Home Authors Posts by CRN Team

CRN Team

16728 POSTS 0 COMMENTS

Acer launches New ConceptD and ConceptD Pro Family series in Mumbai

Acer India, one of the largest technology brands in the world, today launched its most powerful ConceptD series for both consumer and commercial uses...

Microsoft Azure security flaws found and fixed

Researchers at Check Point identified two, major security flaws in Microsoft Azure, one of the leading cloud computing providers in the world. Check Point...

Temenos, Google Cloud Partners to Accelerate Banks’ Digital Transformation

More than 3,000 financial services institutions around the world leverage Temenos’ modern, cloud-native and API-first technology.

Fog Computing Market Size Worth $934 Million by 2026: study

Fog computing is used in several applications including, smart city, smart buildings, smart grid, vehicle networks and software- defined networks

Kaspersky integrates with SolarWinds to help MSPs deliver automated cybersecurity protection to their customers

Businesses rely on MSPs to achieve the level of cybersecurity needed to protect their data, save money and reduce the strain on internal resources

RTDS to hire over 250 employees and expand in Indian market

The company has already started hiring employees and plans to continue strengthening the workforce

Barco Launches ‘ClickShare Conference’ to enable enhanced Wireless Conferencing at Workplace

The new launch, which is all set to revolutionize conferencing, is based on the concept of BYOM (Bring Your Own Meeting)

Technology Trends to Watch in 2020

With the growing popularity for voice-based applications, the voice assistant solutions industry is set to get greater command in India

Data Science, IoT and Reinforcement Learning in High Tech Manufacturing

Particular sets of technologies which are fairly recent entrants in the high-tech manufacturing field are cloud based analytic, IoT and machine learning based techniques

IT Industry experts weigh in on International Data Privacy Day

Organizations must follow best data privacy practices and basic cyber hygiene to protect data and respect privacy
Exit mobile version