Welcome!

Andy Thurai

Subscribe to Andy Thurai: eMailAlertsEmail Alerts
Get Andy Thurai via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Andy Thurai

[by Andy Thurai] "Application-Aware Firewalls."You may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level security unless either you are the developer, admin, or user of those specific services or perhaps a hacker. Especially when your traditional network boundaries disappear you can’t carry all of those devices with you. When you move out of your traditional boundaries, towards the cloud, you trust the cloud provider to provide you these features. But you can’t do the same with application level security.  That is because those devices work on a level below the Application Layer (Or Layer 7 in the ISO-OSI architecture model). And those standards are very well define... (more)

Why Are APIs So Popular?

Kin Lane recently wrote a couple of blogs about why copyrighting an API is not common. I couldn’t agree more that copyrighting APIs is uncommon. First of all, the API definition is just an interface (It is the implementation detail that is important, and needs to be guarded), so it doesn’t make any sense to copyright an interface. (It is almost like copyrighting a pretty face ). Secondly, the whole idea of exposing an API is you are looking for others to finish the work you started by just providing the plumbing work. Why would anyone want to get involved with a copyrighted API a... (more)

Big Data – Big Help or Big Risk?

By Andy Thurai (Twitter: @AndyThurai) (Original version of this blog appeared on ProgrammableWeb) As promised in my last blog “Big Data, API, and IoT …..Newer technologies protected by older security” here is a deep dive on Big Data security and how to effortlessly secure Big Data effectively. Like many other open source models, Hadoop has followed a path that hasn’t focused much on security.  In order to effectively use Big Data, it needs to be secured properly. However if you try to force fit into an older security model, you might end up compromising more than you think. But if... (more)

API Management – Anyway You Want It

This article originally appeared on Gigaom. Enterprises are building an API First strategy to keep up with their customer needs, and provide resources and services that go beyond the confines of enterprise. With this shift to using APIs as an extension of their enterprise IT, the key challenge still remains choosing the right deployment model. Even with bullet-proof technology from a leading provider, your results could be disastrous if you start off with a wrong deployment model. Consider developer scale, innovation, incurring costs, complexity of API platform management, etc. O... (more)

IoT and Digitizing Healthcare | @ThingsExpo #IoT #BigData #Microservices

Slow Healthcare Costs by Digitizing Healthcare The United States spends around 17-18% of its GDP on healthcare every year. When you put this into dollar numbers, it is a mind-boggling $2.9 trillion. Unfortunately, that spending will grow at a faster rate now due to baby boomers becoming an aging population, and they are the largest demographic in the U.S. (Baby boomers are about 76 million, which accounts for 25% of the population of the U.S.). The healthcare related spending is expected to grow at a faster pace than the under 5% annual rate it grew over the last decade. Unless th... (more)