Here’s a scenario: “ABC Tech. reported a breach in its systems, thereby losing some sensitive corporate data. After probing, it came out that this was the work of an employee holding a grudge against the organization. While the employee did his … Read More
Does anyone truly have Privacy?
With Google tracking your interests, Facebook scanning each Photograph, Foursquare locating you every now and then, and apps like FindMyIphone, this becomes a very trivial question. In recent times, it has become crucial for users to draw a line between … Read More
Business has reached far greater heights in today’s world than anyone ever thought was possible. The same can be said for technology. Put the business and technology together and you have an escalation of everything – profits, ease of conduct, … Read More
Implementing a user provisioning system may be your key to resolving on- and off-boarding issues and access delays.
Identity access and management (IdM) is a broad IT tool used by large firms to manage myriad user identities, compliance, and IT systems. In this entry we will look … Read More
Recently there has been a barrage of cloud customer relationship management(CRM) services introduced by technology giants and relative unknowns alike. With the surge of “cloud”-hawking industrialists vying for CRM dominance, a battle of dimensions, of sort, has commenced, and the question … Read More