Latest Articles

Gartner Predicts Fifty Percent of Citizens in Large Cities Will Share Personal Data With Smart City Programs by 2019

Twenty Percent of All Local Government Organizations Will Generate Revenue Through Open Data by 2020 Analysts Will Discuss How to Generate Value From Data at the Gartner Data & Analytics Summits, February 20-21 in Sydney, March 6-9 in Grapevine, Texas, March 20-22 in London, March 23-24 in Toky

Read More

For Us Digital Transformation Is a Lot About Human Transformation

Sudipta Sengupta talks to us about the journey of bringing a digital transformation within a 35 year old print media house

Read More

Financial Services Sector Can Benefit Immensely With MPS

While the CIO/CTO would be keen on deploying solutions addressing the accessibility, security and mobility requirements to meet financial inclusion initiatives and improve the customer’s experience, the technology at the backend plays a crucial role.

Read More

Meeting The Demands Of IoT Data

With new uses and applications of IoT, there also comes new methods of delivering and managing connectivity for devices—as well as fresh ways to monetize the data they carry.

Read More

KVM Switches vs. Software-Based Remote Access Tools

Despite the popularity of software based remote access tools, a KVM switch is seen as more reliable and more secure. Effective security is therefore an essential consideration in assessing, implementing and managing KVM over IP technology.

Read More

Efficient Storage Will Bring Down Our Debt to Earth: Anil Valluri, NetApp

It is imperative to keep a sustained focus on ensuring that our storage systems are green, efficient and clean.

Read More

Top Five Digital Innovation Hacks

The 5 most impactful digital innovations are the least used.

Read More

ManageEngine Extends Self-Service Analytics to IT Operations, Customer Support

To help enterprises derive meaningful insights from the data generated by ManageEngine’s network monitoring, applications monitoring and customer support software.

Read More

Jeep Cherokee's Hacking and its Implications for Information Security

The debate about the sharing of responsibility between system security and information security continues, and it is still unclear, which of the two should be responsible for what type of intrusion.

Read More