Author: hughessystique

Two decades ago, a popular belief about the applications of AI was that AI would first emerge as a tool to replace humans in activities requiring manual labour- mechanically, followed... Read More

Enterprises across the globe are aware that cybercriminals do not follow standard working hours to strike an attack on a company’s cyber assets. They are known to act swiftly on... Read More

Test tool selection largely depends on the technology that the AUT is built on. A specific test tool might be pretty popular in its own space but might fail to... Read More

Most of the security protocols today employ a combination of symmetric key encryption and asymmetric key encryption. Asymmetric key algorithms are computationally expensive but provide ease of use since their... Read More

A smart city employs information and communication technology (ICT) to boost operational efficiency, make info accessible to the public, and improve public services and citizen welfare. Its purpose is to... Read More

Improving and securing the experience of connecting to a public Wi-Fi hotspot has been one of the biggest challenges that the Wi-Fi industry is trying to tackle. As per Cisco... Read More

The Covid-19 pandemic has forced retailers across the world to reassess their business models fundamentally. Digital Transformation in the retail sector is moving forward at a previously unknown pace, helping... Read More

Most of the security protocols today employ a combination of symmetric key encryption and asymmetric key encryption. Asymmetric key algorithms are computationally expensive but provide ease of use since their... Read More