Search Results

Search results for: information technology

Hitting IoT’s heights

I’m finally reading Wuthering Heights, says Donna Prlich, chief product officer, Pentaho, a book which at the time of publishing was considered ground-breaking and highly controversial for its dark, twisted storyline and cruel characters. (more…)

Read more

July 31, 2017

Posted by: Avadhoot Patil

Major cities and leading global operators partner to deliver seamless Wi-Fi roaming

As part of the ongoing celebrations to honor World Wi-Fi Day 2017, the Wireless Broadband Alliance (WBA) has announced that its City Wi-Fi Roaming project will run for a second year. (more…)

Read more

July 28, 2017

Posted by: Avadhoot Patil

McAfee expands machine learning, automation capabilities to strengthen human-machine teams

Black Hat McAfee, one of the cybersecurity companies, announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. (more…)

Read more

July 27, 2017

Posted by: Avadhoot Patil

Three steps to IoT adoption for health insurers

Over the last couple of years, consumers have got on board with the Internet of Things (IoT) and wearable technology in a big way, says Simon Perry, insurance expert, GMC Software. (more…)

Read more

Posted by: Avadhoot Patil

IoT standards groups emphasised collaboration at oneM2M Industry Day

Technology companies from around the world gathered to advance adoption of the Internet of Things (IoT) through increased industry co-operation, as the global IoT standards initiative oneM2M held its second successful Industry Day on Wednesday, July 13 in Memphis, TN. (more…)

Read more

July 26, 2017

Posted by: Avadhoot Patil

Utimaco hardware security modules achieve payment card industry compliance

Utimaco has achieved Payment Card Industry PIN Transaction Security Hardware Security Module Version 2 (PCI PTS HSM V2) compliance for uncontrolled environments for its CryptoServer CSe HSM platform from the PCI Standards Security Council, (more…)

Read more

Posted by: Avadhoot Patil

Five ways remote access will impact working practices – Part 2

Part 1 of this article appeared yesterday. Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. (more…)

Read more

July 25, 2017

Posted by: Avadhoot Patil

Five ways remote access will impact working practices – Part 1

Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. Some are unaware of the role remote access plays within these developments, when it often acts as the backbone. (more…)

Read more

July 24, 2017

Posted by: Avadhoot Patil

What is the current state of mobile security? Part 2

If you’re like most people, your phone is by your side throughout your day. Thanks to payment apps, mobile GPS and mobile banking, our phones now double as a wallet, map, bank and so much more. (more…)

Read more

July 21, 2017

Posted by: Avadhoot Patil

If an attack is successfully monetised, expect similar attacks to follow: Some preventive security steps

Adversaries are constantly evolving. Success breeds copy-cats. And security is multifaceted. These are some of the key lessons Jeremy Cowan takes away from talking to Ted Harrington, executive partner, Independent Security Evaluators. (more…)

Read more

July 19, 2017

Posted by: Avadhoot Patil