Sterling and Wilson Partners with Uptime Institute Express Computer May 21, 2019 Henceforth, Sterling and Wilson will be one of its kind single-stop data center solution provider for constructing Data Centers…
IIIT Hyderabad and TalentSprint roll out AI, ML and blockchain programs Express Computer May 21, 2019 IIIT-Hyderabad and TalentSprint have announced the all India roll out of their executive programs on AI and machine learning as…
Google announces official launch of Google Glass Enterprise Edition 2 IANS May 21, 2019 Google is bringing the second edition of its eye-wearable device — Google Glass Enterprise Edition 2, with improved camera, USB-C…
Google AI model better at diagnosing lung cancer: Scientists IANS May 21, 2019 Scientists at Google have developed an artificial intelligence (AI) model which they claim is better at diagnosing lung cancer…
Scientists develop new data processing mechanism using light pulse PTI May 21, 2019 Scientists have developed a method that can give computers the ability to carry out superfast data processing using light pulses…
Up to govt to take a call on Huawei issue, says Trai PTI May 21, 2019 Telecom regulator Trai has said the issue of whether India needs to take a stand on Huawei is a “larger question” and that it is…
Winning at enterprise analytics with a holistic approach to BI IBM May 20, 2019 As organizations rush to innovate and modernize business with AI Just getting more insight in your business is no longer good…
Accelerate the journey to AI IBM May 20, 2019 Flexibly manage your data as a strategic asset. IBM Cloud Private for Data offers an integrated, end-toend platform for high…
Innovative approaches in enterprise security must be explored to stop hackers: Keyur Desai, Essar Srikanth RP May 20, 2019 In an interactive discussion with Express Computer, Keyur Desai, CIO – Essar Ports & Shipping and Head InfoSecurity, Network…
Data breach: Check if you are fearful or angry IANS May 20, 2019 Once a data breach is reported, people who are fearful quickly become sensitive towards the size and scope of the breach than…