Blogs

Demystifying Quantum Computing

Demystifying Quantum Computing

Quantum computing is largely a mystery to many, and this post is an attempt to shed some light on how it works. Beyond the Heisenberg uncertainty principle, there are four other important principles or phenomena that are used in quantum computing. These are superposition, entanglement, no-cloning, a...

Read more >

Five Best Strategic Features of a Next-Gen Security Operations Center - SOC

Five Best Strategic Features of a Next-Gen Security Operations Center - SOC

All computer equipment and software are vulnerable to attacks. Security researchers and teams have responsibilities of monitoring, finding, alerting, thwarting, and protecting software systems from such attacks. However, there is an ongoing arms race between hackers and security teams. As businesses...

Read more >

Business Continuity Management - Four misconceptions that derail your business

Business Continuity Management - Four misconceptions that derail your business

In this connected world of mobile, social, and cloud, the enterprise boundaries are blurring and creating enormous challenges to you at the time of threats and disasters. The threat landscape has been continuously evolving with today’s attacks being multi-dimensional, multi-stage, and multi-ve...

Read more >

HTTP Protocol in RFCs

HTTP Protocol in RFCs

Request for Comments denotes a type of publication from the Internet Engineering Task Force (IETF) and Internet Society (ISOC).  IETF and ISOC are the technical development and standard-setting bodies for the Internet and official documents of Internet specifications, communications protocols, ...

Read more >

Developing Object Detection Models for Android Using Tensorflow

Developing Object Detection Models for Android Using Tensorflow

Mobile operating environments like smartphones can benefit from on-device inference for machine learning tasks. It is common for mobile devices to use machine learning models hosted on the cloud. This approach creates latency and service availability problems, in addition to cloud service costs. Wit...

Read more >