by admin | Mar 21, 2018
Let’s talk about ‘Internet of Things’ (IoT) today. Term IoT has been coined by Kevin Ashton, a British technology pioneer. We can have a clear understanding of IoT through this quote by Ashton, from one of his published articles: “If we had computers that knew...
by admin | Mar 13, 2018
Outsourcing is the business practice where a company (say company-X) hires another company (say company-Y), to perform certain tasks. These tasks might have been previously executed by the company-X’s employees itself. IT outsourcing is the use of external parties for...
by admin | Mar 2, 2018
In computing, security threats are possibilities of danger that might exploit a vulnerability to breach security, causing damage. The vulnerability is the weakness which allows an attacker to reduce a system’s information assurance; It occurs due to the presence of a...