Portfolio | HASSEM PRAG
It's more than success to you. It's more than technology to us.
Hassem Prag,Hassem,Mo Hassem,Prag,Jay Prag,CIO,Advisory,Consulting,Solutions,Resourcing,Digital onboarding,Payment Solutions,Analytics and AI,outsourcing,permanent and contracting,Payment solutions,Payment,reconciliation,KYC,experiences,Architecture,Design thinking,IBM,Rehat,Development and programming,Agile Practices,Project management,Testing,Cyber Security,Mainframe,AI,Cloud,farieda mayet,deidre wolmarans
0
archive,post-type-archive,post-type-archive-portfolio_page,ajax_leftright,page_not_loaded,,qode-content-sidebar-responsive,qode-theme-ver-16.7,qode-theme-bridge,qode_advanced_footer_responsive_1000,wpb-js-composer js-comp-ver-5.5.2,vc_responsive,elementor-default,elementor-kit-16169
Posted at 04:19h
in
In Part 1 we discussed the basic requirement for your cryptography journey. We are now going to focus on the constructs of running off-host Hardware Security Modules (HSMs) vs on-host HSMs vs Software HSMs. It’s a 3-way comparison and some of the considerations when taking...
Posted at 13:50h
in
A lot has been said about cryptography, the algorithms that support it and the mechanisms to deliver data securely without any compromises. This becomes a far reaching exercise when financial transactions require the best form of security to ensure data cannot be compromised....
Posted at 14:57h
in
There is no clear winner here so one has to determine the workloads and configurations needed in order to determine hosting requirements. The only issue is with z/OS where you are bound by rules that govern the platform. So if you have COBOL applications, you...
Posted at 12:36h
in
In running these tests we have common disk technology, common workloads and common databases. We used Katalon to run scripts with workloads that are identical.
So we believe the myth is busted. You must ensure you have a detailed understanding of your I/O sub-system...
Posted at 15:01h
in
Come chat to us on how we can enhance your security framework on a mainframe.
Mainframe security has advanced so myth not busted....
Posted at 09:15h
in
You have to take a different approach where COBOL acts as the mothership, flagged by intermediate to smaller ships focussing on specifics....
Posted at 07:31h
in
In our experiences, we have found that the investment needed to refactor, reimagine or reinvigorate is far cheaper than trying to replace the system fully. As an example, a core banking system replacement will cost north of R2Billion, whereas only around R200Million is required...
Posted at 09:32h
in
If I were not daring enough to be brave, I would have still been waiting for the opportunity to ask my questions.
When an opportunity knocks on your door and it feels daunting and scary take a moment to observe and look for familiarity in the...
Posted at 14:25h
in
Building strategy for the sustainability of the organization is usually a future plan with all the current resource challenges, policy and regulations, economic uncertainty, technological pressure, social constraints and environmental factors we are facing as a business we have one very sensitive balancing act to...
Posted at 15:04h
in
The common perception that digital and digitalization mean the same thing and do the same things are a total misnomer. Adding 2.0 implies that you have fundamentally changed the rules and have broken the traditional barriers within which you define your business. You are applying...