OpenText and DHFL Pramerica Life Insurance announced completion of a large-scale digital transformation project that has digitised key business processes at DHFL
The vast and dynamic BFSI segment has been implementing CRM techniques to reap the benefits. However, it has been a half-hearted effort where the significant results are yet to be observed, merely due to the lack of an integrated, holistic approach towards this software.
NVIDIA showcased GeForce GTX graphic cards featuring the latest Pascal architecture. The participants experienced technologies like Virtual Reality and 4K that are driving increasingly immersive gaming experiences.
Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.
To date, 30 startups have graduated from Target Accelerator Program in India and worked with Target teams across stores, marketing, finance, legal, merchandising, mobile and digital.
Hardware appliances are losing their grip on the Application Delivery Controller (ADC) market, according to a study by ZK Research
Cybersecurity firm SonicWall has appointed Wias Issa as Vice President of Sales and General Manager of its Asia Pacific and Japan (APJ) business.
More than 70 percent of organisations have started taking action to address pay equity, but fewer than one-third of them believe they have been successful in closing existing pay gaps at their organisation, according to CEB.
Its time for Mainframe Modernisation and to make the task easy for enterprises, global technology giant Hewlett Packard Enterprise (HPE) is collaborating with Indian IT consultant major Infosys
With the aim to fight against the future cyber threats, scientists have developed a new system with high-speed encryption properties that drives quantum computers to create theoretically hack-proof forms of data encryption.