List Headline Image
Updated by Tech Mahindra on Dec 21, 2014
Headline for Top 5 Blogs of 2014 at Tech Mahindra
 REPORT
5 items   2 followers   0 votes   4 views

Top 5 Blogs of 2014 at Tech Mahindra

Here is a list of Top performing blogs in 2014 at the Tech Mahindra Website

Need for Network Function Virtualization (NFV)

In today's world, the network of telecommunication is distributed from the communication provider's premises to customer premises in the form of physical proprietary hardware equipment. The time to market for new service is high due to logistics (such as space and energy) arrangement, dependency on commissioning, deploying and configuring new equipment.

Types of Access Control Mechanisms

Types of Access Control Mechanisms Many of us have come across the terms like MAC, DAC, RBAC, ACLs while reading various e-security related articles. However not all of us (except the CISSPs) know the meanings of these terms and the differences between these Access Control mechanisms. Before proceeding to Access Control mechanisms, let's see what Access Control is.

A House for Rs 20,000!

Recently, while thumbing through a back issue of Harvard Business Review from Jan 2011, I came across an article that made me stop and take a deep breath. "Yesssss! This is exactly the kind of thing we need- the kind of thing the newly emerging 'Common Man Party' and such like must focus on!"

Strategic Trends in Information Technology: 2014

In this hyper connected world, enterprises realize that the traditional business processes fail to meet the needs of digital natives and also fail to leverage the power of Internet of Things (IOT). Enterprises operating in high Process and Services verticals like Telecommunications, Retail Banking, Property & Causality Insurance etc., need to invest on digitizing their business processes.

The Data Metaphor - Birth and Death of Data

Working in Data Services day in and day out, and talking to many customers and stakeholders about their 'ambitions' has struck me with a new metaphor that we can liken Data to. Its simple - The lifecycle of Data seems a lot like that of human beings! Let me elaborate.