of the Singapore Personal Data Protection Act 2021 Update

Introduction The Personal Data Protection Act (PDPA) is Singapore’s data privacy regulation. In this blog post, we look at some of the differences between PDPA and European Union’s General Data Protection Regulation (GDPR), and the general perception and applicability of PDPA. Privacy regulation tends to be a secondary consideration for many organisations dealing with the […]

Read More… from Walkthrough of the Singapore Personal Data Protection Act 2021 Update

Forging Organisational Cloud Compliance at Scale with AWS

Introduction When large and highly regulated organisations shift workloads to the cloud, these environments come laden with requirements for robust oversight. Stakeholders have a ‘zealous’ focus on the requisite governance models, security infrastructure, and risk controls being associated with the cloud. At Sourced, we work closely with these organisations to meet these challenges and deploy robust frameworks to meet these requirements and mitigate risks – all while using AWS-available tools. In this blog, Sourced consultants walk you […]

Read More… from Forging Organisational Cloud Compliance at Scale with AWS

Australia’s New Cyber Security Strategy: What You Need To Know And How To Be Prepared

According to Frost & Sullivan, cyber security incidents can cost Australian businesses up to AU$29 billion a year. In Australia, in the last few months alone, we have seen high-profile cyber incidents at Toll Group, Bluescope Steel, the Australian Taxation Office (ATO) and a large state-based attack targeting all levels of government, political parties and […]

Read More… from Australia’s New Cyber Security Strategy: What You Need To Know And How To Be Prepared

5 Ways DevOps Helps With Technical Debt

Introduction Many organisations uncover mountains of technical debt during their migration to the cloud. But what is technical debt and how can DevOps help us deal with it? In this post, we discuss five ways DevOps can turn your technical debt mountain into a molehill! What is Technical Debt? Technical debt is the accumulation of […]

Read More… from 5 Ways DevOps Helps With Technical Debt

The Down Under Program – An Intensive Learning Experience That Will Shape My Career For Years to Come

If you had told me a year ago that I, a 24 year-old Associate Consultant in Toronto, would be 15,558 km away from my family and friends, learning from some of the best cloud consultants in Australia, I would not have believed you. Yet here I am, six months and a couple of mild sunburns […]

Read More… from The Down Under Program – An Intensive Learning Experience That Will Shape My Career For Years to Come

What Does a Scrum Master do Once the Daily Stand-up is Done?

What does a Scrum Master do all day? Misconceptions about this role are rife. Some people think they’re accountable for everything, others think they’re accountable for nothing. In the worst cases, they’re considered the team dogsbody, in charge of booking meetings, making coffee and writing up notes. In fact, the Scrum Master plays the vital […]

Read More… from What Does a Scrum Master do Once the Daily Stand-up is Done?

Aircraft Communications – Cloud Architecture for Aircom Flight Messenger

Introduction Commercial aircraft have several different communication capabilities so that the pilots and supporting staff have access to all the information they need to ensure they safely and effectively arrive at their destination. The most prevalent of these systems is the two-way air to ground data communication system called ACARS, or the Aircraft Communication and […]

Read More… from Aircraft Communications – Cloud Architecture for Aircom Flight Messenger

Deploying Pega Platform as Code on Microsoft Azure

Introduction Sourced was recently engaged by a global Financial Services Industry (“FSI”) client to perform a migration of their Pega Platform installations to Microsoft Azure. This initiative was in response to their existing on-premises environment experiencing severe capacity constraints, preventing customer-facing business units from bringing new products to market. Given the prevalence of Pega within […]

Read More… from Deploying Pega Platform as Code on Microsoft Azure

Preventing Leaky Buckets – Enabling Private and Secure Access to S3 for Hybrid Clouds

Introduction Heavily regulated enterprises involved with sensitive commercial and customer data often treat public cloud services as low-trust and enforce inspection, filtering and data loss prevention on data transfer to services such as S3. This introduces complexity and performance overheads for development teams looking to build applications in AWS that rely on S3 for storage. […]

Read More… from Preventing Leaky Buckets – Enabling Private and Secure Access to S3 for Hybrid Clouds