Announce new IT infrastructure certificate programs for undergraduate students across India.
The combination will drive a more software-centric and programmable telecom infrastructure and services ecosystem.
SAP Customer OnDemand is comprised of the SAP Sales OnDemand, SAP Service OnDemand and SAP Social OnDemand solutions and the SAP Social Media Analytics application by Netbase.
The growth in information volume, velocity, variety and complexity and new information use cases, makes IM infinitely more difficult going forward, finds Gartner.
EMC unveils new software Flash strategy and upcoming EMC XtremSW Suite to manage Flash across the datacentre.
Majority of businesses have jettisoned from corporate-liable policies, and BYOD is in the clear majority, says IDC.
A new study by IDC highlights dangers for those that use counterfeit software.
Overwhelming majority of technologists prefer connected devices for work over wellness and identify privacy concerns and data security as the industry's biggest challenges.
Sharekhan shares key elements of its journey with Seclore's IRM solution, as they secured their unstructured data and ensured privacy.
Survey reveals investors demand more transparency about corporate cyber attacks.
Credential is available as a traditional PIV-I credential for government use, or as a CIV credential for commercial applications.
BYOD, virtualisation and the increasing complexity of threats create the greatest impact on today's enterprises.
Implementation of integrated information systems helps increase production capacity by 0.45 tons per hour.
McAfee endpoint protection posts high scores in NSS Labs' evasion and exploits detection tests.
Emerson Network Power has released an infographic that illustrates the increasing convergence of voice and data.
Evernote spokeswoman Ronda Scott said via email that the attack "follows a similar pattern" to other cyber attacks on Internet-based companies in recent weeks, but she did not elaborate.
2012 was a year that definitely saw budgetary constraint which resulted in delays in x86-based server replacements in enterprise and mid-sized datacentres.
Cybercriminals are taking mobile devices seriously, because now they typically contain even more private data than traditional PCs, finds Kaspersky.
Ranga Rangachari, Vice President and General Manager, Red Hat Storage, comments on this association.
Juniper SRX line cards are security solutions that can provide mobile operators with zero downtime performance upgrades and scale to accommodate the exponential growth of network throughput.
The company has achieved a series of key milestones, signing major deals with new and existing customers worldwide in North America, Latin America, EMEA, Asia and the ANZ markets.
Red Hat and IBM's Linux Technology Center demonstrate the virtualisation capabilities of Red Hat Enterprise Linux with KVM running on top of System x hardware with a DB2 database.
The MiniDuke backdoor was used to attack multiple government entities and institutions worldwide during the past week.
Collaboration on threat intelligence and secure mobile access to help customers detect and prevent advanced threats and enable mobile productivity securely.
RSA, The Security Division of EMC, has announced the upcoming release of RSA Authentication Manager 8, the next-generation access control solution.
With an average of only 30% of customers globally reporting having positive customer experiences with their insurers, insurers will need to address multi-distribution and customer experience.
ValidEdge sandboxing technology, which identifies sophisticated, hard-to-detect malware, will help McAfee broaden its anti-malware portfolio.
Technology partners include Aruba Networks, F5 Networks, IBM, Imperva, Microsoft, VMware and more.
A computer security firm freed tens of thousands of infected PCs from a "botnet" that forced enslaved machines to send out spam pharmaceutical ads during a cyber crime-fighting demonstration.
RSA Executive Chairman declares Big Data analytics will help security practitioners regain the advantages of vigilance and time over sophisticated attackers.