siliconindia logo
White Papers
Presented by
The risks associated with the use of password-only authentication are not new. In 1995, the US Computer Emergency Response Team (CERT) reported that approximately 80 percent of the security incidents they received were related to poorly chosen passwords. More than fifteen years later, two-thirds of organizations are still using just a password to secure remote access1.
Presented by
PayWheel is a web based, multi user and user-freindly HR & Payroll Management Software. This product, specially designed for India, takes care of all requirements of Payroll. in addition to the salary computing module. PayWheel also takes care of leave details, approval process for leave, bonus, incentives, reimbursement. etc. It processes salary with IT calculations and loan/advance deductions. It generates pay register and computes all allowances and deductions. It also generates MIS reports. Form 16, Form 24Q etc.
Presented by
As electronic products become faster and more complex, they are harder to design, verify and debug. Designers must perform extensive verification of their designs to ensure reliable product operation. When problems occur, designers need to quickly obtain insight into root cause in order to fix them. The root cause of many digital problems is quicker to pinpoint by analyzing both the analog and digital representations of the signal, making a mixed signal oscilloscope (MSO) ideal for verifying and debugging digital circuits.
Presented by
In the highly competitive Pharmaceutical world, staying ahead of your competition can be extremely challenging. Whilst having great products and a dedicated Sales Force were the keys to success in the past, it is not a guarantee of success in today.s environment. In an age where information is transmitted by a few keystrokes in a matter of seconds, traditional ways of doing businesses have to be re-looked. .Adapt or Perish. is the mantra for companies today. The primary challenge for any organization therein lies within . their ability to recognize and make the change in their business processes that allows for effective use of information. Traditionally, companies have relied on manual reporting using paper based reports to collect and send information from the field to their managers and the corporate headquarters. Some companies have moved to sending reports via e-mail. In either case, the information collection and dissemination is prone to errors since this is done manually with little validation. This also takes significantly more time in terms of collating the data. Furthermore, information has a very short half-life. You needed the information yesterday to make a decision. In this situation, the ability to reduce the time-lag in receiving the information is as vital as the information itself.
Presented by
Of late there has been quite a bit of talk of the “new world order” and the emergence of the Diameter Signaling Controller (DSC). Is that really the case? For the veterans of the telecommunications industry that saw the progression of control signaling over the past twenty years, this is more like “history repeating itself”. Some of the challenges facing the signaling industry today were faced in legacy networks over thirty years ago as the industry moved from in-band to “common channel” signaling. This led to the rapid development of the concept of the control signaling network and its related network elements. This paper deals with some of the similarities and differences between network architectures and control signaling protocols of yesterday and today. It will show why it is essential to have a well grounded knowledge of the past to be able to effectively solve the problems of the future!
Presented by
By taking a comprehensive end-to-end approach, a next-generation enterprise network simplifies and speeds the deployment of current and future technologies. This can help you transform your business because it provides opportunities to give employees freedom to work anywhere on any device for increased productivity, control your operational costs through virtualization innovations—from the data center to the desktop and also improve your business agility with cloud computing that does not jeopardize security, compliance, or intellectual property.

Presented by
Today mobility, collaboration, and cloud computing present opportunities as well as challenges for IT organizations. You need a network that can deliver new service models while fostering business innovation and mitigating costs. By connecting people, information, and devices securely, reliably, and seamlessly, Cisco Borderless Networks can help you provide BYOD (bring your own device) support to your workforce; improving productivity and collaboration while protecting assets, capture growth opportunities using collaborative applications by attracting and retaining customers and workforce talent with video and finally use cloud economics for flexible services which helps to reduce costs and improve business processes.
Presented by
With CAPEX accounting for only 20% of the cost of a network, it is important to look beyond initial expenditures and consider TCO and the business value a network can provide. A third-party TCO comparison of a Cisco network versus other vendors illustrates that Cisco can deliver a 13% better TCO even before business benefits, such as network uptime and employee productivity are considered. Further, the Cisco Borderless Network Architecture acts as a platform for service delivery, allowing your IT organization to say “yes” to business and revenue-enhancing opportunities.
Presented by
Make better decisions with EMC`s Backup and Recovery Assessment
Presented by
In March 2013, COBRAPOST, an online magazine, carried out a sting operation alleging that employees from three private sector banks had violated some of the money laundering rules and guidelines set by the regulatory authorities.The highlighted modus operandi included opening of accounts without the mandatory PAN card, opening of accounts to route the cash into the Bank’s menu of insurance products, facilitating splitting of the money to evade detection, using dummy accounts to faceplate the conversion of black money, modifying the client profile to make the investment unquestionable and helping the clients to transfer black money abroad through the non-resident accounts.
<< prev  1  2  3  4  5  6 next >>