Feature Article Archives » Page 53 of 97 » Electronicsmedia

Feature Article

CoolSiC

CoolSiC – Schottky diodes based on silicon carbide

Silicon carbide is considered to be among materials that could revolutionise electronics and power engineering. Compared to silicon, it provides a larger band gap...
Mr. Ashish Gulati, Country Head, Telit India

IoT trends in 2018

Many technology trends of 2017 would begin to take greater shape in 2018, which also includes Internet of Things (IoT).  With IoT products gaining...

How AI Finds Big Value in Big Data

Bots can augment human interaction, create greater business efficiencies, and remove friction from customer interactions. It’s a market that has already rolled up $24 billion in funding for...
smartphones_AI

10 Uses for Artificial Intelligence-Powered Smartphones

Artificial intelligence (AI) features will become a critical product differentiator for smartphone vendors that will help them to acquire new customers while retaining current users, according to...

Vulnerability Management: A guide for buyer

Exploiting weaknesses in browsers, operating systems, and other third-party software to infect end user systems is a common initial step for security attacks and...
cybersecurity

Indian INCs Look at Investment in Security Big Time in 2018

2017 will undoubtedly be considered as ‘Year of ransomware’, the year when the global security landscape was forever changed by attacks like WannaCry and...
cloud-security

DATA SECURITY IN THE CLOUD

It has not yet reached epic proportions, but the number of organizations adopting cloud-based technologies is growing dramatically. Organizations of all sizes...

Control Strategies used in Artificial Intelligence to reach the solution

Control Strategy in Artificial Intelligence scenario is a technique or strategy, tells us about which rule has to be applied next while searching for...
Model of Conventional Crypto System

What is the Conventional Encryption Model?

Symmetric encryption is also referred to as conventional encryption or single-key encryption. It was the only type of encryption in use prior to the...
Application of Genetic Algorithm

Applications of Genetic Algorithm

The Key of the success in Genetic Algorithm applications are effective GA representation and meaningful fitness evaluation. The demand of Genetic Algorithm comes from...

Interview