Cisco signs MoU with Gujarat govt for IoT

With the aim to help Government of Gujarat benefits from an Internet of Things (IoT) and Smart City projects, the global network technology giant, Cisco, has signed two memorandum of understanding (MoU) with the state government. As per the agreement, Cisco will help...

Awesome data centers

This is a nifty infographic, courtesy of WhoIsHostingThis?, that offers a little data center trivia: the biggest data centers in the world, statistics on the energy they consume, and facts about the data centers used by some of the Internet’s most popular...

What is SaaS?

The infographic below, courtesy of ProfitBricks, offers a detailed snapshot of statistics illustrating how SaaS differs from other software delivery models, the history of SaaS, SaaS growth drivers, and the future of cloud computing.

Wiretapping: Privacy vs. security

Here is a timely trip through the U.S. history of the privacy vs. security debate as it relates to wiretapping, courtesy of “whocalledmyphone.net”.The infographic below follows a path from the establishment of the 4th Amendment in 1791 to Edward Snowden,...

The life cycle of Servers in Datacenter

The infographic below, courtesy of Sims Recycling Solutions, illustrates the tremendous number of servers that data centers go through each year. What happens to all that hardware when it’s short lifespan is reached?

How to Be a Google Power User?

Be a Google Power User Search engines are the backbone of everyday internet use, but are you aware of the hidden tips and ticks available to improve your search?

Choosing Microcontroller

Selecting the right microcontroller for a product or Project can be a daunting task. Not only are there a number of technical features to consider, there are also business case issues such as cost and lead-times that can cripple a project. At the start of a project...

New Vulnerability in Windows Devices

New Microsoft Secure Boot Policies Create a Vulnerability in Windows Devices It’s True — There is no such backdoor that only its creator can access. Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified...

Google Android Hardening Checklist

The hardening checklists are based on the comprehensive checklists produced by CIS. The Information Security Office has distilled the CIS benchmark down to the most critical steps for your devices, with a particular focus on configuration issues that are unique to the...