WebComponent Vs Angular Formly – Issues in Displaying Forms in Firefox and Safari Browsers

I would like to share a quite interesting stuff with you pertaining to Angular Formly. We at Vmoksha Technologies have set our goal to write optimized code lines with quality. To attain our goal, we as a team, lean towards using new techniques that are contemporary to today’s software development.

One such framework is Angular.js, a quite interesting framework, which we have used in our recent web projects. As an extension to it, we went ahead exploring the feature that lets you generate the HTML forms – Angular-Formly.


Smooth Sail, until you hit rock bottom!

Yes. During the testing phase with multiple browsers and their versions, our quality control team figured out certain browsers such as FIREFOX and SAFARI, which won’t display the HTML forms generated by Angular-Formly. We could have just ignored this and continued with our efforts putting up a disclaimer stating that the project is supported by certain browsers and versions.

But, that doesn’t support the objective of the project. In Vmoksha, “Failure is not an option” (NASA’s mission statement) is the mantra, and we wanted to get this resolved. Questions raised, discussions held to figure out the root cause of the issue. As always, we approached Guru Google as well as developers in multiple forums, for a solution. But, Lady Luck didn’t turn her face towards us for more than a week.


Whether the culprit is Angular-Formly or Browsers in scope?

With no potential hint about the root cause as well as a solution, we could think of one possibility, and that is, “Resolve it yourself”;


Yes, we found it, fixed it and tested it. FIREFOX, SAFARI – OK.

I could hear your mind; tell us the secret, buddy. I know you are thinking about -

What was the root cause? How did you resolve the issue?

Read on, as I keep explaining the data points behind using Angular-Formly, identifying the root cause and providing the fix.


Why we used Angular-Formly?

Even an expert HTML developer would agree that the process of repeating the same block of html code is really frustrating and non-contemporary.

“Angular-Formly is a JavaScript Powered forms for AngularJS; it lets you generate html forms automatically without much of an effort.”

Angular-Formly does just that, it reduces the effort of writing HTML forms and delivers it the way we want it. Customising Formly might seem difficult, but once you achieve it, you can reuse as long as you wish to use it. It does take few parameters and draws the HTML form for you on screen.


How did we resolve the browser issue?

The below images depict the scenarios of our implementation of Angular-Formly forms in different browsers:

In Chrome:

Angular formly

In Firefox and Safari:

Angular formly

Our approach to resolving the issue kick-started with the following questions:

  1. Is it the CSS that we are using in the project?
  2. Could it be a problem with the version of Angular-Formly used in the project?
  3. Maybe Angular-Formly doesn’t support FireFox and Safari. Did we check it?
  4. An overlap of a JS or CSS is possible. Who knows?

The last question ignited a thought in our minds. Eventually, we nailed down the root cause of the issue as we kept analysing each JS file referred to the project. We found something striking – WebComponents.js and ran the project excluding the component. To our astonishment, the Angular forms displayed seamlessly in all browsers including FIREFOX and SAFARI. So, we extended our research on the use of the component, its source, and impact.


Root Cause of the issue

In our project, we have a placeholder to show maps, and for that very reason, we had Google-Map bower component installed with a list of dependencies.


Subsequently, the Polymer dependency bower components got installed, and one such dependency file is the “WebComponents.js” [an optional dependency item]

  	"type": "git",              
        "url": "https://github.com/Polymer/polymer.git"   
        "web-component-tester": "*",                         
        "iron-component-page": "polymerElements/iron-component-page#^1.1.6"          


About Webcomponent.js

WebComponents.js is a set of polyfills that is built on top of the Web Components specifications. Web components assist you in creating your own custom HTML elements. Instead of loading your sites with verbose mark-ups, repetitive code, and long scripts you wrap up everything into neat little custom HTML elements.


Final Fix

Note: The WebComponents.js polyfill layer is no longer needed for browsers that fully implement the Web
Components APIs, such as Chrome 36+

So, we excluded the WebComponent.js script from the project. Since then the Angular-Formly form is working seamlessly in all the modern browsers.

Hope, this write up helped you to learn something out of our experience and also, to resolve the issue.

Thanks, for reading our blog. Watch this space as we continue our journey in building robust applications with an objective and quality.

Virtual Hosting Using Nginx Server

Nginx is a web server, which can also act as a reverse proxy, HTTP server, IMAP/POP3 proxy server as well as a load balancer. It is well known for its stability, high performance, simple configuration, rich feature set, and low resource consumption. So, we can deploy our web applications like HTML pages and PHP-related applications into this server directly.

Let’s see How to Configure the Nginx as a Reverse Proxy/Virtual Hosting Purpose

#1. Deploy the nginx application in any server (I am taking Ubuntu System).

#2. Choose any domain/sub-domain name, and do the C-name configuring that domain name to nginx server (Ubuntu System Port 80).

Note: Port 80 is the default port for nginx. If you change the port, you need to map the C-name according to that.

#3. Once C-name and nginx applications are ready, create a conf.d folder inside the nginx.

#4. Create a configuration file with the name of domain/sub-domain along with the .conf extension.

For example, if you want the application should work on ‘abc.mycompany.com,’ you have to create a configuration file with the name of ‘abc.mycompany.com.conf,’ and copy the below-given code and save the file.

   server {

      listen 80;

      server_name abc.mycompany.com;

   location / {


      proxy_http_version 1.1;

      proxy_read_timeout 300000;

      proxy_set_header Upgrade $http_upgrade;

      proxy_set_header Connection 'upgrade';

      proxy_set_header Host $host;

      proxy_cache_bypass $http_upgrade;



#5. Restart/reload the Nginx.

Now your application will work with the domain name based on your configuration.



Listen – Nginx port listener

Server_name – Domain name

Proxy_pass – Actual running application URL (domain name indirectly calls this URL)

Proxy_read_timeout – For long connection establishment (optional)

Nginx default connection timeout – 600 m.sec

IoT Bootcamp – 21st & 22nd August

Vmoksha has successfully completed another IoT Bootcamp on 21st & 22nd August, consists of participants from different domains such as engineering, medical sciences, and education background.

The Bootcamp includes technical leads from Persistent Systems and Accenture with 9 years & 6 years experience respectively. An Embedded Engineer from Sasken with 2 years experience, a Doctor from KLE Medical Science with 20 years, and four B.Tech students from Coimbatore have also participated.

Taking our Bootcamp to the next level, we have introduced an advanced Add-on session that includes IoT & WSN (Wireless Sensor Network) module besides our regular Bootcamp sessions. This Add-on session will be delivered to the participant on an additional day or as a separate one-day session based on their preference. The Hands-on session will be performed on a Zigbee protocol using Xbee.




IoT Bootcamp Bangalore

Setting up a Secure Email Engine using Amazon SES

Cloud computing, also known as on-the-line computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, storage, applications, servers, and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide enterprises and users with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.

Amazon Web Services (AWS), a subsidiary of Amazon.com, which offers a suite of cloud computing services that make up an on-demand cloud computing platform.  The scope of this blog is confined to one of the efficient and effective services which are a part of AWS – Amazon SES.

Amazon SES is a pay-per-use email distribution engine that provides AWS users with an easy, authentic, cost-effective, reliable and consistent infrastructure for sending and receiving bulk email correspondence using your domain and email addresses. 

Amazon SES

Why Vmoksha opts for Amazon SES?

Amazon SES works with Elastic Compute Cloud also known as “EC2,” Lambda, Elastic Beanstalk and various other services. It is available in different regions such as US-East, US-West, and EU-Ireland, which allow consumers close to these regions to deploy their applications to ensure high availability and low latency.

Unlike other SMTP players in the market, Amazon SES provides competitive pricing and deliverability.

Listed below are certain benefits of using Amazon SES:

  1. Trusted by Internet Service Providers (ISP) as an authentic source
  2. Cost-Effective & Competitive Pay-per-use pricing
  3. Reliability and Scalability
  4. Bulk Messaging Engine
  5. Automation using Amazon Lambda functions
  6. Ensure deliverability and Active monitoring to make sure that the illegal or questionable content is not being distributed
  7. No Infrastructure challenges
  8. Provides mailbox simulator application as a testing environment
  9. Real-time notifications via Amazon SNS.

How Vmoksha make use of Amazon SES?

The Amazon SES service along with Amazon Lambda service is configured for sending emails automatically. The mail sent via SES is verified by ISP and mail service provider such as Google and finally delivered to the employee(s). To ensure the smooth delivery of the mail, Vmoksha undergoes certain workarounds, which are described in the following sections.

The following diagram explains the scenario

Amazon SES

Setting up Amazon Simple Email Service (SES):

First, set-up Amazon Web Services (AWS) account to use this service

After signing up to the AWS account, log-in into the management console and look for SES under services section or log-in with the URL, http://aws.amazon.com/ses


Steps to verify Email Addresses and Domain:

   I.  Steps to Configure Amazon SES

Goto SES home page, navigate to Identity management menu and choose your option to verify either your email domain or list of addresses.

For example;

Email addresses – sales@abc.com, finance@abc.com and so on…

Domain – abc.com

The verification is managed using the Amazon SES console or Amazon SES API.

Note: Email address and domain verification status for each AWS region is separate.

Although, Email Addresses verification is quite an easy step, completed by opening the verification URL sent by SES. Domain verification demands the following steps,

    1. Go to Domains under Identity Management, select Verify a New Domain.
    2. Enter the domain name and select Generate DKIM settings and Click Verify This Domain.
    3. List of DNS record details will be displayed, which needs to be added in the DNS Zone Files of your domain. Eg. Godaddy DNS management
    4. Download the csv file of DNS Records. This contains the details of Text (TXT), Canonical Name (CNAME), and Mail Exchange (MX) records that need to be added or amended in DNS records.
    5. Domain verification can be done by just adding a text (TXT) record in your DNS Zone File. But, it is highly recommended to perform DKIM verification.
    6. TXT Records looks similar to this,


_amazonses.abc.com         TXT     pmBGN/7MjnfhTKUZ06Enqq1PeGUaOkw8lGhcfwefcHU=


  1. On propagating TXT record in domain, the domain verification status changes to verified
  2. To ensure that the mail is from a trusted source, DKIM verification is required. DKIM verification can be done by adding CNAME records in DNS Control Panel.
  3. Once DNS changes are reflected, the domain is fully verified.

Email Authentication via SPF or DKIM:

Amazon SES uses Simple Mail Transfer Protocol (SMTP) to send an email. Since SMTP does not provide authentication by itself, spammers can send messages pretending to be from the actual sender or domain. Most of the ISPs evaluate the email traffic to check if the emails are legitimate.


Authentication Mechanisms:

There are two authentication mechanisms used by ISPs commonly:

  1. Email Authentication with SPF (Sender Policy Framework)
  2. Email Authentication with DKIM (DomainKeys Identified Mail)


Email Authentication with SPF:

Setting up SPF Records and Generating SMTP credentials:

A Sender Policy Framework (SPF) Record indicates to ISPs that you have authorized Amazon SES to send mail for your domain. SPF Record looks similar to this,

abc.com       SPF           “v=spf1 include:amazonses.com -all”


SMTP Credentials can be generated from SES management console under Email Sending section. It prompts to create an IAM user and provides SMTP username and password upon creation of that IAM user. Another alternative way is to create a separate IAM user with access to SES service using access key and secret key as SMTP credentials.


If SPF Record already exists, then, you can append “include:amazonses.com” to the existing record. Also to work with Google apps, you need to add “include:_spf.google.com ~all”

If SPF record does not exist in the DNS Zone File, text (TXT) record can be added with the value as “v=spf1 include:amazonses.com -all.”


Email Authentication with DKIM:

DKIM (DomainKeys Identified Mail) is a standard that allows senders to sign their email messages & ISPs and use those signatures to verify whether that messages are legitimate and cannot be modified by a third party in transit. DKIM setup can be done by adding CNAME records provided by Amazon SES in DNS Zone File.

Here are the samples of CNAME records for DKIM Verification,

mvkw7orpsecw2._domainkey.abc.com  CNAME  mvkw7orpsecw2.dkim.amazonses.com
jp5x3nni3zf4uo6._domainkey.abc.com CNAME  jp5x3nni3zf4uo6.dkim.amazonses.com
7i3j33udxinbhjf6._domainkey.abc.com  CNAME 7i3j33udxinbhjf6.dkim.amazonses.com


Finally, now it’s time to leave all SMTP servers and move on to AWS Simple Email Service (SES). This way Amazon Web Services reduces the effort of DevOps and takes IT Revolution to the next level.

Useful Links:

UCB Delegates Visit to Vmoksha – 26th July 2016

We were very glad to host the UCB delegates, Mr. Ronny, Mr. Bill Horsburgh, and Mr. Umesh.

Mr. Bill Horsburgh – Sr. Director, Global Head of Legal and Talent, Bangalore

Mr. Umesh – Senior HR Manager, Bangalore

Mr. Ronny – Director, Center of Excellence, Bangalore

We presented the corporate overview of Vmoksha, showcased our services, capabilities and exchanged thoughts and open discussions. The discussions were held in training development, employee engagement, periodic performance evaluation, and reinforcement of monthly review meetings.

Mr. Umesh and Mr. Ronny acknowledged that Vmoksha is providing excellent staffing services with headcount increasing over the years and lesser attrition when compared to other vendors.

The delegates also interacted with our department leads and were told about our new competencies.

UCB Delegates with our CEO and HR Manager

Visit to Office

Spritle Co-Founder Visited Vmoksha Office

Balaji L, Executive Director at our partner company, Spritle Software, visited Vmoksha Technologies Bangalore office recently. Mr. Balaji interacted with Vmoksha team members on a wide-range of topics and shared thoughts on leadership, customer centricity, Agile, DevOps, and teamwork. His thoughts on software estimation and knowledge sharing among team members were particularly appreciated

Spritle Cofounder


Balaji is a seasoned professional in developing Enterprise level web applications using Ruby on Rails and mobile applications using Native Tech, Motorola RhoMobile, Apache Cordova, IBM WorkLight and HTML5. He is a Certified Scrum Master with over 15 years of experience specializing in offshore agile development.



Vmoksha and Spritle have been partners for over 4 years now. We were honoured by the presence of Mr. Balaji and would like to thank him for providing us with his valuable ideas and suggestions. We are looking forward to advancing our business relationships with friendly visits.



Defect life cycle, a.k.a Bug life cycle is the journey of a defect cycle from its identification to its closure. A defect undergoes different states during its lifetime. But before going deep about the defect life cycle phases, it is important to know few fundamentals.

Error – Defect – Failure

Finding flaws in software has never been easy. Rather, it has always appeared to be challenging for the entire team, who are working on its successful completion. The words Effect, Defect & Failure seem to be same, but their meaning varies depending on the context/situation. Error leads to Defect, which further leads to Failure. It is a chained process which has to be rectified in a little while to avoid business impacts.

Defect Life Cycle


The term ‘Error’ means human-made mistake/misconception related to design or a deviation from the actual business requirement. If the authorized person gathers client requirement erroneously, it is referred as Error.


The error in coding or logic part is referred as Defect/Fault/Bug. If the development team coded the mistakenly gathered requirement, it results in a fault.


Failure means any deviation from the desired result. The fault made in coding leads to unexpected results that are different from the end user expectation. In that case, we say the project landed in ‘FAILURE.’ 

Defect Life Cycle

Defect life cycle has many stages from open/new until closed or re-opened and it varies from project to project.

Defect Life Cycle

It looks arduous, but if you consider these significant steps, it is quick and easy to find and eliminate a bug/defect. The whole process is explained with different scenarios:


Scenario One

             NEW                                                                                              ASSIGNED


The moment a Test Engineer finds a bug, he should raise the defect with the status ‘Open/New.’ The development team will validate the defect and assign it to a developer changing the status to ‘Assigned.’ The developer will fix the issue and changes the status to ‘Fixed.’ The test engineer performs testing, and if the issue is resolved, he will change the status to ‘Close’ otherwise to ‘Re-open.’

Scenario Two

             NEW                                                                                           DUPLICATE


Sometimes the defect status is mentioned as ‘Duplicate.’ Duplicate defect means the same issue is raised by person A and person B.

NOTE- There is a contrary to this scenario. If a defect has been raised and closed in the past and if the same defect arises in the future, then it is called as ‘New Defect.’

Scenario Three

             NEW                                                                                              INVALID


Invalid/Rejected are nearly similar words. If the developer team finds that when a defect raised by test engineer is invalid, then the developer will change the status as ‘Reject.’

Scenario Four

             NEW                                                                                             PCR/RFE


Product change request or Request for enhancement is considered when there is a need for enhancement type. This may not be determined as defect. For example, let’s consider Gmail application. It has multiple features, and one of that is deleting multiple emails at a time. If this feature is not there, the test engineer should raise a request for enhancement not as a defect.

Scenario Five

             NEW                                                                                          POSTPONED


If a defect is decided to be fixed in the next release, it is stated as ‘Postponed/Deferred.’ The reason to postpone the bug may be like low priority bug, lack of time or the bug may not have a major impact on the software.

Scenario Six

             NEW                                                                                           CANNOT BE FIXED


The possible reason for this situation to arise is more of technology related. Each and every language (JAVA, C, C++, .NET……etc) has their own limitation. So, due to these limitations, this kind of scenario may arise. The other reason may be, the cost of fixing the defect is more than moving with the defect.


Defect tracking and management are the important aspects of Testing/Development. If dealt properly within time, it saves a lot of time and also increases the productivity.

How Long Does SEO Take For Lead Generation?

When a client approaches us for Digital Marketing service, the first question we get is “How long will it take for my website to get ranked #1?” The answer is not so simple because the search engines change often. Let’s explore the actual reasons behind our answer.

Search Rankings and Outcomes

Search Engine Ranking plays a major role when you want to develop sales pipeline.  It increases your visibility to your targeted audience and helps develop potential sales leads. Ranking depends on various factors such as when did the website launched, how much SEO activity you did previously, how much content is there in the website, how many index pages are there on the website and most importantly the keywords used.

However, every entrepreneur wants outcomes rather than outputs. Ranking higher is the output; increase in the leads and sales is the outcome. So, consider hiring an SEO firm that not only focuses on outputs but also emphasizes outcomes.

SEO Variations

How Long Does SEO Take to Start Working?

Obviously, every business owner will be excited to know when they can get leads and sales after initiating the digital marketing. But, the truth is, immediate results are hardly possible in digital marketing. However, effective targeting through on-page changes will make an impact on your sales swiftly.

Effective On-page changes

There are several factors through which you can make your On-page strong:


  • Title tag must contain the search keyword
  • Enter an adequate amount of keywords in description
  • One keyword is supposed to be there in the first sentence
  • Minimum one keyword in the last sentence
  • Internal link to your other web pages
  • H1, H2, H3 tag must contain the search keyword
  • Have your keyword Bold and Italic in the description


  • Don’t put company name in title tag
  • Don’t allow any external link to your site
  • Don’t make your keyword underline in body part

Let’s come to the real picture: When do you get your return on investment?

If you start link building now, you will see results in 10 weeks or before that?

Unfortunately, no. Each step will take a varying amount of time based on your website as well as the resources you have. Based on my research knowledge, I have estimated time constraints for the steps you have to follow.

  • 1-2 months: Finding an appropriate link building agency, who have been working with same vertical or else find an in-house link builder team.
  • 1 month: Create an effective link building strategy and make changes to your On-page as per your requirement.
  • 1-3 months: Find the potential sites to target, and bait those backlinks to that content.
  • 3 weeks – 1 Month: Execute! The 6 best ways to get high-quality backlinks are Social Bookmarking, Directory Submission, Forum Posting, Social Media Website, Web 2.0 posting and photo& video promotion.
  • 1 month-10 weeks: Wait for the posted links to take effect. Don’t do anything with the posted links at least for 10 weeks, because the effect will continue to grow beyond that.

All in all, it means that it may take 6 months–10 months to convert your effort into the result.

Here comes to our final challenge.

How Long Does SEO Take For Lead Generation?

After 6 months of efforts, you can see your website in #1 or #2 pages of Google search engine, Bing, etc. Lead generation majorly depends on the results we achieved in search engine rankings. As long as your website has higher search engine rankings you have a chance to get 45-50% leads. However, considering these 5 elements will also increase your leads and, obviously, your revenue.

5 Major Factors to increase your leads and revenue

Factors to increase leads

  • Targeted Traffic: Using strong keywords in title and description will allow you to get identified when your users are searching for a similar keyword. If you display the product or service with the keyword what your users are searching, his chances of clicking on your link are high.
  • Long term Positioning: Long term positioning of the website in #1 page will definitely increase your productivity in terms of Branding and Lead Generation. So, focusing on your search ranking will increase your leads and also reduce the necessity for paid ads.
  • Position Yourself as an Expert: The expertise of your firm and your competitors may be the same. So, to stand out from the competitors, position yourself as an expert to your prospects by demonstrating the reasons to contact you.
  • Higher Customer Engagement: Direct engagement with customers through live chat, forums, etc. results in better word-of-mouth and more leads.
  • Wider Presence: Build a wider presence for your website through social media engagement. Social media platforms are dominant authorities that determine the relevancy of your website and help to sustain your website ranking in the long term.


SEO is one of the best marketing tactics for higher ROIs. An effective search marketing strategy will have the reliability to render greater ROI by converting visitors into qualified leads. So, hire an SEO firm who can promote your products or services with proven SEO strategies.

Information Security


International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) form the specialized system for worldwide standardization. In the field of information technology, ISO and IEC have established a joint technical commission, ISO/IEC, to preserve the confidentiality, integrity and availability of the information.

ISO standards in action

The International Standard is designed for Organizations to customize as a reference in selecting controls within the process of implementing Information Security Management System (ISMS) and acts as a guidance document for organizations to execute commonly accepted information security controls.

Information Security

Image Source

For businesses, International Standards envisage that the standards are the strategic tools in reducing costs by minimizing inaccuracies and increasing productivity.

Information security requirements

The process of creation and origination through storage, processing, use, transformation until destruction is known as information Life Cycle. Information security remains crucial at all the stages of the life cycle as the unauthorized disclosure or theft of information may impact the core business.

The three main components of Information security requirements are Confidentiality, Integrity, and Availability.

Information Security

Image Source

Confidentiality is the set of guidelines that confines access to information (piracy)

Integrity is assurance that the information is reliable and precise

Availability is a guarantee of consistent access to the information to the authorized stakeholders

Controls selection and implementation

The controls are the guiding principles for Information security management, and their selection is dependent on organizational decisions, based on risk acceptance, risk treatment options, and generic risk management approach pertinent to the organization.

Information Security

Image Source

Information security management system process and Audit cycle 

Audit Cycle

Gap Analysis and Risk Management Analysis are crucial in the ISMS process.

Gap analysis

Gap analysis is obligatory for an organization as it provides a comparison of your security program to the overall security best practices to find out where the vulnerabilities and risks are lurking. This analysis is mandatory in ISO27001 while developing Statement of Applicability (SOA), and is performed subsequent to the risk assessment implementation and risk treatment plan.

Gap Analysis

Image Source

Risk management methodology and framework in ISMS

Risk management is a fundamental part of a company’s management process that deals with the identification, communication, treatment, and acceptance of security risks.

Risk Analysis

Image Source

ISMS provides a framework to simplify the process of risk assessment and treatment. The Threat & Risk Assessment (TRA) and Risk Treatment are two important components of the ISMS framework.

TRA – Identification, analysis, and evaluation of risks together comprise the TRA

Risk Treatment – Development of a risk treatment plan to address the risk exposure to the assets that are identified in the threat and risk assessment process

Risk treatment

Image Source

Evaluating risk

Risk exposure values in terms of likelihood of occurrence and level of impact can be determined using the below risk matrix table.

Matrix Table

Risk treatment plan and Mitigation analysis

The Risk treatment includes:

a)      Accept  – do nothing and accept the current level of evaluated risk

b)      Avoid – cease doing the business activity that brings the possibility of the threat occurrence

c)       Transfer – pass the responsibility for implementing mitigating controls to another entity.  Responsibility for threat and risk management remains the liability of the organization

d)      Reduce – implement controls to reduce risk to an acceptable level

Mitigation is elimination or reduction of exposure to risk.


Business Continuity Plan (BCP)

Business continuity planning is the process of creating systems of prevention and recovery to deal with potential threats to the company. BCP plan will include any incident that could negatively impact operations damaging critical infrastructure services. Risk Management is incorporated as part of Business Continuity Plan.


Image Source

Disaster Recovery

Disaster recovery planning begins with a Business Impact Analysis (BAT).

BAT works on two key metrics

  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)


Image Source

Recovery Time Objective (RTO), which is the maximum acceptable length of time, a business process can be restored after a disaster.

Recovery Point Objective (RPO), which is the maximum targeted period in which data might be lost from an IT service due to a major incident.

Please click here, to know more about Disaster Recovery.


Information Security is the practice of defending information from unauthorized access, disclosure, disruption, modification, recording or destruction.

ISO27001:2013 certification analyzes information security as a blueprint for Information security requirements, Control selection and implementation, Audit cycle, Risk Management, Business Continuity Plan and Disaster Recovery.

Vmoksha Technologies is an ISO27001:2013 certified company, which gives added reassurance to the customer’s data security.

Convergence of Technology Professionals and Entrepreneurs at Vmoksha’s IoT Boot Camp

IoT Training Bangalore

With a profound inspiration from the first IoT boot camp, Vmoksha has successfully completed its 2nd boot camp on 21st and 22nd May 2016. The immersive two-day boot camp covered the in-depth concepts and components of an IoT ecosystem focusing more on industry relevant use cases.

The boot camp is gathered by participants from various domains, including technical professionals from VMware, a graduate from VIT, an entrepreneur from IoT domain, etc. We have received an overwhelming response from our esteemed participants.

IoT Training Bangalore



Here are few testimonials about the IoT Workshop

It was 2-day event. One of the most useful IoT training that I have attended in the recent past. The training was well-structured with a very a good amount of hands-on experience with real devices and software. A weekend well-spent. The trainer has provided us a LinkIT One kit with a lot of sensors; we compiled our Arduino sketchbooks and deployed them to the devices. Other topics that were covered are – IoT Security, Analytics that are relevant in the IoT worldWell done!

- Senior Manager, VMware

The 2 day IoT workshop conducted by vMoskha in Bangalore was an excellent program and really helped me to understand basics of IoT. The IoT workshop was very relevant to my current job and will help me a great deal in most aspects of my future work. The workshop had a good mixture of theoretical and practical sessions. Overall, the workshop was very informative and interesting.

 - Application Developer, VMware

With the growing demand for Internet of Technology, we look forward to stage IoT Boot Camp once every two weeks. We want to continue to educate the different industrial and business sectors about IoT to spread the convenience brought by this technology.

To register for our upcoming IoT Boot camp, please check https://www.bootcamplab.com/