Archive

Enterprise Security 3.0

by May 1, 2010

The IT infrastructure is undergoing a fundamental architectural change, making it essential to assess its impact on your enterprise security. We analyze this shift, the security threats it poses, and how to combat them

Read More [shareaholic app="share_buttons" id="15671367"]

Mobile Security Threats Become Aggressive

by May 1, 2010

Mobile malware has begun to transition from passively distributed files that required the user to actively download and install them, to malware that independently and aggressively distributes itself. Read on …

Read More [shareaholic app="share_buttons" id="15671367"]

Predators

by May 1, 2010

It’s no longer about kiddy stuff like somebody on the prowl for mobile devices with Bluetooth enabled to upload a malicious program. It’s no longer about malware that causes no harm, only nuisance. Mobile security threats are becoming more dangerous. There’s a growing number of mobile predators on the prowl to steal your data. We tell you who they are and what kinds of security solutions will keep them away

Read More [shareaholic app="share_buttons" id="15671367"]

How educational institutions in India are using IT

by May 1, 2010

An interaction with Professor Bharat Bhasker, IIM-L reveals how IT implementation is facilitating education.

Read More [shareaholic app="share_buttons" id="15671367"]

IT Solutions for the Education Sector

by May 1, 2010

We look at some exciting IT solutions being deployed in Education and how the teacher-student community is expanding beyond classrooms to cyberspace

Read More [shareaholic app="share_buttons" id="15671367"]

Reach out with Digital Signage Solutions

by May 1, 2010

Digital signages are effective communication tools that can be used to supplement the traditional form of print communication to connect to your audience

Read More [shareaholic app="share_buttons" id="15671367"]

3D Telepresence

by May 1, 2010

We have seen 3D enabled displays and how they transform the viewing experience to make it more immersive and life-like. The same technology can be extended to enjoy a 3D virtual meeting experience

Read More [shareaholic app="share_buttons" id="15671367"]

Cloud Security Threats are Over-Hyped

by May 1, 2010

The last two years have seen a lot of buzz around Cloud computing, with just about …

Read More [shareaholic app="share_buttons" id="15671367"]