Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • Travis Scott Jordan 1 Low Reverse Mocha Shirts Sneaker Match Sail Count your Blessings quantity
  • Украина #135721706 , Высокие зимние кожаные кроссовки на меху
  • nike air jordan 1 factory outlet
  • Sneakers - adidas by9405 women black hair - Cheap Edu Jordan Outlet , Shoes, Clothing & Bags, Authenticated Before Shipping
  • nike utah kobe shoe zoom black women sandals
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

Insights

VLCC Looks at BI for Institutionalizing Information

Indian enterprises are increasingly realizing the importance of IT in business growth. Wellness industry player, VLCC, is one such company that is banking on technology to push future growth. The company, which till recently did not have a CIO/CTO, has appointed one and is according high priority to IT as a game-changer. Vidur Kohli has recently taken over as the CTO of VLCC. With more than 25... By Yashvendra Singh
Insights

Power Shift in BI and Analytics will Fuel Disruption

Traditional business intelligence (BI) and analytic models are being disrupted as the balance of power shifts from IT to the business, according to Gartner. The rise of data discovery, access to multistructured data, data preparation tools and smart capabilities will further democratize access to analytics and stress the need for governance. Gartner predicts that by 2017, most business users and... By IT NEXT
News

Why Digital Business Requires You to Transform Your Business Model

Digital business success will require organizations to take bold actions; including inventing new business models and changing the way they function, according to Gartner. Gartner predicts that, by 2017, 70 percent of successful digital business models will rely on deliberately unstable processes designed to shift with customers' needs. "Many organizations are either beginning, or in the midst... By IT NEXT
Case Studies

Chemmanur Group Leverages Information Security for Beefing up Physical Security

Established in 1863 in Kerala, Chemmanur International Group today has multiple branches across the globe. The company manages about 160 outlets (30 jewelry showrooms outside India, 115 NBFC branches and 10 micro finance branches across Kerala) dealing in jewelry, gold loan and microfinance. As all these branches deal with cash transactions and gold business transactions, having a strong... By
Products

Windows 10 to Be Offered as Free Upgrade

Microsoft on Wednesday unveiled a new generation of Windows, with a wide range of experiences designed to usher in a new era of more personal computing, as well as two new devices designed to extend the Windows experience from large screens to no screens. Windows 10 will be delivered as a service to offer a safer, innovative and updated experience for the supported lifetime of the device.... By IT NEXT
News

Criminals Stole Over 61 Million Customer Records in 2014

Despite an 50 percent decline in the number of cyber attacks against U.S. retailers, the number of records stolen from them remains at near record highs, according to findings released today by IBM. IBM Security researchers report that in 2014, cyber attackers still managed to steal more than 61 million records from retailers despite the decline in attacks, demonstrating cyber criminal’s... By IT NEXT
News

'123456' Maintains the Top Spot on Worst Passwords List

SplashData compiled more than 3.3 million leaked passwords during the year and highlighted ‘123456’ and ‘password’ as the top two passwords that users have held each year since the first list in 2011. Other passwords in the top 10 include ‘qwerty,’ ‘dragon,’ and ‘football.’ As in past years' lists, simple numerical passwords remain... By IT NEXT
News

Security will Shift from ‘IT problem’ to ‘Executive Problem’ in 2015

1.   Identity-aware organizations will adopt an “identity dial tone”: The application economy and increased use of mobile apps is driving a need for a centralized, common way to access identity and entitlement information. Identity-aware organizations need to establish an “identity dial tone” to act as one source of identity truth to simplify app development,... By IT NEXT
News

10 Compelling Use Cases for M2M Technologies

By Mastufa Ahmed
News

“We need to balance the cost of a breach against the cost of controls”

Information security has always been challenging. How do you see the threat landscape evolving in 2015? Today organisations are moving towards BYOD and cloud architecture. It includes various entities such PaaS (Platform as a Service) and DaaS (Data as a Service). The access management in the cloud (Identity and Access Management System) includes both privileged users and employees. The biggest... By Sanjay Kumar
Viewpoints

A Strong ‘CIO and CMO’ Bond Can Boost RoI by 25 per Cent

Increasing marketing technology investments are demanding more involvement from IT leaders to enable marketing to achieve full business value from its investments, according to Gartner. In 2015, IT leaders supporting marketing will need to build a stronger partnership with marketing and help to evaluate solutions (architecture, functionality, scalability, performance and security), source data,... By IT NEXT
News

Can the New Facebook@Work Market Become a Reality?

Update: Facebook Launches Facebook at Work Be it for sharing the lighter moments or linking with like-minded people or even sharing articles we feel worth scattering, we all use Facebook. The appeal of FB is tried and tested for consumers but the question is ‘does it make sense for an enterprise version of FB?’  Given the appeal and triumph of the social platform across age... By Mastufa Ahmed
  • ‹ previous
  • …
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

CIO responsible for driving digital transformation, say most CEOs in a BT-EIU Survey - CIO&Leader

CIO responsible for driving digital transformation, say most CEOs in a BT-EIU Survey

Sep 12, 2017

Do More with Less

May 11, 2012

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,383
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

7 + 2 =

Get Magazine