Official Blog

SORINT.lab

IT Resiliency

NIS2 Directive: a 3-minute overview of everything you need to know

In today’s digital world, cyber threats are multiplying rapidly and affecting all kinds of organizations. That’s where NIS2, the new European cybersecurity directive, comes in.…
Application Modernization

Data, analytics and BI: SORINT.lab’s Augmented Analytics project is born

Important Note: In order to comply with many of our clients confidentiality agreements, in some cases it is not possible for us to mention their…
Application Modernization

Why your business needs custom management software: benefits and ROI

Custom management software development can become an incredible tool in the hands of organizations and businesses. It is an increasingly popular method of having applications…
Application Modernization

Why Open Source Software is revolutionizing business development

For software developers, open-source offers an unparalleled opportunity to learn from a global community, improving their skills and visibility. From the organization’s perspective, on the…
DevOps

Why is it important to periodically analyse the MongoDB log files?

When a problem occurs in a MongoDB, nstance, the log file can prove to be a key resource in resolving the problem. This may seem…
Cloud Adoption

When does the FinOps methodology really work? Vademecum for turning data into winning decisions

Imagine a world where very financial decision is supported by accurate and timely data, where resources are optimally deployed and costs are always under control.…
DevOps

What the Scrum methodology is and how a Scrum team works

Today, let’s find out what the Scrum methodology, uis, an essential tool for those who want to optimise project management and are organised in certain…
DevOps

Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024

In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…
Cloud Adoption

Vendor lock-in: the 5 best practices to avoid it

Among the many benefits of the cloud one of the most appreciated at least on paper initially was the ability to gain greater autonomy in…
Cloud Adoption

The Broadcom/VMware case: everything you need to know

On 22 November 2023, Broadcom acquired VMware with the aim of becoming the leading reference for the enterprise private cloud. This has already marked the…