Type to SearchView Tags
Technology | Engineering R&D

Category blogs - Featured

Blog Category Listing

covid-19
164
The new paradigm of health care – Proactive and Preventive health care is the new paradigm. The proliferation of consumer devices - smartphones, smartwatches, fit bits, handheld devices are changing the health care industry. One of the significant...
Artificial Neural Network, Neural Architecture Search
173
Normal machine learning or deep learning applications with human intervention in feature selection provides a maximum accuracy of 70% or 80% for computer vision or big datasets. This is mainly due to poor feature selection, because of which the size...
Artificial Neural Network, Neural Architecture Search
156
Artificial neural network (ANN) is hot topic of research now, as there is no guarantee that a specific ANN model will give good accuracy for a problem. So, we need an appropriate architecture for neural system instead of repeated trial and error...
Oauth2.0 – Token based Authorization
183
Oauth 2.0 (Open authorization), is an approval to grant/delegate access. It is meant for a service to authorize another service with more security. It is a token-based authorization where authorization code and access token is generated to access...
A non-invasive approach for early diagnosis of retinal diseases
107
This blog proposes a non-invasive electrophysiology test for early diagnosis of retinal disorders, its procedure and advantages. This blog presents an overview of how retina functions, retinal disorders, some of the existing methodologies for...
Keycloak Multitenancy
2,076

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
The Key to Successful Should Costing Fact Based Supplier Negotiations
166
People settle differences through a common method called Negotiation. It is a process by which agreement or compromise is reached thereby avoiding argument and dispute. When there is commitment to the contract with coverage of all aspects mutually...
Building a Future-Proof  Fibre Network with HCL - Part 2
139
The Communication Service provider landscape is preparing itself for digital transformation. As more and more devices, people, and things connect, the demands for fast, reliable connections continue to increase. To unleash value creation, new...
Approach of using managed under unmanaged environment
165
In Automation testing, setup will have its own tool to test the software quality based on software requirements. While creating this automation tool, if the tool run and developed in high level programming environment ( like C#, .Net, etc ) then it...
Industry 4.0 with Computer Vision
159

Aug 31, 2021

Industry 4.0 with Computer Vision

Navin Saini Group Technical Manager

Industry 4.0 is gaining a lot of steam in recent years as new technologies evolve to help in automation. A lot of industrial companies are getting familiar with terms like IoT, Digital Twin, Computer vision & AI. This trend is a clear indication...
Can ML help to improve Cybersecurity
50

Sep 21, 2021

Can ML help to improve Cybersecurity

Yadav Pawan Jiyalal Senior Software Engineer

This blog creates awareness about how one can use Machine learning algorithms in the field of cybersecurity. In 2018 alone, there were 10.5 billion malware attacks, whereas, in 2019 and 2020, there were 9.9 and 5.6 billion malware attacks,...
Ideation
1,759

Nov 02, 2017

Ideation Techniques- Part 2

Sanjeev Purohit Group Manager

In continuation of the previous blog Promoting and Nurturing Innovation and part 1 of ideation techniques we will go through other advance techniques like SCAMPER, Mind Map, Reverse thinking for idea generation. 
RISC-V is here to Stay!!
210

Aug 18, 2021

RISC-V is here to Stay!!

Sheema Sreedharan Senior Area Sales Director

RISC-V is an open-source ISA developed by the University of California, Berkeley almost 11 years ago. Though the growth has been slow in its early years, it has picked up adoption and has had greater visibility in recent years. The shift of general...
Containers and Virtual Machines – Essential to 5G
452
To reap benefit of 5G, networks need to be more flexible and agile and containers are the key as they will provide improved efficiency as well as reduced cost. However, every operator will evolve at its own pace and will have its own cloud...
Multihoming
2,095

Apr 15, 2016

What is Multihoming?

Jayaramakrishnan Sundararaj Technical Manager

How to make a light, cheap solar powered car
4,848

Feb 04, 2015

How to develop a light-weight, cost-effective solar powered car

Sushant Kumar Member Technical Staff, Engineering And R&D Services

Through this blog, I would like to propose a basic idea for designing and developing a light-weight, cost-effective single seater solar car, and also discuss the various technologies involved  in this project, which  offers great scope f
Collaboration at Telco Edge
242

Jun 11, 2021

Collaboration at Telco Edge

Anchal Sardana Associate General Manager

The promise of stringent low latency use cases in 5G can be only fulfilled by MEC. It’s an enabler in 5G to provide an enhanced customer experience and plays a crucial role in making new age digital services like autonomous car, AR/VR gaming, drone...
Oauth2.0 – Token based Authorization
183
Oauth 2.0 (Open authorization), is an approval to grant/delegate access. It is meant for a service to authorize another service with more security. It is a token-based authorization where authorization code and access token is generated to access...

Smart Cities Can Improve The Quality Of Urban Life
GH Rao - Ex-President - Engineering and R&D Services (ERS) | January 30, 2015
4392 Views

Integrating Devices and adopting technology planning in our Infrastructure will give rise to smart cities with a better quality life

Yadav Pawan Jiyalal

Can ML help to improve Cybersecurity
Yadav Pawan Jiyalal - Senior Software Engineer | September 21, 2021
50 Views

This blog creates awareness about how one can use Machine learning algorithms in the field of cybersecurity. In 2018 alone, there were 10.5 billion malware attacks, whereas, in 2019 and 2020, there were 9.9 and 5.6 billion malware attacks, respectively. This is too much volume for a human to handle, and here come the applications of machine learning.


navins

Industry 4.0 with Computer Vision
Navin Saini - Group Technical Manager | August 31, 2021
159 Views

Industry 4.0 is gaining a lot of steam in recent years as new technologies evolve to help in automation. A lot of industrial companies are getting familiar with terms like IoT, Digital Twin, Computer vision & AI. This trend is a clear indication of upward growth in the automation of production plants. Computer vision is a critical component in this automation. There are various types of cameras that can provide visual information to help in the automation journey. These images go way beyond by providing information that is not even visible to human eyes.