Quantcast
Channel: Software - Tech Wire Asia
Browsing all 152 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Installing a Beta OS is trickier than you think. Here’s why.

Installing a beta on your phone, laptop, or tablet isn’t risk-free. One may risk losing all data by installing a beta version of an OS. Beta refers to the phase in software development between the...

View Article



Image may be NSFW.
Clik here to view.

How Landlords and Tenants Win with Smart Commercial Office Spaces

Despite the general acceptance of a hybrid working pattern for many roles, the value of working collaboratively in the same space remains indisputable for many teams. There is so much detail of...

View Article

Image may be NSFW.
Clik here to view.

Low-code automation rides high as a competitive advantage

Automation is rising as a competitive advantage in the financial services industry. A recent global survey by Longitude, commissioned by low-code workflow platform Appian, found that 63% of financial...

View Article

Image may be NSFW.
Clik here to view.

Delve into digital tech explosion at ROKLive Southeast Asia 2021

Smart manufacturing isn’t just a competitive advantage; it’s the engine of business resiliency now and going into the future. It’s not just one part of the line; it encompasses the whole plant – its...

View Article

Image may be NSFW.
Clik here to view.

How secure and efficient payment solutions are helping businesses take...

All the world’s a market, and merchants and clients are merely players; they have their bills and payments and their preferences to collect and pay. If Shakespeare were alive now, he’d be selling his...

View Article


Image may be NSFW.
Clik here to view.

Facebook’s VR remote work app is a step closer to the metaverse

Horizon Workrooms is Facebook’s first major step toward Mark Zuckerberg’s envisioned metaverse, an all-encompassing alternate reality that blends the real world with digital imaginations and...

View Article

Image may be NSFW.
Clik here to view.

Nasuni: The time to retire the on-premise NAS has arrived

Technology professionals need no lectures as to the increasing amounts of data collected and shared by the enterprise. For several decades, they have been tasked with providing, storing, maintaining,...

View Article

Image may be NSFW.
Clik here to view.

The SaaS industry is the next big thing in India – here’s why

A number of analysts highly believe Indian companies are set to double their share in the global SaaS market in the coming years. A study even showed India’s SaaS industry could reach US$1 trillion in...

View Article


Image may be NSFW.
Clik here to view.

Tech debt drag: Seek, fix and nix it

Sometimes compromises are made in a rush to meet deadlines. Launch the app first and get back to the technical polish later. But later never comes as work keeps piling up. Eventually, even minor cracks...

View Article


Image may be NSFW.
Clik here to view.

Enacting Zero-Trust: a Practical Guide

As the traditional perimeter-based cybersecurity model disintegrates, “trust is a vulnerability” is rapidly becoming the cornerstone of security policy in 2021. The strict auspices of zero-trust...

View Article

Image may be NSFW.
Clik here to view.

Fostering Innovation with a Kubernetes Platform

Hybrid and multi-cloud are now the established order in the tech world. According to SUSE’s recently commissioned Insight Avenue report, Why Today’s IT Leaders are Choosing Open,  more than 800 IT...

View Article

Image may be NSFW.
Clik here to view.

The conversation, work-life balance and more: post-pandemic HR in discussion

Last year, businesses were thrown into survival mode, doing their best to respond to the pandemic. This year is all about being proactive and shaping the industry to thrive. Last year, it was about...

View Article

Better data analysis for better decision making

Data is a natural resource. Its potential must be harnessed carefully from its collection and management to its analysis and insights. In this digital frontier, Statista projected the global data...

View Article


Image may be NSFW.
Clik here to view.

Do away with passwords — multifactor authentication is your best bet now

Compromised user credentials remain the primary root cause of 80% of all data breaches. This is all the more true considering the recent ransomware attack on Colonial Pipeline where it was found that a...

View Article

Image may be NSFW.
Clik here to view.

3-2-1-1: Arcserve expands the backup recovery rule

There’s a ransomware attack on businesses every 11 seconds. The malware infects devices and holds the data inside hostage unless the users pay the ransom demanded by the cybercriminals. The damage is...

View Article


Image may be NSFW.
Clik here to view.

Don’t just meet up. Show Up. The BlueJeans Meeting difference

Video conferencing has become part of everyday life. When social distancing measures were applied worldwide, people were encouraged to stay home as much as possible. However, work and life had to go on...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity talk is necessary to fortify businesses from attacks

Ignorance is bliss for cybercriminals. What you don’t know means you won’t do anything about it. That’s precisely what the criminals are banking on. And who do organisations blame when they fall...

View Article


Image may be NSFW.
Clik here to view.

Staying Out of the Firing Line: Cybersecurity Measures in Practise

Any cybersecurity expert who claims they’ve never clicked a rogue email link or two during their career is, to put it mildly, being economical with the truth. Every user of internet-connected...

View Article

Image may be NSFW.
Clik here to view.

Verify the sender, check the recipient: the DMARC piece of the cybersecurity...

Keeping one’s business safe from cyberattacks can be a challenge, but you can mitigate many risks by taking a layered approach to security. The purpose of a layered security framework is to ensure that...

View Article

Cloud-first or changing hybrid? The cybersecurity platform that adapts

The landscape for cybersecurity teams has altered inextricably as companies gradually use more cloud-based services, be they PaaS/IaaS or full standalone remote services. Instead of perimeter-based and...

View Article
Browsing all 152 articles
Browse latest View live


Latest Images