security

How good is ‘GOOD’ to Secure Mobile Apps?

This is in continuation to the previous blog on ‘Mobile Application Management in the BYOD age’ which explained enough the importance of considering the MAM (Mobile Application Management) for enterprise mobile applications, here is something about the MAM technique provided by…

Read more

Mobile Application Management in the BYOD age

As advancements in technology happen, the chances for apps becoming more vulnerable to security threats are on the rise. In this age of BYOD (Bring Your Own Device) where people need access corporate data, it…

Read more

Top 10 Critical NFR for SaaS Applications – Part 2

In continuation to my previous blog on Top 10 Critical NFRs for SaaS application, let’s look at the next 5 critical NFRs that have a deep impact on the SaaS solution architecture. Multi-Tenancy: Multi-Tenancy is the most…

Read more

Top 10 NFR in Software Architecture – Part 1

Non-Functional Requirements (NFR) are those requirements that cut across the software functionality, spanning across all the modules and features. These requirements go deep in to the architecture of an software, which is where they get…

Read more

Business Driven Architecture for SaaS

Do you know that a very small percentage of SaaS businesses are profitable, including those that have been in the market since the SaaS model began? Let’s pick the giant in SaaS business – Salesforce.com.…

Read more

Is Profitability a Myth in SaaS Model?

Whether software vendors like it or not, today they don’t have a choice other than providing atleast one version of their software in a subscription based SaaS model. One single major concern from Independent Software…

Read more

Why ESB is better middleware solution for Healthcare Integrations

Healthcare organizations face challenges in sharing data across geographically distributed healthcare systems and non-healthcare systems due to regulations, compliance and complex distributed platforms. Hence the demand of modern technology solution is vital to establish seamlessly…

Read more

Benchmarking SaaS Maturity (Part 3) – Security Assessment

This is the 3rd part of the blog series discussing on benchmarking the maturity of a SaaS solution. Click the following links to see the earlier parts – part 1 and part 2. In this blog let’s look at…

Read more

Common Sense Approach to Building SaaS Application

If you have decided to develop a SaaS application, the main focus is to build your domain functionalities and take your MVP(minimal viable product) to market. It is not easy though to build a SaaS…

Read more

Let your SaaS Application “REST” in peace

While building a SaaS application, it’s extremely important to support other gateways to access the application features. In today’s world the number of devices that can access your SaaS application is only growing by the…

Read more

Benchmarking SaaS Maturity (Part 2) – Architecture Assessment

In continuation to my earlier blog on benchmarking the maturity of a SaaS solution where I talked about 4 segments through which one can find the maturity of a SaaS solution. In this blog I am going…

Read more

SaaS Architecture – Past and Present

“SaaS” – once such a disputed topic, has now been widely accepted. The increase in the adoption as well as the new technology innovations such as cloud has significantly helped in the evolution of  SaaS architecture.…

Read more