Enterprise -> Technology
Hiding malware using steganography
Steganography - the art of hiding a message within another message - is nothing new. During World War II, the French Resistance sent messages written on the backs of couriers in invisible ink.
Andrew Hay, Director of Search Research, OpenDNS | 27th August 2015
Emerging Technology trends and its impact on SDLC
A quick cheatsheet or ready reckoner of sorts on understanding, evaluating, adopting an emerging technology trend with a simple, easy to follow methodology (EITG-and indigenuous EA process) and not just compelled to subscribe to the drift.
Shailesh Gupta, Capgemini India Pvt Ltd. | 26th August 2015
Rolta AdvizeX experts on hastening big data analytics in healthcare and retail
Converged infrastructure solutions are hastening the path to big-data business value and cloud deployment options.
Dana Gardner, Interarbor Solutions | 25th August 2015
CIO/CMO/CRM: Interchangeable acronyms in a data-driven business
By working together to select and implement the right CRM system, and with the adoption of a strategic data-driven marketing strategy, your Chief Marketing Officers and Chief Information Officers will lead your business to succcess
Rick Lyle, Services Director, Redspire CRM | 21st August 2015
Top five considerations for successfully deploying data centres in emerging markets
Here are my top five considerations for successfully deploying data centres in emerging markets
Tomas Rahkonen, CTO & Vice President eCentre, Flexenclosure | 21st August 2015
Unified comms - start with people, end in the cloud?
Productivity does not come from a CD, a wire or out of a box, but from the hearts and minds of users - unified comms has to work for the individual, not the network
Rob Bamforth, Quocirca | 20th August 2015
Business headlines from BBC News:
Published by: electronicdawn Ltd.