Categories
Challenges & Trends

Fighting Cybercrime With Big Data

Traditionally, cybercrime has been fought through infrastructure. Better firewalls. Better passwords. Better identity management. Cybercrime has historically been the province of technology departments. But is it enough? The BFSI Cybercrime Environment Not in today’s day and age. Every day we hear new stories about online financial fraud or other data breaches. According to the 2015 […]

Categories
Case studies

Successfully Solving Firmware Questions

Think about the items that reside in your average office. Printer? Coffee pot? Thermostat? Guess what. Not only do they all run on power, they also require onboard instructions – or firmware – to make them do what they do. Firmware is generally defined as non-volatile memory embedded in a device. It contains the commands […]

Categories
Case studies

Solving Your SSO / IDM Challenges

How do you combine convenience with identity management and security? How do you bring your end users and your IT team together in the most efficient way possible? By marrying single sign on with your ticketing system in an easy to use mobile application. The problem SRI Infotech was invited by two separate clients to […]

Categories
Challenges & Trends

Top 3 CIO Challenges for 2017

Hard to believe that it’s November 2016 already, isn’t it? For many organizations, it’s time to start thinking about information technology budgets, and goals for the following fiscal year. The Digitization Driver According to the 2017 CIO Agenda Report, one of the biggest forces impacting business today is digitization. With digitization, traditional linear organization flows, […]

Categories
Case studies

Claflin360 Inventory Management System

The Claflin Company has been serving the medical community by providing equipment and supplies since 1817. As a full-line distributor of medical and surgical products sourced from over 500 regional, national and international suppliers, logistics are a critical component of business operations. Rather than focusing on extensive stockpiling, Claflin, which serves some of the largest […]

Categories
Case studies

Collateral / Securities Lending Accounting System

Our client, a leading custodial services and financial management company, was looking to update their processing around securities lending. We developed a system to store the information about all broker-dealers, agency-lenders, securities and stocks, loans, earnings and other financial information required in the course of operating a securities lending business. Challenge The Collateral/Securities Lending initiative […]

Categories
Case studies

BizCal 2: A Better Business Calendar for iPhone

Who here misses their Blackberry? It’s okay… You can admit it. As much as we all love our iPhones… the huge app library, the readily streaming video, the music and the ability to easily sync with our car, there are just some features that business users miss. Readily customizable calendar alerts is one of them. […]

Categories
Challenges & Trends

The Retail – Technology Ecosystem

In today’s retail environment, there is greater competition than ever before. Consumers have unprecedented opportunity to research products, price and availability, and subsequently shop the world with the click of a mouse. Loyalty – previously presumed according to proximity, familiarity and habit – is at a premium. As a result, retailers have been forced to […]

Categories
Challenges & Trends

Why Oracle Exadata

Businesses of all types double the amount of data they generate and store each year. Between capacity needs and inquiry slowdowns, this data explosion can have significant cost implications for enterprises across all industries, particularly those using Big Data for business planning, customer service and intelligence. Increased data requirements are leading 83 percent of all […]

Categories
White Papers

New Trends in Information Security and Addressing DDOS Attacks

The modern, networked world places an emphasis on application quality and speed. Yet, by focusing only on those two issues, security is often overlooked. In order to try to make troubleshooting security infractions more efficient, it helps to develop an automated system. This paper presents details pertaining to the registration and analysis of all computer […]