CDPA - why sometimes a yes and sometimes a no?
We all heard several times about GDPR and its implications on our daily business. Sometimes this abbreviation drives us crazy because it brings us more issues than solutions. But it is not always so bad…
Among other things, GDPR brought to our attention so called data processing agreements, or, as they are known in our organization, commissioned data processing agreements (abbreviation “CDPA”). CDPA is here with us for quite a long time, but only after GDPR many people start to focus more on it.
Freelancer or an employee – does it even matter?
The answer to this question is very straightforward – yes. Now, you may ask “Why?”. Simply, because based on the type of the relationship, the parties may have different rights and obligations. When we are talking about employer-employee relationship, we need to have a look on the labor law, while in case of or company-freelancer relationship, the commercial law will be relevant.
As you may know, law regulating these matters differs from country to country.
High availability in the Cloud: Legacy cloud application design
This is a continuation of the previous blog post High availability in the Cloud: Pan-Net Cloud concepts. Still, we are trying to focus here on VM-based (legacy) deployed applications.
In the topic’s context, we talk about the physical architecture of the application, leaving out the logical architecture as it does not directly map to infrastructure objects. So, when designing the physical architecture of the application, architects incorporate concepts of fault tolerance and resiliency right at the beginning.
Squeezing the most out of argparse
In this post, I would like to argue that Python’s argparse is often the right tool for the job, and you do not need to install additional CLI argument parsers. The straightforward reason to choose it might be that you want to write a simple script that you pass to your colleagues, and you do not want to bother them with the installation of dependencies. You want to make it as portable as possible.
High availability in the Cloud: Pan-Net Cloud concepts
High availability is one of the most essential and desirable metrics for all cloud services. Pan-net’s activities are focused on the development, delivery, and operations of cloud and cloud applications for external and internal customers. This means that high availability and fault tolerance topics are relevant for absolutely all areas of our activity - from internal development to large-scale vendor software solutions deployed on Pan-Net infrastructure.
The consistency of application technical design with the high availability concepts of the infrastructure - is a factor directly affecting the availability indicators of the final system.
New Boron cloud release from Pan-Net up and running in Salzburg and Vienna!
We are happy to announce that we have successfully upgraded our cloud in Bijelo Polje, Podgorica, Budapest and Salzburg to Boron and deployed a new Boron datacenter in Vienna, so we have production applications already successfully running on the new infrastructure version!
Boron is a new Common Infrastructure Team (CIT) cloud release from Pan-Net, designed for both IT and NT workloads – dedicated compute with carrier grade acceleration for NT and cost-effective scalable shared compute for IT.
Public Cloud for Telco Applications - A Sales Guide
How to sell public cloud for Telco Applications? Over the past year the focus of Hyperscalers (AWS, Google, Microsoft) on cloud solutions for core Telco applications has intensified. This has many reasons: Telco application suppliers are in the process to re-design their software to a more cloud-native architecture - driven for example by new 5G stand-alone (SA) core software releases. Furthermore, edge cloud is getting more relevant and the disaggregation of applications and platform will also happen at the edge with initiatives like O-RAN.
Hygiene in identity and access management
As all complex systems need to maintain a certain level of sustainability, transparency and cleanliness, we at IAM care about these buzzwords quite a lot. Furthermore, we try to bring them to practice as well. Why is this theme so important to us? What do you mean by system hygiene? I’ll try to explain in this article. I’ve written about IAM, IDM and IGA in the last article in case you’d need to refresh memory on what field of security I’m talking about.
Step into cloud security
Some of you may say that cloud is nothing new and it is just someone else’s computer, and it is there for decades. While there is grain of truth in this point of view, but not nowadays, when cloud comes in its overall orchestrated, highly available and elastic form. Cloud is almost unavoidable in this day projects, that’s why it comes with the extra price in terms of security.
In this article we will try to explain with simple analogies and easy to grasp parallels, how approach to information security in the cloud is slightly different from the standard way of securing services deployed on-premises.
Cloudified solutions can preserve necessary level of security in comparison with themselves but deployed inside on-premise data centers or even deliver higher level of it. To achieve this, we should adapt our way of thinking, use different approaches, and apply best practices to the type of cloud we are on-boarding our application.
We DO need Sales!
But why? Your customers are also in DT group?! Pan-Net is providing cloud services for the DT group, so we mainly deal with internal customers within the Group, and we are frequently asked “Why would you need sales department, when your main customers are internal?”. The question comes from the “legacy” understanding of sales person being somebody like a used car seller, a guy with a wide smile trying to sell you a lemon, haggling with you and forcing to buy something what you may not need for a higher price to get better profit margin.