BM and Google Join Forces, Invest $150 Million in Quantum Computing Research at US and Japanese Universities
IBM and Google have announced a joint effort to advance quantum computing research by providing a total of $150 million in funding to two prestigious universities in the United States and Japan, according to the Wall Street Journal. The move is aimed at maintaining a competitive edge against China in the race for quantum computing supremacy.

Unmanned Aerial Vehicle (UAV)-Based Solutions for 5G and Beyond
Enhancing the reliability of wireless communication networks is critical in emergency situations, important communication missions, freight, and agriculture to make systems autonomous while keeping a high level of energy efficiency. Therefore, the use of unmanned aerial vehicles (UAVs), commonly known as drones, has increasingly been the subject of research over the past few years, owing to their autonomy, flexibility, and broad range of applications.Indeed, UAVs have been considered for various applications, including military, surveillance and monitoring, telecommunications, delivery of medical supplies, and rescue operations. The use of UAVs is ever increasing, and some reports suggest that more than 29 million UAVs are expected to be put into use in 2021.

Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing. Microsoft has
Microsoft has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim’s network to further propagate spam emails and widen the in

Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware A new malwar
A new malware campaign has been observed using sensitive information stolen from a bank as a lure in phishing emails to drop a remote access trojan called BitRAT. The unknown adversary is believed to

Google Created ‘Open Source Maintenance Crew’ to Help Secure Critical Projects Google on Thursday a
Google on Thursday announced the creation of a new “Open Source Maintenance Crew” to focus on bolstering the security of critical open source projects. Additionally, the tech giant pointed out Open S

Google Removes “App Permissions” List from Play Store for New “Data Safety” Section Following the l
Following the launch of a new “Data safety” section for the Android app on the Play Store, Google appears to be readying to remove the app permissions list from both the mobile app and the web. The c

GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom. GitHub on Monda
GitHub on Monday disclosed that unknown threat actors managed to exfiltrate encrypted code signing certificates pertaining to some versions of GitHub Desktop for Mac and Atom apps. As a result, the c

Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups Google’s Threat Analysis
Google’s Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated by hack-for-hire groups from India, Russia, and the U.A.E. In a manner analog

APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector Microsoft’s decision to blo
Microsoft’s decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent

Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan. The notorious An
The notorious Android banking trojan known as SharkBot has once again made an appearance on the Google Play Store by masquerading as antivirus and cleaner apps. “This new dropper doesn’t rely on Acce

Aeris Communications to acquire IoT business from Ericsso. Ericsson’s IoT accelerator and connected
Aeris Communications to acquire IoT business from Ericsso Posted bympritam2k12December 8, 2022Posted inUncategorized

Apple Releases iPhone and iPad Updates to Patch HomeKit DoS Vulnerability Apple on Wednesday rolled
Apple Releases iPhone and iPad Updates to Patch HomeKit DoS Vulnerability Posted bympritam2k12January 13, 2022Posted inUncategorized Apple on Wednesday rolled out software updates for iOS and iPadOS

A CISO’s Ultimate Security Validation Checklist If you’re heading out of the office on a well-deser
A CISO’s Ultimate Security Validation Checklist Posted bympritam2k12August 30, 2022Posted inUncategorized If you’re heading out of the office on a well-deserved vacation, are you certain the securit

ADVANCING YOUR HYBRID CLOUD EXPERIENCE Dear Delegate, The HPE Greenlake edge-to-cloud platform is p
The Park, 17, Mother Teresa Sarani Taltala, Kolkata, West Bengal – 700016
ADVANCING YOUR HYBRID CLOUD EXPERIENCE Posted bympritam2k12September 8, 2022Posted inEvent

“Follina”- Zero-day vulnerability in Microsoft Office
A serious vulnerability has been found in Microsoft Windows, the most-used operating system for computers around the world, which could be exploited by a simple MS Word document. The vulnerability, wh

How Does 5G Technology Enhance The IoT
How Does 5G Technology Enhance The IoT 5G technology enhances the IoT by providing faster data speeds and lower latency. The Internet of Things (IoT) is a system of interconnected devices and sensors

"Follina"-Zero-day Vulnerability in microsoft office.
A serious vulnerability has been found in Microsoft Windows, the most-used operating system for computers around the world, which could be exploited by a simple MS Word document. The vulnerability, wh

Events That Motivate Us

Frequently Asks Questions

  1. We provide IT Infra Solutions to meet end customers requirements.
  2. We do work on Cloud & OnPrem services for our customers.
  3. We also provide service with our expertise team for Research Lab Setup in IITs and NITs
  4. We do provide Corporate Training on customised Human Resource skill development programs of our customers.
  1. Ans. System Integrator must find a balance and ensure that the integration solution is not just about meeting the functional requirements of today, but also potential future and non-functional requirements such as performance, scalability, re-usability, and maintenance.
  1. Integrating your business systems enables a holistic view of your customers, your data, and your organizational health.
  2. It creates a better customer experience and improves your internal workflow.
  3. When done – and done right – you’ll be more efficient, productive, and profitability.

Ans. Reduced adaptability and flexibility. Point to point integrations create significant dependencies between systems and the systems data formats and lead to tightly coupled system. P2P integrations create a “Spaghetti” Architecture” that makes adaptations or changes to the application landscape painful and costly.

  1. Ans. Yes, we provide network integration service including network management, network design, network planning, network optimization, network troubleshooting.
  1. Yes, we have implemented one of the largest Microsoft cloud infrastructures in Easter India..
  2. We also provide AWS services. We are first ‘Amazone Web Services’ partner from Eastern India to provide SAP HANA infrastructure.
  3. -->