• Design
    • Back
    • Product Design
    • Mobile Experience
    • Design Systems
  • Cloud
    • Back
    • Cloud Migration
    • Modernization
    • Serverless
    • Microservices
    • Workshops
    • Well Architected Review
    • AWS Partnership
    • Microsoft Partnership
  • Data
    • Back
    • Data Science Solutions
    • AI & Machine Learning Solutions
    • Data Exploration Workshop
    • Data Engineering
    • Data Maturity Assessment
  • Development
    • Back
    • Outsourcing IT
  • Industry
    • Back
    • Manufacturing
    • Retail
    • Fintech
    • Finance
    • Telecommunication
    • mhealth
  • Case Studies
  • Blog
  • About us
    • Back
    • Events List
    • Publications
  • Contact Us
EN
PL

Blog

All
Machine Learning
Business Analysis
Consultancy
Artificial Intelligence
DevOps
Data science
Cloud
Software Development
Quality Assurance
Design
News
Events
AGV
Big Data
Blockchain
Cloud
Logistics

Logistics: Top 5 Warehousing Trends in 2021

Last year, online sales on Black Friday hit $9.03 billion For context, just 3 years earlier, the revenue generated from eCommerce reached only $1.3 billion. As a result of the rising digitalization, the need to transform warehouses into smart logistic centres is growing accordingly. And funnily enough, although some warehouses have already embraced the miracles of modern technology, many others still use… paper counts.
March 3, 2021,
Rafał Jasiński
Legacy Systems
Modernization

MS-DOS in… 2021? Sure – 7 Ways to Modernize Your Legacy Systems

Did you know that in 2021, numerous manufacturing machines are still operated by Windows 95’s ancient precursor? Since MS-DOS premiered in 1981 (Ronald Reagan just started serving his first term), you may naturally think – how is that even possible? The short answer is – legacy systems are not easy to replace. And interestingly, it’s rarely due to the cost factor.
February 17, 2021,
Kevin Dabrowski
Amazon AWS
AWS
Cloud
cloud security
ethical hacking
Hack
hacking
kubernetes
security
security in the cloud

Hacking into an AWS Account – Part 3: Kubernetes

In this instalment of the AWS hacking series, I’ll give you an overview of the potential weak points of Kubernetes and show you how I uncovered real-life credentials during my last research run.
November 24, 2020,
Michał Brygidyn
AWS
hacking
Jenkins
security

Hacking into an AWS Account – Part 2: Jenkins 

In this article, we’ll review potential security issues and establish what you can do to secure your AWS accounts against any unwanted access through Jenkins. 
October 21, 2020,
Michał Brygidyn
AWS
Cloud
ethical hacking
security
security in the cloud

Hacking into an AWS Account – Part 1: Atlassian Apps

As our increasingly sophisticated technology creates more and more interconnected systems, the need for greater security becomes more important than ever. Yet cyber security doesn’t equal setting up a firewall or an antivirus software anymore; it’s a process involving policies, training, compliance, risk assessment and infrastructure. Not having this process…
August 26, 2020,
Michał Brygidyn
Nearshoring

This Report Explains Why You Should Develop Your Software in Poland

The Polish Development Fund (PFR) has recently published a report that explores the Polish ecosystem of startups, scaleups and the investment landscape. The verdict is clear: Poland is becoming one of the most popular tech hot spots in Europe.
August 12, 2020,
Kevin Dabrowski
5G
latency
Telco
telecommunication

5G: What Is The Key To Low Latency?

5G – the fifth generation of the cellular network standard – is undoubtedly a technological game-changer. Compared to 4G, it introduces an entirely new level of data transmission speed, reliability, number of connected devices, and low latency. Each of these improvements is a crucial change. But, in my opinion, the most ground-breaking is the minimised latency.
July 29, 2020,
Pawel Zajaczkowski

Popular posts

Logistics: Top 5 Warehousing Trends in 2021
MS-DOS in… 2021? Sure – 7 Ways to Modernize Your Legacy Systems
Hacking into an AWS Account – Part 3: Kubernetes
Hacking into an AWS Account – Part 2: Jenkins 
12345...>»

Made with in PGS Software

Copyright © PGS Software 2005 - 2021

  • Privacy policy
  • For Investors/ Dla Inwestorów
  • Careers

Copyright © PGS Software 2005 - 2021