Tech Explained

Implementing Network based Intrusion Detection with CISCO IOS

June 17, 2014

The IOS based IDS enables network administrators of small enterprises to build intrusion detection into the network without investing in a dedicated IDS entity

Turn Your Windows PC into a WiFi Hotspot

May 29, 2014

Through the Virtual WiFi Router App you can turn your running Windows machine into a WiFi hotspot in addition to using it for your daily tasks

How to Run a HeartBleed Attack, and Fix it!

May 29, 2014

Attack is the best form of defense they say, so here we tell you how the Heartbleed attack is run followed by how to fix the vulnerability

Testing the Internet of Things — Are You Future Ready?

May 22, 2014

The mantra for testing an IoT Ecosystem to achieve success is to adapt well and
avoid defects

IoT: Is Your Enterprise Ready to Take the Leap?

May 22, 2014

Products and services which were previously outside the CIO’s domain will increasingly be under his jurisdiction with Internet of Things connecting various entities in an enterprise

IoT: Anybody Can Innovate

May 22, 2014

Smart innovation was earlier confined to a few people who understood technologies, but the Internet of Things has opened the playing field to everyone with a dream to think big

Powering the Energy Industry with The Internet of Things

May 20, 2014

Energy and utility are estimated to drive future market growth of Machine to Machine (M2M) communications due to the Government of India’s serious initiatives to deploy smart energy meters

Impact of Internet of Things on the Retail Industry

May 20, 2014

From transforming the internal business processes to changing the way retailers market their products to end customers, the retail industry stands to gain a lot from the Internet of Things (IoT) wave

IoT Innovations @CeBIT 2014

May 20, 2014

A smart bag that records its owners travel itinirary, a system that optimizes energy consumption at home, and smart agricultural devices that provide userful information to drivers are just a few things that were showcased at CeBIT this year

The Tech Behind Internet of Things

May 20, 2014

We explain the identification technologies, protocols, hardware, software, and services that are helping build the next revolution called IoT

Impact of Internet of Things on IT, Business and our Lives

May 20, 2014

We explore the benefits and impact of IoT on various facets of business and IT, be it technology architecture, roles and skills of personnel involved and growth of ancillary industries to support IoT as well as some concerns that surround it

How Internet of Things Will Change the Security Priorities for Enterprises

May 19, 2014

While the possibilities that IoT can bring are exhilarating, it will also affect enterprise security the way all path-breaking technologies thus far, including mobile devices, cloud computing and social media have

The Foundation Course: Hackable Hardware for IoT

May 16, 2014

We tell you about the best hackable hardware devices that are currently available to build your own IoT contraptions and also drill into their key features

Build your own IoT Hacks !

May 14, 2014

Get inspired by some commercial and open source IoT Devices and start building your own nifty little application

Making Your Network More Resilient to Security Threats

May 12, 2014

Besides focusing on network vulnerability protection, organizations should also strengthen their networks’ resiliency. Here’s the approach that could be followed

Software Defined Networking: Moving Beyond the Hype

May 12, 2014

In the wake of big strides in cloud computing and big data, SDN shows all the signs of being the next big global trend to capture the imagination of CIOs

Securing Mobile Apps

May 12, 2014

With millions in number, mobile apps are one of the most threatening carriers for attackers. We help you understand the whats, hows & whys of this threat and also what can be done to reduce its effect

Big Data Discovery Needs Smart Machines

May 12, 2014

Big Data makes it extremely difficult to analyze data using the traditional manual approach where professional services manually create and manage data warehouses and set up analysis cubes based on a comprehensive list of requirements

How Socially Transmitted Malware Works

May 12, 2014

FortiGuard Labs reveals the latest malware propagated through social media and offers tips for safer social media networking

Create Your Personal VPN Network

May 7, 2014

OpenVPN Access Network is an open source platform that implements a virtual private network (VPN) for your organisation