Building tomorrow’s datacenters today Mohd Ujaley Oct 5, 2015 US-based VMware sees huge potential for software defined data centres (SDDC) to provide a good IT architecture for compute, data…
Destination Odisha: Exploring potential of tourism digitally Mohd Ujaley Oct 5, 2015 Odisha has seen surge in the total inflow of both domestic and international tourists in 2014. To cater to the growing needs of…
Smart City has to be a ‘Safe City’ for attracting private investment: Verint Systems Mohd Ujaley Sep 24, 2015 A Smart City basically comprises of better infrastructure, upgraded public transport, self-sufficient and efficient power, water…
New technology to bring down energy cost for meat exporters Rashi Varshney Sep 22, 2015 The new technology, called modified atmosphere packaging (MAP) - specifically developed for meat exporters - allows export at -4…
Kanpur manages public grievances through social media Mohd Ujaley Sep 21, 2015 Kanpur district administration is using a social media-based grievances redressal system for quick disposal of public grievances.
E-commerce players betting big on offline presence Mohd Ujaley Sep 14, 2015 Many e-commerce players have started foraying into physical retail space and the trend is going to become more prominent in future…
Get IT right even if you start small Mohd Ujaley Sep 7, 2015 The success of an SMB is defined by its speed of service delivery, reach, and quality. IT makes it possible for SMBs to aspire for…
Why businesses should migrate to IPv6: James Wong Mohd Ujaley Sep 7, 2015 IPv6 has become critical for businesses as it helps build larger, more efficient networks for growth and innovation
Machine Learning: an exciting new era for technology Mohd Ujaley Sep 4, 2015 One has often wondered about the marvels of technology. Its speed, precision, uniformity and ease in accessibility has transcended…
A robust authentication system is the backbone of any security strategy Mohd Ujaley Sep 4, 2015 Deploying a robust authentication system becomes the first step, it forms the backbone of any security strategy. But, with plenty…