You are here
Home > Posts tagged "application"

DeepLocker: When malware turns artificial intelligence into a weapon

DeepLocker: When malware turns artificial intelligence into a weapon

This article was originally published on ZDNet . AI can be used to automatically detect and combat malware — but this does not mean hackers can also use it to their advantage. Cybersecurity, in a world full of networked systems, data collection, Internet of Things (IoT) devices and mobility, has

Zoho Announces New Launch, Updates And Data Centers In India

Zoho Announces New Launch, Updates And Data Centers In India

At a mega event in Chennai on Tuesday, Zoho Corp announced major updates to Zoho One, its applications suite designed to run businesses on cloud. Zoho One launched exactly a year ago has now added a new set of capabilities that bridge the gap between different departments and roles

As Ruckus gears up for the new-age Wi-Fi, the US-based tech firm keeps an eye on the nascent IoT market in India

As Ruckus gears up for the new-age Wi-Fi, the US-based tech firm keeps an eye on the nascent IoT market in India

Sreenath K, a porter at the Ernakulam junction railway station in Kerala, recently made headlines when he cleared the Kerala Public Service Commission exams. For his studies he relied on RailWire’s public Wi-Fi, a Google India venture in collaboration with Railtel and Indian Railways to provide free, high-speed Wi-Fi

The slow, light touch of AI in Indian Saas

The slow, light touch of AI in Indian Saas

Looking at him from behind, Sridhar Vembu, in the picture, has a halo around him. It’s the lighting in the room. But for several entrepreneurs, he’s a demigod. Not for nothing. Building a profitable software as a service company that makes close to half a billion dollars in revenue,

12 Simple Things You Can Do to Be More Secure Online

12 Simple Things You Can Do to Be More Secure Online

Ransomware attacks, identity theft, and online credit card fraud can be devastating, and these are just a few of the many types of malicious software and network attacks. If you've never been the victim of a breach, count yourself lucky, but don't let your luck lead you to complacency. Making

Top