It is becoming vital for enterprises to gain threat intelligence from the widest possible range of sources to adapt proactively to the ever-changing security environment. Targeted attacks, advanced persistent threats (APTs), zero days and botnet activities are difficult to discover – you must look outside your company networks.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]