Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • new air jordan Bordeaux 1 mid j white red black
  • 010 - nike air brown orange tan beige shoes free | FZ8132 - cheap lebron 10 shoes size 13
  • Sneakers Draked Viola | Atelier-lumieresShops | Sneakers search engine
  • Travis Scott Jordan 1 Low Reverse Mocha Shirts Sneaker Match Sail Count your Blessings quantity
  • Jordan Boys Shoes
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

TRAINING & EDUCATION

How Leaders Leverage Bright Spots in their Organisations

It would not be unrealistic to say that the best functions of any individual come about truly when there is an alignment with the surrounding frameworks and environment. What does it mean? It obviously means that senior IT decision makers, in this case, need to always keep an eye out for areas where there is dependency and alignment with other functions. This means it is the primary requisite... By Mastufa Ahmed
Viewpoints

IT Folks Are Rightly Paid, Enable Me to Grow More: CEO

CEOs across organisations do not mince words when they say IT is the backbone of the company which is enabling them to drive growth. But a lot more could be done if senior IT decision makers start expanding their horizon and thought process and changing their mindset.  What CEOs expect from IT folksInterestingly, most CEOs are actively involved in the recruitment process of their core IT... By
TRAINING & EDUCATION

Do CFOs Influence Compensation Packages for IT Teams?

CFOs do have a say in prescribing compensation packages for senior IT teams, though they may not get involved in the recruitment process. Well, the differentiator here is that the CTC varies with the quality of the candidates in terms of the credentials they carry with respect to driving better RoI on projects. Rajesh Magow, Co-founder & CFO, MakeMytrip, argues that good quality people in... By Mastufa Ahmed
News

What IT Managers Should Know About Heartbleed

It is all pervasive that the Heartbleed bug is a vulnerability discovered in the TLS heartbeat mechanism built into certain versions of the popular OpenSSL library. OpenSSL is one of the technologies employed by many sites online to create an encrypted communication session between a user and a website. Has something like this happened before? Yes, attacks on TLS and OpenSSL have happened in... By Mastufa Ahmed
News

Verizon 2014 Data Breach Investigations Report

No Organization Is Immune From a Data BreachVerizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry .  This finding, the highlight of Verizon’s“2014 Data Breach Investigations Report,... By Mastufa Ahmed
News

Nine Basic Patterns Make Up 92 Percent of Security Incidents

Verizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry .  This finding, the highlight of Verizon’s“2014 Data Breach Investigations Report,” offers an approach to fighting cyber... By Mastufa Ahmed
News

6 Steps to Prevent Loss or Theft of Sensitive data

Data Loss Preventions  or DLP implementations are expected to surge in the year ahead. The theft of intellectual property (IP) is driving the need more than compliance requirements, as organizations are realizing that DLP can protect competitive advantages and prevent espionage by  securing business plans, product roadmaps and other confidential information. So, while  most... By Mastufa Ahmed
News

Huawei Predicts Eight Billion Smartphone Users by 2025

With connectivity becoming the norm in people’s daily lives today, the four basic physical elements of human survival– air, water, food and sunlight – can be extended to include the digital environment.  A better connected world will integrate such elements. Like air, connectivity will be available anytime and anywhere. Connectivity will flow freely like water, enabling... By Mastufa Ahmed
News

Why IT Managers Should Define Reference Architecture to Map Big Data

With big data and analytics playing an influential role helping organizations achieve a competitive advantage, IT managers are advised not to deploy big data in silos but instead to take a holistic approach toward it and define a base reference architecture even before contemplating positioning the necessary tools. What is Reference Architecture and why should one opt for it?Like any other base... By
News

Why Healthcare Industry will Begin Developing Analytics Capabilities

Globally, the healthcare industry faces major challenges such as rising costs, improving quality of care, patient outcomes, cost optimisation, waste and fraud. Trends that drive technology deployment Use of mobile technologies is gaining traction Focus on accountability and transparency Cost pressures on healthcare budgets Changing buying centres and roles Cloud adoption is growing... By
Insights

Asian PC Market Declined For the Eighth Consecutive Quarter, IDC

IDC's preliminary results show that the Asia/Pacific (excluding Japan) PC market declined 8% sequentially and 11% year-on-year in 2014 Q1 to reach 23.8 million units, coming in marginally lower than IDC's initial forecasts. Elections in some of the bigger markets contributed to the region’s overall decline. In India, an ongoing large education project was postponed due to the upcoming... By IT NEXT
News

New DC Trends Bring Security under Spotlight

The growth in data centres, coupled with increased IT expenditure among enterprises, has brought about the need to have a robust security practice owing to increasing new age threats. The industry has observed a significant rise in IT spending on security solutions to safeguard vital data and critical IT infrastructure, which is indirectly shaping the security domain. Some of the major factors... By
  • ‹ previous
  • …
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector? - CIO&Leader

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector?

Apr 24, 2019
Can lawyers be automated? - CIO&Leader

Can lawyers be automated?

Apr 20, 2020

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,378
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

2 + 1 =

Get Magazine