Indian CIOs open up to open source
Indian CIOs are opening up towards adoption of open source but it will not be a ‘rip and replace’ technology and will co-exist along with proprietary software
Read More ...
Amazon cloud withstands WikiLeaks attack
Online retailer's EC2 architecture holds strong in face of coordinated DDOS strike by Julian Assange's backers
Read More ...
Beware of poorly secured WiFi networks
The recent e-mail related to the Varanasi bomb blast on 8th December 2010 was traced to a poorly secured WiFi connection. Here is what you should do to secure your WiFi connection
Read More ...
IBM’s cloud version of Lotus Notes finds good uptake in India
12 percent of Lotus Notes adoption has been via the cloud
Read More ...
Beware of poorly secured WiFi networks
The recent e-mail related to the Varanasi bomb blast on 8th December 2010 was traced to a poorly secured WiFi connection. Here is what you should do to secure your WiFi connection
Read More ...
Amazon cloud withstands WikiLeaks attack
Online retailer's EC2 architecture holds strong in face of coordinated DDOS strike by Julian Assange's backers
Read More ...
IBM’s cloud version of Lotus Notes finds good uptake in India
12 percent of Lotus Notes adoption has been via the cloud
Read More ...
IBM’s cloud version of Lotus Notes finds good uptake in India
12 percent of Lotus Notes adoption has been via the cloud
Read More ...
Amazon cloud withstands WikiLeaks attack
Online retailer's EC2 architecture holds strong in face of coordinated DDOS strike by Julian Assange's backers
Read More ...
Indian CIOs open up to open source
Indian CIOs are opening up towards adoption of open source but it will not be a ‘rip and replace’ technology and will co-exist along with proprietary software
Read More ...
No comments:
Post a Comment