7 reasons why Apple’s I-Pad may fail.

Amidst a lot of hype as always, today 27th January, 2010, Apple launches the I-Pad. While it is being viewed as the product that will rejuvenate Apple’s revenues for years to come, a question many staunch Apple fans (and those who are not fans of course) will ask, is it really worth the hype? Apple has always created a market even when there is none. Will it be successful yet again this time?

Continue reading “7 reasons why Apple’s I-Pad may fail.”

Advertisements

How to tackle the problem of security breaches in call centers

Outsourcing is the mantra of the day. Today, many large MNCs, all across the globe, outsource activities like customer relationship management activities to cheap labor countries where English speaking skills are not a problem. A major concern in such outsourcing is the security in customer’s sensitive data.

Continue reading “How to tackle the problem of security breaches in call centers”

Google’s Nexus One vs Droid: A comparison of the current top two G-Phones

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010. Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones and the possible strategies behind their launches.

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010.¬† Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones. Continue reading “Google’s Nexus One vs Droid: A comparison of the current top two G-Phones”

Security for Mobile: It matters

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. Protect yourself from mobile security breaches without incurring huge expenses through 7 simple steps.

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. The cipher used by the General System for Mobile Communications (GSM) has been cracked by a German researcher Karsten Nohl who presented his findings Sunday at a hacker conference in Berlin. So there is a reasonable cause for most users to worry as the security scheme used by 80 percent of the world’s cellular telephones has been compromised. Continue reading “Security for Mobile: It matters”

Green mobile phones: is it here to stay?

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. This blog provides an insight on few of the exciting offerings on green mobile phone technology and how companies are gearing to tend to this emerging urgency.

A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. Continue reading “Green mobile phones: is it here to stay?”