by admin | Jul 27, 2018
As the name indicates, ‘Blockchain’ is a chain of blocks, which forms a digital distributed public ledger and records cryptocurrency transactions. Although blockchain was introduced as a method to timestamp digital documents by a group of researchers in 1991, it...
by admin | Jul 13, 2018
“Meltdown & Spectre again !!” – This is the most popular happening in cybersecurity now. It’s a known fact that Meltdown & Spectre exploit critical hardware vulnerabilities in modern processors. Let’s have a look at Meltdown-Spectre in detail. In the...
by admin | Jul 6, 2018
Of course, nothing works in the cyber world without servers and we can term ‘Serverless Computing’ a misnomer. Serverless Computing adds another layer of abstraction on top of the cloud infrastructure, where developers can work without worrying about the underlying...
by admin | Jun 29, 2018
Cloud computing has brought revolution by making IT – Servers, Storage, Database, Networking, Analytics, Software & more – available over the internet (i.e. ‘cloud’). Even though there is an increased risk in security due to exposure, adopting cloud...
by admin | Jun 22, 2018
This IT-driven era demands a strong presence in the cyber-space, especially for enterprises to succeed. This can be achieved through websites, which is the digital presence of any worldly entity. Nowadays, everything from personal pages, advertisements,...