Why Technology Reuse fails

Today, a lot of stress is on code reuse, in the IT industry. In fact, the industry is thriving on the same. The problem is every business requirements have its very own set of specific needs which often are not met with by using standardized software packages and code modules, besides other barriers to success.  Ideally software should be designed to complement and automate business processes. But since this becomes costly, modules and packages are standardized and IT business analysts try to fit the standard things to all problem domains. The net result is mayhem and chaos. Continue reading “Why Technology Reuse fails”

Does the HP-Palm move make sense?

HP-Palm has become the hype that the mobile computing world could have done without. Is it really worth the hype? Will this $1.2 billion deal create waves in the already competitive market?
Hewlett Packard, the world leader in laptops (in terms of sales) has its own series of PDAs, less popularly known to the common man. The I-PAQ PDAs sold by HP does not rank among the top 10 PDA brands in terms of sales. With the focus shifting towards handheld computing devices, this may have been a desperate move by HP to claim its place in the competitive industry dominated by the likes of Blackberry, Apple, HTC, Nokia and O2. Continue reading “Does the HP-Palm move make sense?”

How to price IT products in 7 steps?

The technical team or the product development team has come up with a ground breaking product. The technology can have a deep impact on the customer. The technical team knows it, and so does the customer. The contract for a long term engagement is about to hit off, and then the customer asks how much will this technology cost his pockets? In this competitive world, the technology developers do want the best price for the technology, but at the same time, they really do not know what the best price is to which your customer will give the green signal for a long term engagement. So how does one price an IT product? Continue reading “How to price IT products in 7 steps?”

4 Biggest brands launched the core i5 laptops

Today the world is walking on core i5 laptops. They are high speed mean machine, well built and easy to handle. The Core i5 is now powering performance laptops for those customers who have the capability to shell out a little extra. Since they are made on Intel’s cutting-edge 32-nanometer manufacturing process, it readily outperforms the older Core 2 Duo, giving much more satisfaction to tech-savvy customers. Continue reading “4 Biggest brands launched the core i5 laptops”

Beowolf Clusters: Cheap supercomputers for poorer pockets

Beowolf cluster: Supercomputers for the poor.

The demand for faster calculations can’t be met by only relying on the speed increase resulting from advances in computer technology as high end super computers are that much costly. One of the solutions to this problem for ‘not-so-deep-pockets’ is the distribution of the numerical tasks to a set of machines. So how to provide supercomputer capabilities cheaply? The answer is Beowolf Clusters. This process is called parallelization because the computers complete their tasks in parallel instead of the traditional step‐by‐step (serial) execution. As computer codes have been updated to use this new paradigm, the demand for parallel computers has grown. In general, such computers need to have: Continue reading “Beowolf Clusters: Cheap supercomputers for poorer pockets”

7 reasons why Apple’s I-Pad may fail.

Amidst a lot of hype as always, today 27th January, 2010, Apple launches the I-Pad. While it is being viewed as the product that will rejuvenate Apple’s revenues for years to come, a question many staunch Apple fans (and those who are not fans of course) will ask, is it really worth the hype? Apple has always created a market even when there is none. Will it be successful yet again this time?

Continue reading “7 reasons why Apple’s I-Pad may fail.”

How to tackle the problem of security breaches in call centers

Outsourcing is the mantra of the day. Today, many large MNCs, all across the globe, outsource activities like customer relationship management activities to cheap labor countries where English speaking skills are not a problem. A major concern in such outsourcing is the security in customer’s sensitive data.

Continue reading “How to tackle the problem of security breaches in call centers”

Google’s Nexus One vs Droid: A comparison of the current top two G-Phones

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010. Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones and the possible strategies behind their launches.

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010.  Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones. Continue reading “Google’s Nexus One vs Droid: A comparison of the current top two G-Phones”

Security for Mobile: It matters

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. Protect yourself from mobile security breaches without incurring huge expenses through 7 simple steps.

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. The cipher used by the General System for Mobile Communications (GSM) has been cracked by a German researcher Karsten Nohl who presented his findings Sunday at a hacker conference in Berlin. So there is a reasonable cause for most users to worry as the security scheme used by 80 percent of the world’s cellular telephones has been compromised. Continue reading “Security for Mobile: It matters”

Green mobile phones: is it here to stay?

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. This blog provides an insight on few of the exciting offerings on green mobile phone technology and how companies are gearing to tend to this emerging urgency.

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. Continue reading “Green mobile phones: is it here to stay?”