FORGOT YOUR DETAILS?

Global Themes and Featured Topics

We are living in the rapid changing world. Where the world change at the speed of light, but existing solutions and product may not even had the right word and definition to sum them what yet. So, we grouping those global themes and trending topic in this section.

Global

Themes

For incident to series of event that share the common theme across the globe.

Technology

Update

Latest technology breakthrough that set the coming standards.

Market

Dynamics

Changing in the industries practice that shaping the future world.

Feature

Content

Special develop content based on changing practice.

Benefits of Service Mesh

Service mesh is not something new of it capability, but rather a transformation in where it capability is located. Today we will discuss about the Benefits of Service Mesh. A service mesh goals to make service-to-service calls within a microservice architecture dependable, fast and protected. Services mesh which it goals to resolve many difficulties that
Tagged under:

What is Smart Space?

What is smart space? Smart space is new and modern technology term refer an infrastructure for application that create and provide to form and to give value-added services based on cooperative activity of environment participants, regardless human or machines. All devices for example like a display, a mouse, a keyboard or a disk drive, consist
Tagged under:
Introduction to Deep Learning Security

What is Transfer Learning?

What is Transfer Learning? As human we know and practice related knowledge from past learning and using it to the new one. The more related our previous knowledge with the new job, the easier we can become proficient. The idea is same with Transfer Learning which knowledge learned in one or more source tasks is
Tagged under:

System At Risk In Computer Network

We discuss some of the system at risk in computer network toward individuals, businesses, industries and governments, under the context of Computer Network Defense (CND). Computer network attacks can take in many forms, including mission critical server and system compromises, information theft (from inside intruder or external hacker) and denial-of-service (DoS) attacks designed to rattle
World keep changing at the fast speed. Few years on the road, once upon a time a successful entrepreneur who discovered the need for rising need for dedicated web application security testing (AST) tool and differentiate it with generic network vulnerability scanner at that time create a new product genre never existed before. The first
TechQuilibrium (a portmanteau of technology and equilibrium) is a balance between tradition and transformation. Each organization has its own techquilibrium depending on its industry, geography, target demographics, history, business goals, etc. All the top executive management teams need to design a value proposition that drives the right mix of traditional and digital business. It can

Service Mesh: How Does It Work

Last article we already talked about the basic about service mesh. So now we’re going to discuss about Service Mesh: How Does It Work? A service mesh doesn’t have new functions or capabilities to an app’s run time environment. Apps in any design have always needed guidelines to specify how requests get from point A
Tagged under:
Today I driving and hear from the radio news broadcasting. One news caught my mind, it about a single world largest “money printing” and monopoly business that right now serving countries as customer and help for printing money it log for the potential bankruptcy to all investor if they current restructuring program is not working.
Tagged under:
TOP