Home Search
Network - search results
If you're not happy with the results, please do another search
Trend Micro Research identifies critical Industry 4.0 attack methods
Research report outlines advanced attack scenarios and recommendations for OT operators
LinkedIn integrates Events, Live tools to help brands host virtual events
Microsoft-owned professional network LinkedIn has announced to integrate LinkedIn Live and LinkedIn Events to enable companies to stay connected with their online communities in...
Automated tools helping Facebook remove more hate speech, bullying
Facebook has revealed in detail how its automated tools and technologies are curbing hate speech, adult nudity and sexual activity, violent and graphic content,...
How Covid pandemic is accelerating Cloud adoption in enterprises
By Varoon Rajani, Co-Founder and CEO, Blazeclan
The chaos created by the novel COVID-19 has grown unprecedented and organisations are compelled to rely on the...
Making intelligent and informed decisions while choosing the right Talent Intelligent Platform
By Sandesh Goel, Managing Director, Eightfold India
An all-seeing eye for the future of surveillance?
By Sudhindra Holla, Director – Axis Communications, India & SAARC
‘Businesses must adopt IT architecture built around hybrid cloud model’
Krishna Raj Sharma, Director & CEO, iValue InfoSolutions highlights the company’s approach to ensure 24x7 service and support to the customers
Yotta Infrastructure appoints Jarrett Appleby as Strategic Advisor to CEO
Yotta Infrastructure, a developer and operator of hyper-scale data center parks in India, announced the appointment of global Internet & Data Centre industry veteran...
Grow with Google OnAir to help jobseekers learn digital skills at home
Search engine giant Google on has launched Grow with Google OnAir that will help impart free digital skills training to everyone in the US...
Intel-Microsoft joint project turns malware into images
Researchers from Intel and Microsoft have joined forces to study the use of deep learning for malware threat detection in a project that first...









