Illycaffè and SORINT.lab: A Model of Excellence in Digital Transformation
In the world of coffee, and especially for a giant like illycaffè, precision is everything. Not only in the production and quality of the product,…
IT Resiliency
User and Entity Behavior Analytics : The security reporting tool developed by SORINTians
Background Some key points to consider: SORINTians solved a long-standing problem for a client in the banking and finance sector, achieving a major result in…
IT Resiliency
NIS2 Directive: a 3-minute overview of everything you need to know
In today’s digital world, cyber threats are multiplying rapidly and affecting all kinds of organizations. That’s where NIS2, the new European cybersecurity directive, comes in.…
Application Modernization
Data, analytics and BI: SORINT.lab’s Augmented Analytics project is born
Important Note: In order to comply with many of our clients confidentiality agreements, in some cases it is not possible for us to mention their…
Application Modernization
Why your business needs custom management software: benefits and ROI
Custom management software development can become an incredible tool in the hands of organizations and businesses. It is an increasingly popular method of having applications…
Application Modernization
Why Open Source Software is revolutionizing business development
For software developers, open-source offers an unparalleled opportunity to learn from a global community, improving their skills and visibility. From the organization’s perspective, on the…
DevOps
Why is it important to periodically analyse the MongoDB log files?
When a problem occurs in a MongoDB, nstance, the log file can prove to be a key resource in resolving the problem. This may seem…
Cloud Adoption
When does the FinOps methodology really work? Vademecum for turning data into winning decisions
Imagine a world where very financial decision is supported by accurate and timely data, where resources are optimally deployed and costs are always under control.…
DevOps
What the Scrum methodology is and how a Scrum team works
Today, let’s find out what the Scrum methodology, uis, an essential tool for those who want to optimise project management and are organised in certain…
DevOps
Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024
In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…