Opening Science In A Data-Driven World
Olivier Verscheur...
20 July, 2018
Hacking Innovation
Josh Linkner
14 July, 2018
IPv6 - Observations From The Lab, Field & Executive Suite
Joe Klein
13 July, 2018
Computer Ethics and Security
Siti Hajar Othman...
12 July, 2018
Cryptorobotics Future Logics
10 July, 2018
Industrial-Grade DevOps
Frank Buschmann, ...
09 July, 2018
How New IT solutions Make it More Convenient for Depositors?
07 July, 2018
Deploying the SRX Series for Enterprise Security
Juniper Networks,...
06 July, 2018
weSRCH App on Apple
Make It Real

Make It Real

CloudIQ is a no cost cloud-native application that

Dell Technologies...
04 July, 2018
NAZA  An open architecture for distributed controls
L. Saludjian
01 July, 2018
Cyber Security: Dangerous Games
Robert Hannigan, ...
30 June, 2018
Reverse Supply Chain Implications In Semiconductor E-Scrap Management, Intellectual Property Protection, Anti-Counterfeit Measures, And Environmental Stewardship
Reg Parker
29 June, 2018
Blockchain Technologies: A Tutorial for Engineering Faculty and Researchers
Nitin Kale, Bhask...
17 June, 2018
Zero Trust Security with Software-Defined Secure Networks
Srinivas Nimmagad...
14 June, 2018
Cloud Workspace, Smart FusionAccess
Huawei Technologi...
12 June, 2018
The security issues on IdM systems within convergence networks
Yuri Kargapolov
29 May, 2018
The advantages of digitalization for the glass industry
Philippe Mary
28 May, 2018
Flow Measurement
Pavel Minarik
25 May, 2018
Cyber attacks in local authorities How the quest for big data is threatening cyber security
Big Brother Watch...
21 May, 2018
Cybersecurity Trends 2018: The Cost of Our Connected World
David Harley, Ste...
18 May, 2018