7 secrets to successful online marketing

Some e-markets become success stories while others fail. Time and again, e-markets like e-Bay and Amazon.com have become super success stories while certain sites like Rediff-shopping have sustained themselves in the onslaught of internet marketing.

Continue reading “7 secrets to successful online marketing”

Top 10 trends in Information Management technologies

Information management appears to be the talk of the day amongst all technology buzz. Information management or IM is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Management means the organization of and control over the structure, processing and delivery of information. Continue reading “Top 10 trends in Information Management technologies”

Speech technologies: The way ahead for inclusive development

Research institutes like IBM Research Labs, Media Labs Asia, NCST, C-DAC, institutes like the IITs, IIMs among others, have taken up dozens of challenging projects to try filling the gap of ‘Digital Divide’. The private sector is not behind, with companies like NIIT, HCL, Infosys, Wipro and TCS having demonstrated cases for taking computers to the common man. Continue reading “Speech technologies: The way ahead for inclusive development”

Understanding mobile commerce: How can it be successful

Mobile Commerce (m-commerce) refers to any transactions conducted through a variety of mobile devices over a wireless telecommunication. M-commerce was initially expected to experience a substantial growth for  rapid proliferation of mobile device adoption and the obvious advantages of accessibility of service anywhere, anytime. Continue reading “Understanding mobile commerce: How can it be successful”

Can we get computer security for free

Gone are the days when you needed to shell out a huge amount of money to buy security for your laptop or personal computer. Today, most of the anitivirus developers provide antiviruses and anti-spyware for free. The revenue generation model for these companies have undergone radical changes and transactional viewpoints have become a talk of the past. this article discusses the policy of providing free anti-viruses.

Gone are the days when you needed to shell out a huge amount of money to buy security for your laptop or personal computer. Today, most of the anti-virus developers provide anti-viruses and anti-spyware for free. The revenue generation model for these companies have undergone radical changes and transactional viewpoints have become a talk of the past. Continue reading “Can we get computer security for free”

Can you Digg it?

Digg.com is still a relatively lesser known name among many people but is one name that is growing astronomically, especially in the United States and more recently India, where people live on the news provided on Digg. Read the success story behind Digg, the company which is changing the way content gets managed on the web.

Digg.com is still a relatively lesser known name among many people but is one name that is growing astronomically, especially in the United States and more recently India, where people live on the news provided on Digg. Continue reading “Can you Digg it?”

Google’s Nexus One vs Droid: A comparison of the current top two G-Phones

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010. Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones and the possible strategies behind their launches.

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010.  Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones. Continue reading “Google’s Nexus One vs Droid: A comparison of the current top two G-Phones”

Google: Whats the new offer?

Whats on the menu tonight from Google? Google has launched a variety of products in recent times to conquer the cyber space. Will it be possible for any company to challenge Google seriously? To know more, Google up “Insights on Technology”.

Few months ago with the launch of the beta version of the Googlewave, the company made sure heads were turned yet again. As Google declares, the Wave is an online tool for real-time communication and collaboration. Continue reading “Google: Whats the new offer?”

12 simple ways to speed up windows

Many of us still maybe using older PCs and laptops and may have faced regular problems with the processing speed of the machine. We can follow these very basic yet effective 12 steps to speed up our machine. The benefits are simply awesome for slight investments of effort on maintainance of your machine.

Many of us still maybe using older PCs and laptops and may have faced regular problems with the processing speed of the machine. We can follow these very basic yet effective steps to speed up our machine. Continue reading “12 simple ways to speed up windows”

Security for Mobile: It matters

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. Protect yourself from mobile security breaches without incurring huge expenses through 7 simple steps.

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. The cipher used by the General System for Mobile Communications (GSM) has been cracked by a German researcher Karsten Nohl who presented his findings Sunday at a hacker conference in Berlin. So there is a reasonable cause for most users to worry as the security scheme used by 80 percent of the world’s cellular telephones has been compromised. Continue reading “Security for Mobile: It matters”

Green mobile phones: is it here to stay?

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. This blog provides an insight on few of the exciting offerings on green mobile phone technology and how companies are gearing to tend to this emerging urgency.

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. Continue reading “Green mobile phones: is it here to stay?”

How to analyze business case studies

There is no one best approach to analysis of an management case study. However, a number of general steps and guidelines can be followed to ensure better case analysis. Although the following steps are presented sequentially, it may be necessary during a specific case analysis to reorder or modify them, as they are intended to provide a general framework. Continue reading “How to analyze business case studies”