HP expands its business printing portfolio Express News Service Jun 4, 2014 HP has unveiled new inkjet devices designed to meet the complex needs of today’s large businesses. The HP Officejet…
Palo Alto Networks research highlights hidden cyber threats Express News Service Jun 4, 2014 Palo Alto Networks' new research has revealed how attackers exploit commonly-used business applications to bypass security…
Preventing Frauds through Voice Biometrics Express Computer Jun 4, 2014 Call centres, especially in the financial sector, can significantly reduce frauds by installing voice biometrics solutions that…
25 pc of the top 50 global banks to have a banking app store by 2016 : Gartner Express Computer Jun 4, 2014 The explosive growth of apps is causing significant challenges for the banking industry, according to Gartner, Inc. Banking CIOs,…
Business analytics firm Tableau Software enters Indian market Express Computer Jun 4, 2014 Tableau Software, a global business analytics software provider today announced its launch in India. The company also named Deepak…
Big data needs a data-centric security focus: Gartner Express Computer Jun 4, 2014 Chief Information Security Officers (CISOs) should not treat big data security in isolation, but require policies that encompass…
SUSE extends its high availability capabilities to SAP HANA Express Computer Jun 4, 2014 SUSE today said it is making available high availability (HA) capabilities for deployments of the SAP HANA platform via SUSE Linux…
Dell solution improves MakeMyTrip’s site performance by 30pc Express Computer Jun 4, 2014 Dell has helped a travel portal MakeMyTrip to deliver improved performance and high availability for its e-commerce site. The Dell…
HP expands its business printing portfolio Express Computer Jun 4, 2014 HP has unveiled new inkjet devices designed to meet the complex needs of today’s large businesses. The HP Officejet Enterprise…
Palo Alto Networks research highlights hidden cyber threats Express Computer Jun 4, 2014 Palo Alto Networks' new research has revealed how attackers exploit commonly-used business applications to bypass security…