Source: financialexpress.com Terrorists from across the borders entering India are often exploiting weaknesses in border infrastructure and use technology and cyberspace to create technology to propagate their thinking.crimes. And are continuously supported from beyond the Indian borders, primarily misusing modern technology for funding or Command and Control purposes. Prevention of violent extremism in India is Read More
Tag: Digital Database
Source:-telegraphindia.com I am a miner who has to delve deep for precious stuff. But I don’t need massive drilling machines or gigantic trucks for mining — just some smart software, lots patience and some intellect. I try to find patterns while mining for data in an ocean of database, which helps companies take important business Read More