Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • nike dunk high cargo khaki white
  • off white air jordan 1 canary yellow sample release date info
  • Украина #135721706 , Высокие зимние кожаные кроссовки на меху
  • Jordan 2 Retro White Red CDP 2008 , Топ jordan — цена 700 грн в каталоге Топы ✓ Купить женские вещи по доступной цене на Шафе , Украина #162391273
  • nike jordan flight 45 burgundy blue suit for women
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

News

93% Organizations intend to support flexible workstyles by 2013

According to a survey of senior IT decision makers, organizations across the globe are widely embracing mobile workstyles as a way to empower business innovation. The Citrix Global Workshifting Index indicates that by the end of 2013 ninety three percent of organizations will have implemented workshifting policies, up from 37 percent which currently offer workshifting for part, or all, of their... By sanjay.gupta gupta
NEXT JOBS

So, which are the highest paying security certifications?

ISACA's Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying IT certifications in the latest Foote Partners' IT Skills and Certifications Pay Index (ITSCPI).The recognition shows that employers are investing in professionals with specific IT skill sets that demonstrate the knowledge and... By sanjay.gupta gupta
News

Beware of IP Thieves!

Who will figure out how to provide food and clean water for a world population that soon will reach seven billion people? Who will develop drugs to treat devastating diseases? Who will market the next generation of energy-saving solutions? And who will introduce the next big thing in information technology? These questions spur governments, entrepreneurs, scientists and engineersall hoping to... By sanjay.gupta gupta
News

John G Schmidt: Big Data Needs Lean Methods

John G Schmidt, VP of Global Integration Services at Informatica, constantly advocates the business potential of emerging technologies to his customers. In a conversation with N Geetha, Schmidt explains how to harness big data with lean data management techniques Can you elaborate on the influence of big data, and how much sense it makes to IT managers at this point of time?The industry term big... By sanjay.gupta gupta
News

Can Microsoft Surface take on iPads?

At an event in Hollywood, Microsoft unveiled Surface - what it calls "PCs built to be the ultimate stage for Windows." Company executives showed two Windows tablets and accessories that feature significant advances in industrial design and attention to detail.Surface is designed to seamlessly transition between consumption and creation, without compromise. The allusion is to the limited ability... By sanjay.gupta gupta
News

Two Factor Authentication for Cloud

ArrayShield, a pattern-based two-factor authentication solutions provider, has announced that the cloud applications can now be securely accessed with Array Shield's IDAS 2FA. With cloud computing becoming mainstream and many CIOs actively looking at leveraging cloud as part of their Corporate IT Strategy, security in cloud is one of the key issues to be addressed. As cloud technologies enable... By sanjay.gupta gupta
News

ADC for a Faster Web

Riverbed Technology has announced enhancements to its Stingray brand of software and virtual application delivery controllers (ADCs).These enhancements allow enterprises and cloud operators to extend the benefits of the ADC with the integration of its Aptimizer web content optimization (WCO) solution. Included in the announcement are the release of Stingray Traffic Manager 9.0, the industrys... By sanjay.gupta gupta
News

Surajit Sen is Country Manager of EMC Backup and Recovery Systems

EMC India has announced the appointment of Surajit Sen as Country Manager of its Backup Recovery Systems (BRS) division in India & SAARC. In this role, Sen will manage operations for the BRS unit work towards maximizing productivity, growth and revenue course in India. The BRS unit is a key driver of EMC's growth in the region in 2012. Sen brings more than 17 years of leadership... By sanjay.gupta gupta
Conferences

Vijai Electricals wins TPL 2012 Bengaluru

After the resounding success of the Delhi and Mumbai legs of the inaugural Technology Premier League, all eyes were set on the third and final city, Bengaluru, in the battle among Indias top corporate IT teams. There were 20 teams that turned up to solve the case study challenges at Bengaluru. Taking into account the 22 teams each that participated in Delhi and Mumbai, the total number of... By sanjay.gupta gupta
News

Protecting storage from start to scale

Dell has announced new solutions that continue to advance its Fluid Data architecture to help customers efficiently manage their data and protect business information. The new advancements include updates to the Dell Fluid File System for a common, enterprise-class distributed file system across the companys three primary storage solution families, a new Compellent platform that dynamically... By sanjay.gupta gupta
News

Top concern in mobile security? BYOD, of course!

The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile devices, with smartphones being most widely deployed, according to a survey by Gartner, Inc. Eighty-six percent of enterprises surveyed said that they plan to deploy media tablets this year.Respondents came from organizations with... By sanjay.gupta gupta
News

Enhancements to cloud security platform from McAfee

McAfee has announced new enhancements to its security platform for the Cloud. The McAfee Cloud Security Platform provides a framework that allows organizations to extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic - email, web and identity - delivering a secure and trusted bridge between the enterprise and the Cloud.The challenge for... By sanjay.gupta gupta
  • ‹ previous
  • …
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Microsoft to Commence Private Preview of Cloud Services from India Datacenters

Jun 09, 2015

15-year-old girl gets bionic fingers

Aug 21, 2011

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,338
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

10 + 1 =

Get Magazine