Security

August 3rd, 2018 by

Can a surveillance system identify and detect suspicious objects, activities or humans automatically and take immediate action on it without…

June 15th, 2018 by

Trust We visited the conference #VINT2018 "In code we trust". Inspiration and great discussions on a hot topic at the…

May 18th, 2018 by

When you need to update 10.000 devices one by one and by hand, you will go bankrupt. The time and…

April 3rd, 2018 by

DevOps will make systems more secure. In opposite to what many think, adopting DevOps, with its fast release cadence, will…

March 21st, 2018 by

Abstract –As with any other sector, the healthcare industry is also prone to cyber threats. Though the nature of threats…

March 20th, 2018 by

The most vulnerable and least secure point in your network is your device. It is the easiest avenue for cyber…

November 25th, 2017 by

We are in the midst of an exciting Digital Transformation era wherein the enterprises across all sectors are at speed…

November 17th, 2017 by

https://youtu.be/7Z-BRgPcBDQ The value is in the data You might have heard this sentence many times. Generating and converting data is…

November 15th, 2017 by

Last week I received an e-mail from the design firm Ideo. Last year I did a couple of online courses…

September 26th, 2017 by

In 2010 Steve Jobs posted his manifesto “Thoughts on Flash” as a response to the criticism of Flash not being…

Blockchain

May 31st, 2017 by

Two of the most talked about technologies in today's world are Blockchain and IoT. They are at the initial stage…

April 20th, 2017 by

In the first article of this series, I discussed the outstanding user experience Universal Studios provides to its customers while…