Serving up Artificial Intelligence on a Platter

Serving up Artificial Intelligence on a Platter

When a hungry customer walks into your restaurant, he never looks for a quick fill up , instead, he wants to take it all what’s there in your menu, enjoy his meal and have some interaction. In today’s world, owners of such restaurants make sure that they offer the best customer experience using their machine automated services. The restaurant industry has evolved along with technology to benefit both the customer and the owner. Restaurant businesses that are still to adapt to technological changes, are gradually creeping into the history books.

Read More

Megha Agarwal

May 25, 2017

Artificial Intelligence: A New Age of Personalization in Retail

Artificial Intelligence: A New Age of Personalization in Retail

From time to time, trade and commerce have evolved along with technology to benefit both the seller and the buyer. Eventually, the physical markets bustling with people are creeping into history books. All we need now is a digital device with internet connection, and what we want will be at our doorstep. In my previous blog, I have already explained how retailers enhance customer experience with effective personalization and how in the current times personalization in retail is of prime importance.

Read More

ACL Digital

May 19, 2017

How Retailers are Improving Customer Engagement with Digital In Store Experiences?

How Retailers are Improving Customer Engagement with Digital In Store Experiences?

Mike is a gym freak and is looking for a new pair of shoes for endurance training. He went through few of the models online which are best suited within his budget limits and then went to a nearby seller to buy one among those chosen models. The salesman understood the purpose of his purchase, and recommended him some more models which he already rejected previously. Now Mike starts to regret the idea of coming to store instead of buying it online. How many of you actually had the same in-store experience as Mike?

Read More

ACL Digital

May 11, 2017

Invisible Phishing Attack

Invisible Phishing Attack

Invisible phishing attack is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels. An Information Security researcher from China has reported about a phishing attack, which is almost impossible to detect. Most careful users on the internet are also tricked by Hackers.

Read More

Naresh Kumar B

May 03, 2017

Use Cases of Blockchain in IoT

Use Cases of Blockchain in IoT

IoT has been successfully proving itself in enterprises that has adopted it. Generally, all IoT devices even the nearby ones are connected to each other over the centralized internet. The diversity of ownership between cloud and IoT devices, brings complications in device to device communication. Hence a centralized network cannot guarantee complete interoperability.

Read More

Madhushree Bharati

April 26, 2017

DevOps – Just a Buzz or a Reality?

DevOps – Just a Buzz or a Reality?

In today’s marketplace race is for rapid product improvement on a continual basis to meet customer needs and respond quickly to market shifts. It is no longer acceptable to wait 12–18 months for a feature in the next release & this is putting tremendous pressure on traditional enterprise IT to innovate and release new software much more rapidly.

Read More

Pushkar Sadalagi

April 25, 2017

How Retailers Enhance Customer Experience with Effective Personalization?

How Retailers Enhance Customer Experience with Effective Personalization?

How many times have you done a purchase online? Have you wondered how different it would be for a retailer to sell their stuff on a digital platform when compared to having a physical shop? From setting up the store to the nuances in marketing strategies, you can find here the knack of selling a product online and how customer fulfilment is achieved through personalization. Okay, but before we see that, let’s do a reality check:

Read More

ACL Digital

April 20, 2017

SD-WAN and its Benefits

SD-WAN and its Benefits

SD-WAN is often confused with its close cousin- Software Defined Networking (SDN). SD-WAN is just focused on WAN, connecting multiple geographically dispersed locations belonging to a single organization (HQ, data centers, branches, remote user, et al) on a regional, national or global basis. Few common features of SD-WAN and SDN:

Read More

Nithin Babu

March 02, 2017

Deep Packet Inspection – A Data Insight

Deep Packet Inspection – A Data Insight

Deep Packet Inspection (DPI) is a technology that allows software/hardware to access, analyze and modify payload (data) portions of network packets. Traditionally network operations like filtering, routing, accounting were based on L3/L4 layer (Network/Transport Layer) headers of the packet. But with advancement in computing techniques, restricting the scope only to packet headers is not enough as actual data can provide much more information like application, service, the system being used and above all user’s preferences.

Read More

Vishal Kotalwar

March 02, 2017

Performance Tuning of VM by CPU Pinning

Performance Tuning of VM by CPU Pinning

Many VM operating parameters can be set to get maximum system performance for single or multiple VMs running on a KVM Host. Some VM operating parameters are configured on the KVM Host and can be modified at any time when the VM instance is running, while others are set on the VM and are only configured when the VM Instance is shut down. CPU pinning is one of the best solution to gain VM’s performance. Real-time applications have stringent requirements with respect to jitter, latency, quality of service and packet loss.

Read More

Sharanappa Banakara

February 28, 2017

Ransomware - A Crafty, Dangerous Cyber Threat

Ransomware - A Crafty, Dangerous Cyber Threat

Ransomware has been increasing at an alarming rate for over few years, and according to various sources it is estimated around $1 billion was made by cybercriminals. Today’s technology has given much sophistication to hackers in getting access to your files and are becoming financially rewarded for extortion.

Read More

Naresh Kumar B

February 28, 2017

What is Fog Computing and why?

What is Fog Computing and why?

Fog computing is also called as fogging which extends the cloud computing services to devices. It is a model where data processing can be done in the edges of networks instead of processing the entire data in cloud. Cloud computing has several advantages over few of its disadvantages like latency. Fog computing resolves this issue by reducing the amount of data going to be processed in the cloud or from the cloud.

Read More

Arif Nasim

February 28, 2017