Acer has announced it will soon enter the smart TV space in India under a licensing agreement with Bengaluru-based Indkal Technologies. Acer, which is famous for its computer hardware and accessories, has not shared the exact details of the deal. The company has also not revealed much about its upcoming smart TV series except that
0 Comments
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of “exceptionally risky” cybersecurity practices that could expose critical infrastructure as well as government and the private sector entities to devastating cyberattacks. Single-factor authentication is a method of signing in users to websites and remote systems by using
0 Comments
Zoom posted its first billion-dollar revenue quarter but signaled a faster-than-expected easing in demand for its video-conferencing service after a pandemic-driven boom, sending its shares tumbling 11 percent. The company on Monday forecast third-quarter revenue between $1.015 billion (roughly Rs. 7,415 crores) and $1.020 billion (roughly Rs. 7,450 crores), compared with the analysts’ average estimate of
0 Comments
Sea’s Shopee took just two years to become Brazil’s most-downloaded shopping app, winning users to its low-cost marketplace with its game-changing approach to e-commerce: in-app mini-games offering coupons to winning users. The Singapore-based company has combined online shopping with the gaming nous of its separate mobile game arm Garena – creator of Free Fire, Brazil’s
0 Comments
How open API standards will transform financial services Open standards will have a huge impact on driving innovation in banking. Learn the status in the U.S. – and the bold new opportunities open standards are set to usher in. Register here The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register
0 Comments
Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the de-facto protocol for email transfer, SMTP, is nearly 40 years old now), and therefore security was not an important consideration. As a result, in most email
0 Comments