5G: Customized services and apps at the edge
December 26, 2018 – 8:21 pm | No Comment

Services can be tailor-made for customers and delivered in real-time by placing all or most of the elements for service composition — such as VNFs, virtualized resources, microservices, management and orchestration software, a cloud-native infrastructure that includes the SaaS. IaaS, PaaS, and Cloud-RAN — in close proximity to customers at the edge.

Read the full story »
Business Technology Writing

Industry Dynamics, Competition, Value Proposition of emerging B2B technologies, Business Models for Emerging Technologies, Disruption, Use Cases, Solutions, Pain points, Narratives, Storytelling, Messaging

Content

White Papers, Blogs, Marketing Plans, Case Studies, Articles, Web content, Ghost writing, e-books, Social Media content, Technology Marketing content, Business of Technology, Industry Marketing.

Financial Writing

Economic Prospects, Economic Policy, Fiscal and Monetary Policy, Asset Allocation, Country Prospects, Global Investing, Emerging markets, Risk and Return, Corporate Finance, Equity, Debt, Real Estate, Derivatives, Hedge Funds, Capital and Credit Markets, Cryptocurrencies.

Emerging technologies and trends

Artificial Intelligence, Internet of Things, Computer Vision, Digital Transformation, Software-defined networks, Wearables, Heterogeneous Networks, Cloud computing, SaaS, PaaS, IaaS, Blockchains, 5G, Healthcare, Streaming Media

Predictions

Crystal ball, Foresight, Forecasting, projections, change, innovation, entrepreneurship, policy reform, futurology, leadership, vision, business cycle, Kondrateiv Wave,

Home » Archive by Tags

Articles tagged with: Cybercrime

Zeroing on Stuxnet-like cyber adversaries
January 20, 2019 – 11:00 pm | No Comment

Zero-day cyber threats leave very little footprint on their way to their targets. Inside of networks, they masquerade as trusted agents. To track them, an altogether different method is needed

Cyber-detectives chase cyber-criminals armed with Big Data
July 10, 2015 – 8:02 pm | One Comment

by Kishore Jethanandani
Cyber-security in enterprises is caught in a dangerous time warp—the long held assumption that invaluable information assets of companies can be cordoned off within a perimeter, protected by firewalls, no longer holds. The …