Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • nike air force 1 uv color change da8301 100 101 release date
  • stan smith nuud women black and blue jordan shoes - IetpShops - Adidas AdiFC Orlando Pirates
  • nike air max 1 low just do it 2018 black and white for sale, Dropped Files - Dropped News - Release Dates & Info
  • Мир льда и пламени история вестероса и игры престолов книга — цена 1849 грн в каталоге Художественные ✓ Купить товары для спорта по доступной цене на Шафе , Украина #178064895
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

News

63 Percent of Organizations Believe They Can’t Stop Data Theft

The survey report released by Websense and the Ponemon Institute uncovered a deficit in security solution effectiveness; a disconnect between company executives and security professionals; and limited visibility into attack activity. Here are the insights on the current threat landscape and organisation’s ability to protect themselves from attacks. Deficient in Security Solution... By
PERSONAL DEVELOPMENT

Imperative Skills for Next Generation CIOs

Subramanian Chittur, Head-IT, Metro Cash & Carry says that the most important and imperative skills that the future CIOs need to acquire are many which would enable them to match the expectations of the organization. Some of them would obviously revolve around: Business acumen business plan preparation & strategic competence Assessment of solution life-cycleand impact on... By
Viewpoints

How to align your IT Strategy skillfully

Most industry experts find that future CIOs often face a challenge; this is with regard to not aligning IT strategy and policies for years. This has an adverse impact on vendor management strategies, too. It is also agreed that it is critical to identify the areas of IT spread, be it varied applications or other products, which would counter IT strategy. Most CIOs echo the need to evaluate and... By
Leadership

Are you the next CIO?

Peep into an anthill and you will realise what seamless order and perfection mean. Our tiny insect cousins have engineered a complex organisational structure which, though hierarchal, is highly efficient. At the very apex, sits the queen, the head of all the domicile ants, and does little than preen and procreate. Below the empress, there are scores and scores of worker ants which toil endlessly... By
News

Social Media and Analytics Are Critical Enablers for Smarter Cities, Says BJP

In order to deliver the government’s vision of transforming India into a superpower by empowering, connecting and binding Indian citizens, Dr Arvind Gupta - National Head - Information and Technology, Bharatiya Janata Party elaborated the need to focus on leveraging Information Technology to build Smarter Cities in India. Dr. Gupta emphasized his views during an address on Urban... By
News

Now Share Money over Social Networks

Oxigen Services India Private Limited announced the launch of India’s first social mobile wallet service, Oxigen Wallet. With the new service, people will now be able to share money with their friends and family over their preferred social networks and messaging platforms like Facebook, WhatsApp, Google+, and Twitter. They will also be able to use their wallet to recharge their... By
News

Writing Right Policies and Procedures for Cloud Governance

Analysts find SMAC (Social Media Analytics and Cloud) all pervasive and invading the market place. Cloud is creating good footprints across enterprises and under various forms, whether private, public, or hybrid. With cloud getting more aggressive, business functions, devoid of IT’s intervention, are deploying a cloud model. Such a trend is leading to several discrepancies in regulatory,... By Geetha N
News

IoT: Do Making Devices More Secure Add Time to Product Development?

Ruchna Nigam, Security Researcher, FortiGuard Labs, Fortinet, in a chat with IT Next. ‘Connected home’ may offer convenience or cost savings, but ‘Internet-connected home appliances’ may also create security risks! The Internet-connected home appliances could be exposed to risk under two scenarios: if there is an inherent flaw in the device that is being exploited... By Mastufa Ahmed
News

‘Cisco-RedHat Collaboration Is about Simplifying Cloud Adoption for Users’

What are the drivers for RedHat’s extended collaboration with Cisco? DP: Cisco and Red Hat together have really made a big stride towards building trend solutions and the good thing is that the customers actually get a choice. They have best of both worlds rather than being locked in to one solution or the other. Rajesh: Cisco and Red Hat have been across multiple... By Mastufa Ahmed
News

IBM Cloud to Power Narayana Health Email System

IBM partneres with Narayana Health --one of the biggest medical institutions in the country, for implementing an efficient email and collaboration tool that will keep all the employees, associated professionals and other stakeholders completely connected. This partnership will help Narayana Health administrators and employees to more easily collaborate while keeping IT expenditure for the... By
Insights

Flexibility to Merge Work and Personal Lives Is the Future of Work

Citrix identifies three key megatrends that will shape the future of how people and businesses work over the next five years. These predictions illustrate the advances in technology that will significantly influence how humans will live and how the workplace will evolve by 2019. Employees will drive the future workplace experience: Enterprises are becoming matchmakers, pairing great talent to... By
News

Oracle Introduces Key Vault Software Appliance to Manage Encryption Keys

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and... By
  • ‹ previous
  • …
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Can lawyers be automated? - CIO&Leader

Can lawyers be automated?

Apr 20, 2020

AIOps: A New Horizon in IT Operations

Nov 24, 2023

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,381
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

10 + 7 =

Get Magazine