Tech mahindra
Tech mahindra

ARCHIVES: 2011

A Strategic Approach to Security Risk while CloudSourcing

I was privileged to address a distinguished audience of leading Indian CIOs at the IDC Cloud 2.0 Asia Summit in Mumbai last week to present my thoughts on how companies could adopt a strategic ....

Read More
  • POSTED BY : Lucius Lobo on December 12, 2011 03:25 PM
  • 0
  • COMMENTS 0

Social Media Assessments crucial to measure online risk to company brands

Has your company undergone a social media security assessment which assesses social media employee policies, their implementation and online employee behavior? If not, it’s perhaps time to start as ....

Read More
  • POSTED BY : Lucius Lobo on December 12, 2011 02:55 PM
  • 0
  • COMMENTS 0

Strategies for Drug Anti-Counterfeiting in Global Supply Chain

Emerging markets are expected to contribute majorly in the global Pharma business. Plans have been made by pharma giants to tap this promising market. A major challenge faced by pharma companies is ....

Read More
  • POSTED BY : Suryamohan Surampudi on November 16, 2011
  • 0
  • COMMENTS 0

Next Generation Networks, Services, and their Management: A Quick Survey Part 1

Next Generation Networks ( NGN) and Next Generation Services are something we keep hearing about. And we also keep hearing warnings and advisories from OSS vendors about how their management is going ....

Read More
  • POSTED BY : Murali Madhavan on October 31, 2011 12:30 PM
  • 0
  • COMMENTS 0

Value Chain Planning and Supply Chain Planning

It would be interesting to know that SCM (Supply Chain Management) and Value Chain Planning (VCP) concepts has originated only few years apart. Keith Oliver coined the term ‘supply chain management” ....

Read More
  • POSTED BY : Ashish Agnihotri on September 23, 2011
  • 1
  • COMMENTS 0

What the Hack is going on

One of the greatest myths that I have realized in the current world is that There is Security.We are not talking about kids or novices on some other social networking web site or some site that ....

Read More
  • POSTED BY : Dominic Mascarenhas on September 16, 2011 04:15 PM
  • 0
  • COMMENTS 0

When Charles met Ada…

Having lost his wife and two children in bewilderingly quick succession, Charles Babbage was a devastated man. His mother Betty moved in with him to look after his remaining four children. Charles ....

Read More
  • POSTED BY : Murali Madhavan on August 08, 2011 04:17 PM
  • 0
  • COMMENTS 0

Eight Political Issues around Security and Privacy in Cyberspace

As cyberspace becomes a dominant form of global communications and trade, so does its political use. This is the first part of a multipart blog on the eight key political issues around internet ....

Read More
  • POSTED BY : Lucius Lobo on August 01, 2011 04:35 PM
  • 0
  • COMMENTS 0

Hackers are Easy to Train, Difficult to Motivate? As of today that is!

A 19 year old man has been detained in UK by Scotland apparently in connection with the spate of cybercrimes against US Senate, CITI and the CIA. It is commonly acknowledged that hackers are ....

Read More
  • POSTED BY : Lucius Lobo on August 01, 2011 04:35 PM
  • 0
  • COMMENTS 0

Can Enterprises Crowdsource Security Testing of their Websites?

The rate at which external websites are being hacked demonstrates the lack of an effective defensive mechanism in enterprises. Cyber laws were created to safeguard against script kiddies from hacking ....

Read More
  • POSTED BY : Lucius Lobo on July 26, 2011 04:30 PM
  • 0
  • COMMENTS 0

Tragedy Strikes!

Tragedy Strikes! Charles Babbage built the Difference Engine - or a small model of it- at his home workshop in 1822 . And he was satisfied that it worked well enough, so he went ahead and publicized ....

Read More
  • POSTED BY : Murali Madhavan on July 20, 2011 07:00 PM
  • 0
  • COMMENTS 0

Telco’s on a cross road – Changing eco-system and security impact

Telco’s on a cross road – Changing eco-system and security impact The time I joined telecom sector, so much have changed but still the pace of change hasn’t slowed down. To my surprise we are ....

Read More
  • POSTED BY : Gaurav Sharma on July 11, 2011 12:55 PM
  • 0
  • COMMENTS 0

Project Management Platform on the Cloud

Information is the king and information is the asset to take timely decisions and corrective/preventive actions for the success of projects. This information can be on schedules, resources, budget, ....

Read More
  • POSTED BY : V Srinivasa Rao (VSR) on July 05, 2011
  • 0
  • COMMENTS 0

Machine-2-Machine – Security Challenges

M2M refers to communication between machines without any human intervention. It is based on Telemetry which is any technology that allows remote measurement and reporting of information. Traditional ....

Read More
  • POSTED BY : Sivaraj Ambat on July 04, 2011 12:25 PM
  • 0
  • COMMENTS 0

A Steam-powered Computer!

Charles Babbage’s Cambridge education ended in the spring of 1814 when he graduated. That he did not attach much import to the formal qualifications was evident from that fact that he refused to ....

Read More
  • POSTED BY : Murali Madhavan on June 22, 2011 11:55 AM
  • 0
  • COMMENTS 0

The Disgruntled Calculus Student

This English Mathematician is credited to be the first person to develop a machine that could do calculations.He burst on the scene a whole century after Isaac Newton, the greatest mathematician of ....

Read More
  • POSTED BY : Murali Madhavan on June 22, 2011 11:50 AM
  • 0
  • COMMENTS 0

Types of Access Control Mechanisms

Types of Access Control Mechanisms Many of us have come across the terms like MAC, DAC, RBAC, ACLs while reading various e-security related articles. However not all of us (except the CISSPs) know ....

Read More
  • POSTED BY : Monica Rana on June 16, 2011 12:40 PM
  • 1
  • COMMENTS 0

Latin America - A 'Sambadrome' of Opportunities?

I do believe that LatAm has a perfect storm brewing. For now starts the growth for a region that has experienced a lost decade. LatAm has strengthened its economies, its democracies and strategies. A ....

Read More
  • POSTED BY : Alex Mathews on May 26, 2011 03:25 PM
  • 0
  • COMMENTS 0

This is Africa !

This is the first time I attended a World Economic Forum (WEF) meeting and naturally I was thrilled when I walked into the venue, the International Convention Centre at Cape Town, to run shoulders ....

Read More
  • POSTED BY : Chittaranjan Jena on May 24, 2011
  • 0
  • COMMENTS 0

Smart ideas, Bright minds and Digital Armageddon

Smart ideas, Bright minds and Digital ArmageddonIt took the utilities almost a century to come up with the idea of “Smart Energy” and as the “bright minds” around the world debate on its impending ....

Read More
  • POSTED BY : Alex Mathews on May 16, 2011 11:40 AM
  • 0
  • COMMENTS 0

IAM - Is Building Consolidated Identity repository a must for an Org - Internal

IAM - Is Building Consolidated Identity repository a must for an Org - InternalI always come across questions from customer about automation of user provisioning / deprovisioning. For provisioning ....

Read More
  • POSTED BY : Nilesh Shirke on May 11, 2011 12:05 PM
  • 0
  • COMMENTS 0

Decoding the Fastest Worm in Internet’s History

Decoding the Fastest Worm in Internet’s HistoryDuring the final stages of World War II a small atom bomb explosion caused huge devastation in the cities of Hiroshima and Nagasaki killing nearly ....

Read More
  • POSTED BY : Kamlesh Patil on May 11, 2011 11:55 AM
  • 0
  • COMMENTS 0

A Roomful of Women 'Computors'!

Do you know that the first Computers in the world were Women?You heard me right; but it's not in the way you imagine. The United States of America had a problem.The Second World War was raging. And ....

Read More
  • POSTED BY : Murali Madhavan on April 28, 2011 03:20 PM
  • 0
  • COMMENTS 0

Secure Code Review- Filling the Essential GAP in Software Security

Secure Code Review- Filling the Essential GAP in Software SecurityThe telecommunication industry has faced many changes in the last decade. By the end of 2009, nearly 70 % of the world population had ....

Read More
  • POSTED BY : Shivi Arora on April 11, 2011 11:50 AM
  • 0
  • COMMENTS 0

Security Threats will rise as Application Stores become Popular

In the past six months most of the major carriers in India have rolled out their own application stores. Today, there are over 500,000 applications available to Indian mobile users. India is a fast ....

Read More
  • POSTED BY : Lucius Lobo on January 25, 2011 10:30 AM
  • 0
  • COMMENTS 0

Contact Us

Archives

For further information please write to connect@techmahindra.com

For further information please write to connect@techmahindra.com