24 million home routers exposed to DDoS attacks
Tens of millions of home routers are exposing Internet service provider networks to DNS-based distributed denial-of-service (DDoS) attacks, according to new research from DNS software and security provider...
Read More ...
7 weird applications for the Internet of Things
The Internet of Things (IoT) involves a lot of technologies that provide it with immense potential. This also forces manufacturers to be creative and innovative, because that is one of the ways for them...
Read More ...
Open data apps are all the rage in India
When India launched its open government data (OGD) portal a year ago, there was skepticism over the utility of putting random, disparate, and humongous data sets out in the open with no clear plan on how...
Read More ...
How data analytics is helping retail outlets with critical decision making

Stock-outs are the bane of any retail business – they are costly and they result in long-term losses. Consumers shift to competition when their needs are not met in today’s fast paced world. Companies...
Read More ...
Airtel and IBM announce new services partnership
Bharti Airtel (“Airtel”), a global telecommunications services provider with operations in 20 countries across Asia and Africa, and IBM today announced they have signed a new agreement to manage Airtel’s...
Read More ...
How to migrate from Windows XP securely and safely
Microsoft is expected to pull off support for Windows XP systems on April 8, and many companies are yet to finalize a migration strategy to a newer operating system. According to estimates, 16 percent...
Read More ...
Luminous gears up for disaster contingencies by adopting DR in the cloud
Luminous is a leading power backup solution provider with 3,000 plus employees spread in multiple offices across the country. As a leading player in this space, it was very essential for the company to...
Read More ...
How cloud storage is empowering a new breed of Indian digital service companies

The jury is still out on whether the Cloud will replace traditional IT, having effectively disrupted traditional IT models. But by general consensus, it is safe to say that Cloud is here to stay.
Storage...
Read More ...
Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
The Palo Alto Networks has re-invented network security from the ground up. Its security platform helps enterprises simplify and reduce the cost of ownership of their network security infrastructure. Details...
Read More ...
6 new Google apps tips & tricks
Google had a busy start to 2014: It acquired Nest Labs for USD 3.2 billion, launchedChromebox for meetings, and dropped Google Drive storage prices. But between its biggest headlines, Google also rolled...
Read More ...
Reducing Costs With Next-generation Network Security
Network security teams face a host of challenges - some of them are well understood (organizational issues,compliance), and others brand new (cloud and mobile computing, evolving applications,new cyberthreat...
Read More ...
20 great ideas to steal in 2014
This is InformationWeek's 26th year ranking US companies that use technology in innovative ways. This time the recognition is even more special because we've narrowed the number of honorees from 500 to...
Read More ...
Opera Software launches Opera Mini 8 web browser for basic mobiles
Opera Software, the makers of Opera browsers for desktop PCs and mobile devices, today launched the Opera Mini 8 browser for basic mobile phones. At a time when the number of smartphones being used in...
Read More ...
Microsoft Ventures Accelerator opens applications for fifth batch in India
Microsoft India today announced the opening of applications for the fifth batch of Microsoft Ventures Accelerator in Bangalore, India. Starting April 1, till June 10, Microsoft will receive online (http://aka.ms/MVABangalore)...
Read More ...
Next-generation firewall for dummies
Learn to: - Differentiate between "good" and "bad" applications - Identify evasive techniques used by applications - Implement effective application and network controls
Read More ...
Modern Malware For Dummies
Learn to: - Identify key characteristics of modern malware. - Recognize malware infections. - Implement effective application and network controls.
Read More ...
Do organizations of the future really need a Chief Digital Officer?
As you struggle with how to respond to digital disruption—the wave of new products, services, philosophies, complexities, and relationships brought about by new digital technologies—you may be tempted...
Read More ...
How to delete Facebook, Google, Twitter search data
Social networks have become an integral part of our online lives: They're how we stay connected to friends, how many of us find new job opportunities, and how more people stay up to date on news. And while...
Read More ...
Sify to offer Akamai’s web acceleration and application delivery solutions in India
Akamai Technologies, the leading provider of cloud services for delivering, optimizing and securing online content and business applications announced a strategic partnership with Sify Technologies,...
Read More ...
The inspiring story of how Webkul created a 20,000 customer base using open source
With more than 2.25 crore in revenues and a customer base of over 20,000, Webkul has quickly scaled up in a short period of time. In a short time span of about five years, the firm has built one of the...
Read More ...
Available Tags:India , IBM , Windows , Security , Google , Opera , Opera , Microsoft , Twitter ,
No comments:
Post a Comment