I was privileged to address a distinguished audience of leading Indian CIOs at the IDC Cloud 2.0 Asia Summit in Mumbai last week to present my thoughts on how companies could adopt a strategic ....
Has your company undergone a social media security assessment which assesses social media employee policies, their implementation and online employee behavior? If not, it’s perhaps time to start as ....
Emerging markets are expected to contribute majorly in the global Pharma business. Plans have been made by pharma giants to tap this promising market. A major challenge faced by pharma companies is ....
Next Generation Networks ( NGN) and Next Generation Services are something we keep hearing about. And we also keep hearing warnings and advisories from OSS vendors about how their management is going ....
It would be interesting to know that SCM (Supply Chain Management) and Value Chain Planning (VCP) concepts has originated only few years apart. Keith Oliver coined the term ‘supply chain management” ....
One of the greatest myths that I have realized in the current world is that There is Security.We are not talking about kids or novices on some other social networking web site or some site that ....
Having lost his wife and two children in bewilderingly quick succession, Charles Babbage was a devastated man. His mother Betty moved in with him to look after his remaining four children. Charles ....
As cyberspace becomes a dominant form of global communications and trade, so does its political use. This is the first part of a multipart blog on the eight key political issues around internet ....
A 19 year old man has been detained in UK by Scotland apparently in connection with the spate of cybercrimes against US Senate, CITI and the CIA. It is commonly acknowledged that hackers are ....
The rate at which external websites are being hacked demonstrates the lack of an effective defensive mechanism in enterprises. Cyber laws were created to safeguard against script kiddies from hacking ....
Tragedy Strikes! Charles Babbage built the Difference Engine - or a small model of it- at his home workshop in 1822 . And he was satisfied that it worked well enough, so he went ahead and publicized ....
Telco’s on a cross road – Changing eco-system and security impact The time I joined telecom sector, so much have changed but still the pace of change hasn’t slowed down. To my surprise we are ....
Information is the king and information is the asset to take timely decisions and corrective/preventive actions for the success of projects. This information can be on schedules, resources, budget, ....
M2M refers to communication between machines without any human intervention. It is based on Telemetry which is any technology that allows remote measurement and reporting of information. Traditional ....
Charles Babbage’s Cambridge education ended in the spring of 1814 when he graduated. That he did not attach much import to the formal qualifications was evident from that fact that he refused to ....
This English Mathematician is credited to be the first person to develop a machine that could do calculations.He burst on the scene a whole century after Isaac Newton, the greatest mathematician of ....
Types of Access Control Mechanisms Many of us have come across the terms like MAC, DAC, RBAC, ACLs while reading various e-security related articles. However not all of us (except the CISSPs) know ....
I do believe that LatAm has a perfect storm brewing. For now starts the growth for a region that has experienced a lost decade. LatAm has strengthened its economies, its democracies and strategies. A ....
This is the first time I attended a World Economic Forum (WEF) meeting and naturally I was thrilled when I walked into the venue, the International Convention Centre at Cape Town, to run shoulders ....
Smart ideas, Bright minds and Digital ArmageddonIt took the utilities almost a century to come up with the idea of “Smart Energy” and as the “bright minds” around the world debate on its impending ....
IAM - Is Building Consolidated Identity repository a must for an Org - InternalI always come across questions from customer about automation of user provisioning / deprovisioning. For provisioning ....
Decoding the Fastest Worm in Internet’s HistoryDuring the final stages of World War II a small atom bomb explosion caused huge devastation in the cities of Hiroshima and Nagasaki killing nearly ....
Do you know that the first Computers in the world were Women?You heard me right; but it's not in the way you imagine. The United States of America had a problem.The Second World War was raging. And ....
Secure Code Review- Filling the Essential GAP in Software SecurityThe telecommunication industry has faced many changes in the last decade. By the end of 2009, nearly 70 % of the world population had ....
In the past six months most of the major carriers in India have rolled out their own application stores. Today, there are over 500,000 applications available to Indian mobile users. India is a fast ....
Tweets by @TechMahindra
For further information please write to connect@techmahindra.com