Fintech startup MoneyTap enables instant credit on the app Rashi Varshney Oct 3, 2016 Any salaried employee can download this free Android app and in a few minutes, using a patent-pending Chatbot interface, provide…
Pune Smart City just got smarter Mohd Ujaley Sep 30, 2016 Pune has partnered with European Business and Technology Centre to leverage European smart city solutions
We are currently building and operating Gujarat’s SWAN & SDC: Orange Business Services Ankush Kumar Sep 30, 2016 “We are currently working with Gujarat Government - building and implementing their Wide Area Network and we will be operating…
Google to open new local cloud region in Mumbai Srikanth RP Sep 30, 2016 Google has announced that it will open a new Google Cloud Region in Mumbai. Expected to be live in 2017, the India cloud region is…
Amdocs introduces new capabilities to enable enhanced personalized mobile video experiences Abhishek Raval Sep 29, 2016 Integration with Google’s mobile data plan API enables new level of personal control over video consumption costs for YouTube…
Improving patient care with tracking technologies Abhishek Raval Sep 29, 2016 RFID enables real-time tracking for hospitals and patients, providing increased visibility
How digital disruption is changing the face of banking Srikanth RP Sep 29, 2016 By Shree Sule, Lead Consultant, Altimetrik Every now and then we hear of the numerous technological disruptions, the ones that…
Redefining IT confidence: 3 steps to transformation Srikanth RP Sep 29, 2016 By Srihari Gopinath, Head of Marketing, Enterprise Group, Hewlett Packard Enterprise India It would be interesting to ask a…
Five questions a CISO should ask to a security vendor Rashi Varshney Sep 29, 2016 EC's Rashi Varshney caught up with cyber security firm Fortinet's Joe Sarno, Vice President, International Emerging, MEA, Eastern…
Fortinet Survey finds out cybersecurity Strategies of Indian Enterprises Rashi Varshney Sep 28, 2016 Indian respondents cited ‘improved information security strategy’ as the greatest value of threat intelligence followed by…