Notice Board
Intaglio 2016 @ IIM Calcutta. IEEE UPCON – 4th to 6th December, 2015. Intelligent Human Computer Interaction (IHCI), 2015....
THE CYCLE OF TECHNOLOGY
Since time memorial, humans have been improvising their surroundings for various objectives. Initially, the objectives were of basic nature...
BOTH NET AND ZERO
The most wonderful feature of the Internet is that it has minimized the information gap between symbolizes the...
Wireless charging
Wireless charging is a technique of transmitting electrical energy through air to a device for the purpose of energy...
Shortnote
Information Technology (IT) Vulnerability is a noteworthy concern nowadays in all circles of government as well as private sectors....
IT Vulnerability and Security Risk
: The article is about cyber risk / threats which became a part of our daily life. Since last...
Vulnerabilities in aviation industry
The government accountability office with some of the modern security research in vulnerability of aviation system is bringing the...
Cross Site Scripting (XSS)
Introduction to XSS Cross Site Scripting or simply XSS attacks are types of injection, in which malicious scripts are...
Keep Your Cloud Safe with CloudSigma
Today’s world is all about cloud Computing. Cloud Computing has become quite famous from past 4-5 years. Almost everything...
CYBER CRIME,WORM AND TERROR
While rapid technological developments have provided vast areas of new opportunity and potential sources of efficiency for organisations of...