CIO City

Join Hands to Build a Smarter India: Sign in | Join now
White Papers
Presented by
Cloud computing is a paradigm shift for IT services and is not just a set of new technology and tools but is the change in the way we respond to the business problems today using technology. This paper discusses cloud service delivery models and how to choose your preferred delivery platform.
Presented by
In March 2013, COBRAPOST, an online magazine, carried out a sting operation alleging that employees from three private sector banks had violated some of the money laundering rules and guidelines set by the regulatory authorities.The highlighted modus operandi included opening of accounts without the mandatory PAN card, opening of accounts to route the cash into the Bank’s menu of insurance products, facilitating splitting of the money to evade detection, using dummy accounts to faceplate the conversion of black money, modifying the client profile to make the investment unquestionable and helping the clients to transfer black money abroad through the non-resident accounts.
Presented by
The information explosion gives hackers, thieves, and malicious insiders a target-rich environment that perimeters cannot defend. To thread the needle between information protection and legitimate access, CISOs must focus on defending the content of files and communications, not just containers or conduits. Effective protection combines content awareness, policy-based protection, and strong authentication to discover and monitor sensitive information, protect it as it moves across networks, to mobile devices, and in the cloud, and deny illegitimate access without compromising the productivity of legitimate users.
Presented by
The corporate computing environment is rapidly evolving in response to the consumerization of IT, mobility and cloud computing. These trends introduce new strategic business opportunities - as well as new risks and vulnerabilities. IT organizations must find a way to protect corporate assets while enabling the business to realize the value of these trends. This can be made more complicated than it needs to be when the IT organization is supporting a 'good enough' network.
Presented by
Network-enabled devices that include embedded communication modules or that are designed to be used with gateways or routers are flooding the market. Consumer products that are designed to be used with a web or mobile application are becoming the norm. It is estimated that over 100 billion M2M enabled devices are being shipped globally each year. This is the 'Internet of Things' and its creation is firmly underway.
Presented by
Somewhere out there your customer is right now realizing an experience with your brand. This realization will turn into an opinion soon enough and if you have done your homework, you will be able to lock in that discerning customer for a few more transactions. In a world where customer choices are increasing by the second, customer loyalty is increasingly turning into a wish. Does customer experience management (CEM) offer a way out? Read on to find out.
Presented by
The risks associated with the use of password-only authentication are not new. In 1995, the US Computer Emergency Response Team (CERT) reported that approximately 80 percent of the security incidents they received were related to poorly chosen passwords. More than fifteen years later, two-thirds of organizations are still using just a password to secure remote access1.
Presented by
In the highly competitive Pharmaceutical world, staying ahead of your competition can be extremely challenging. Whilst having great products and a dedicated Sales Force were the keys to success in the past, it is not a guarantee of success in today.s environment. In an age where information is transmitted by a few keystrokes in a matter of seconds, traditional ways of doing businesses have to be re-looked. .Adapt or Perish. is the mantra for companies today. The primary challenge for any organization therein lies within . their ability to recognize and make the change in their business processes that allows for effective use of information. Traditionally, companies have relied on manual reporting using paper based reports to collect and send information from the field to their managers and the corporate headquarters. Some companies have moved to sending reports via e-mail. In either case, the information collection and dissemination is prone to errors since this is done manually with little validation. This also takes significantly more time in terms of collating the data. Furthermore, information has a very short half-life. You needed the information yesterday to make a decision. In this situation, the ability to reduce the time-lag in receiving the information is as vital as the information itself.
Presented by
This IBM publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can be applied.
Presented by
With CAPEX accounting for only 20% of the cost of a network, it is important to look beyond initial expenditures and consider TCO and the business value a network can provide. A third-party TCO comparison of a Cisco network versus other vendors illustrates that Cisco can deliver a 13% better TCO even before business benefits, such as network uptime and employee productivity are considered. Further, the Cisco Borderless Network Architecture acts as a platform for service delivery, allowing your IT organization to say “yes” to business and revenue-enhancing opportunities.
<< prev  1  2  3 next >>  
SiliconIndia About Us   |   Contact Us   |   Help   |   Community rules   |   Advertise with us   |   Sitemap   |  
News:       Technology   |   Enterprise   |   Gadgets   |   Startups   |   Finance   |   Business   |   Career   |   Magazine  |   Newsletter   |   News archive  
Cities:        CEO   |     Startup   |   Mobile   |   CIO   |   Women   |   BI   |   HR   |   SME   |   Cloud   |   Marketing   |   QA   |   Java   |   Web Developer  
Community:      Members   |   Blogs   |   Indian Entrepreneurs   |   Gyan   |   Advice   |   Community   |   Find   |   Events   |   CXO Insights  
Job Board:      Jobs   |   Freshers   |   Companies   |   HR Speak   |   Forum  
Online Courses:   Web Developer   |   Java Developer   |   CCNA Training   |   SEO   |   SAS   |   SQL Server 2005   |   J2EE
Education:   MBA   |   MCA   |   Engineering   |   Training Institute
Life:          Real Estate   |   Travel   |   Finance   |   Gadgets   |   Movie Reviews   |    Jokes  
Send your feedback and help us continue to improve SiliconIndia
© 2014 InfoConnect Web Technologies India Pvt Ltd. all rights reserved