Data driven analysis to achieve any business or strategic goal, also commonly referred as Data Mining, is like finding a needle in a haystack. But when the ‘needle’ in question… Read more »
Technology plays a critical role in the financial ecosystem as it continues to revitalize customer journey through novel offerings. Race for innovation and rising customer expectations are driving demands for… Read more »
DSCI (NASSCOM) Hyderabad Chapter celebrated Data Privacy Day by organizing a Privacy focused meeting with its members. The objective of the day is to sensitize individuals and disseminate privacy practices… Read more »
We, as humans, desire interconnectedness, as much as we seek the solace of seclusion. Intricacies of modern technology and digitisation has fuelled this interconnectedness but, at the same time has… Read more »
Deciphering the History of Time, Gravity, Interstellar, and Theory of Relativity We live in a world full of bewilderment. Making sense of everything around us and deciphering nuances of the… Read more »
The World Wide Web is replete with news stories and analyst reports of data leakage and theft ostensibly by ‘trusted’ employees leading to irreparable loss of brand trust and the inevitable lawsuit and resultant fines. How do you secure your precious data against such loss? Here are four steps that every data security practitioner needs to be aware of.