security
-
Of Honeypots, Decoys and Red Herrings
By Manoj Rai On 9 Feb 2016A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
Cyber Security Cyber Threat Intelligence Security Threat Management
-
Components of Agile Infrastructure
By Raghuram Gorur On 20 Jan 2016The debate on whether the Agile principles that have been making waves in software development can be applied to infrastructure continues even as enterprises adopt and reap the benefits of implementing Agile methodologies to boost their infrastructure. Though the inherent...
-
IMS: Bridging the Gap between IT Goals and Business Needs
By Prasenjit saha On 29 Dec 2015Traditionally, the IT function of an enterprise focussed on building and maintaining an IT infrastructure and expanded to keep pace with the market. Now, with most businesses adopting the Cloud and the immense remote IT possibilities it offers, TaaS (Technology as...
-
Web Summit 2015: The Tech World Musings From Dublin
By Kiran Veigas On 5 Nov 2015Grown from the 400 attendees five years back to the current 22000 tech enthusiasts, the Web Summit 2015 continues to deliver innovative ideas and fascinating thoughts to the tech world gathered at the bustling RDS venue, Dublin. Cars and technology...
Tag Cloud
Subscribe for blog updates