Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • air jordan 1 retro high sports illustrated a star is born
  • 020 - Бігові кросівки asics gel - Asics Gel Kayano 14 (Silver / Dark Green) 1203A537 - Cheap Gmar Jordan Outlet
  • nike air force 1 uv color change da8301 100 101 release date
  • NIKE AIR JORDAN 1 RETRO HIGH SEASON OF HER SILT RED W 22cm , Cheap Fenua-environnement Jordan Outlet , nike wmns nsw essntl ss top bf archaeo brown white moradas y blancas Quest 6 de Nike Running
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

News

SAP Sees Strongth Growth In Cloud, Analytics In APJ

As cloud, mobile, social and big data drive business and technology in new ways, SAP AG  continued to gain momentum in Asia Pacific Japan. Customers, especially in emerging markets, see the benefits of replacing legacy systems with new, transformative solutions that can help their business run better, be more efficient and improve customer satisfaction. These technology trends and demand... By CIO&Leader
News

Dell Launches Cloud Access Device

Dell has announced the availability of Dell Wyse Cloud Connect , an ultra-compact and highly mobile cloud access device that instantly delivers desktop virtualization and personal cloud services to any HDMI- or MHL-enabled display. The pocket-size device delivers a full-HD experience with enterprise-level  security, manageability and reliability. Organizations of any size can now deliver... By CIO&Leader
News

How Log Management Is A Vital Security Arsenal for IT Admin?

The fact that the network security solutions market as per IDC is in excess of $100 million in India, with a compounded annual growth rate of close to 18 per cent over the last few years explains the critical nature of data that the network has absorbed. This underscores the fact that IT infrastructure is the backbone of an organisation, and is made up of network devices, systems and business-... By Mastufa Ahmed
News

Why Is NaaS Becoming the IT Administrators' Choice?

There are three factors that are drawing IT managers’ interest to the Network as a Service phenomenon--enhanced bandwidth, faster traffic and no latency in data transmission, as it represents an entire carrier environment that is available, on-demand, on a pay-as-you-go basis. As such, it has the potential to change everything, like the cloud changed IT forever.  Why is NaaS becoming... By
News

What to Expect at F8 2014

Q: What do you anticipate at F8, following a three year hiatus?The F8 event will be a centerpiece for Facebook as it expands its presence in the developer community. In the past the F8 conference has seen major product announcements, so it could happen again this year, but it’s likely Facebook will focus on how developers can take advantage of the entire Facebook developer ecosystem as it... By Mastufa Ahmed
News

Best Practices for CISOs to Combat Threats

Organisations should prepare themselves for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to handle risks in ways beyond those traditionally handled by the information security function. Because, new attacks will impact not just technology but business... By Mastufa Ahmed
News

Adarsh Credit Deploys IBM Platform for their Mobility Solution and One:One DR

Adarsh Credit Co-operative Society was founded in 1999 with the primary objective of uplifting the social and financial status of its members by inculcating saving habits among them through the spirit of co- operation and providing technical and financial support. The principal function of Adarsh Credit is to provide financial services to its members and to reach the nook and corner of the... By Mastufa Ahmed
News

India: A key Threat Frontier

India emerged as a key threat frontier, ranking as the third highest source of overall malicious activity. While it continued to hold its position as the spam capital of the world with 9.8 percent of spam zombies; it was also the highest source of botnet spam, with 6.6 percent or close to 1.45 billion spams originating from its borders every day. India ranked especially high in the number of... By Mastufa Ahmed
News

69% of Targeted Attacks in India Focus on Large Enterprises

Bad guys are plotting for months before pulling off huge heists –instead of executing quick hits with smaller rewards. Plus attackers are unrelenting in their focus on large enterprises with over 69 percent or more than 2/3rds of the targeted attacks in Indiacarried out on them, says a report by Symantec . “One mega breach can be worth 50 smaller attacks,” said... By Mastufa Ahmed
News

Are You Planning to Deploy Enterprise Social Network?

Social media today is catching everyone’s attention in driving work efficiency. Organizations are adopting it to equip themselves with a collaborative platform to bring in productivity and work efficiency. Deploying a secure and highly customizable enterprise social platform allows companies to create a flexible environment that is able to capture valuable insights and more easily engage... By Mastufa Ahmed
News

Six Steps for Deploying Data Security Controls

iP is a good place to start before moving to larger  datasets with more owners and business processes.    The six steps below  for deploying data security controls come from  Neil Thacker, information security and strategy  officer for the Websense office of the CSO and  former head of security operations for Camelot  (UK national Lottery) and Deutsche... By Mastufa Ahmed
Viewpoints

Compensation Survey 2014

IT Next survey took the sample of 500 mid-to-senior-levels IT managers after cleaning up the entire data that was generated as part of the survey to minimise the errors in its findings with regard to compensation packages. As part of the survey, the ITNext team also reached out to senior IT managers to endorse the views of our findings, spoke to CIOs to find out if their teams were adequately... By Mastufa Ahmed
  • ‹ previous
  • …
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector? - CIO&Leader

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector?

Apr 24, 2019
Can lawyers be automated? - CIO&Leader

Can lawyers be automated?

Apr 20, 2020

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,378
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

1 + 4 =

Get Magazine