How to Select the Right Set of Devices for Mobile Testing?By Sree Krishna On 27 Jan 2016
Mobile phones have been a great revolution of mankind. Big static land phones have slowly got obsolete and mobile phones are now an indispensable part of our everyday life. In today’s world, almost every person owns, at least, one phone...
Network Security: A Key ImperativeBy Raghuram Gorur On 20 Jan 2016
Network security refers to the set of activities or measures taken to protect your office/ company network and ensure network threat management and remediation. Network security ensures that a network is protected while sending, receiving and storing data and identifies...
Emerging Trends in Network SecurityBy Raghuram Gorur On 20 Jan 2016
‘We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?’,  asks the FBI in its cybercrime page. With 2015 showing an alarming increase not just in...
Staying Afloat During a Cyber-AttackBy Raghuram Gorur On 20 Jan 2016
Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack....
Components of Agile InfrastructureBy Raghuram Gorur On 20 Jan 2016
The debate on whether the Agile principles that have been making waves in software development can be applied to infrastructure continues even as enterprises adopt and reap the benefits of implementing Agile methodologies to boost their infrastructure. Though the inherent...
These blogs might interest you
by Arsalaan Kashif on 15 Mar 2019
by Jason Chandralal on 12 Mar 2019
by Dattatreya Kulkarni on 11 Mar 2019
by Jason Chandralal on 7 Mar 2019
Subscribe for blog updates