by admin | May 25, 2018
A server is a computer hardware or program which provides services to another computer hardware or program, known as the client (and in turn, to its users). Mostly server and client will reside in separate computing systems or hardware (in which case it can be...
by admin | May 9, 2018
Information technology is getting updated fast, which is revolutionizing every walk of life. Along with these technological advancements, security threats are also increasing in the arena of cyber world. Newer technologies have opened newer ways for threats....
by admin | Apr 19, 2018
We hear the term Machine Learning so often. It has been immensely popular in the cyber world today. Machine learning is the technology which can make computers work without being explicitly programmed. It enables learning ability in information systems/...
by admin | Mar 21, 2018
Let’s talk about ‘Internet of Things’ (IoT) today. Term IoT has been coined by Kevin Ashton, a British technology pioneer. We can have a clear understanding of IoT through this quote by Ashton, from one of his published articles: “If we had computers that knew...
by admin | Mar 2, 2018
In computing, security threats are possibilities of danger that might exploit a vulnerability to breach security, causing damage. The vulnerability is the weakness which allows an attacker to reduce a system’s information assurance; It occurs due to the presence of a...
by admin | Feb 22, 2018
Cloud Computing is the delivery of on-demand computing resources (computer power, database storage, applications as well as other IT resources) over the internet. This is achieved by using a network of remote servers hosted on the internet rather than a local...