SlideShare a Scribd company logo
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
Our Inspiration From
Jeff BezosCONTENTS
“I knew that if I failed I wouldn’t regret that, but I
knew the one thing I might regret is not trying.”
Tip: For latest posts relating to schools and education please
make a visit to Chalo Facebook page @
https://www.facebook.com/Chalo-School-1339162339445839/
NAC Jewellers Opens New Showroom @ Old
Washermanpet!
Recently our associates NAC Jewellers opened their new showroom at Old
Washermanpet. The event was marked with a grand gala ceremony and
attended by many celebrities.
A picture of NAC Jewellers New Showroom at Old Washermanpet.
We wish NAC Jewellers a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Style One winsRetail Icon Award 2016!
One of our associates Style One was awarded Winner of “Best Family Store
– Retail Icon Awards” for the consecutive year in Chennai. The grant event
was organised by Times Group of India was attended by many dignitaries.
In the above picture Vinod Sharma and Prakash Sharma –
Managing Directors of Style One are seen receiving the award.
We wish Style One to win many such awards in the future!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Theni Anantham @ Dindigul!
Recently our associates Theni Anantham opened their new showroom at
Dindigul with a grand inauguration ceremony.
Few pictures from inauguration function…
Our Mr. Balamurugan, Director – ITIS and Mr. KC. Sivakumar Sr. IT Consultant,
presenting the bouquet to Mr. Dharmaraj, Managing Director of Theni
Anantham Textiles at the occasion of their new showroom inauguration
We wish Theni Anantham a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Magalakshmi Group @ Namakkal!
Our associates Magalakshmi Group (of Villupuram fame) inaugurated their
new Hypermart at Namakkal. Below are few pictures taken during this
auspicious event…
Few pictures from inauguration function…
Magalakshmi Group Directors - Mr. K. Ramesh, Mr. Venkatesh and
Mr.Rajesh, honouring our Sr. IT Consultant Mr. KC. Sivakumar and Team
for giving their unconditional support.
We wish Magalakshmi Group a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Bridge i2i Inaugurates New Office
at Bangalore!
Bridgei2i Analytics, our associates shifted their operations to a new
location at Bangalore. Inspace Team were actively involved in the process.
Few snaps taken at the new office location...
Few pictures from inauguration function…
Our Business Head Mr. Rajavel at the new Bridge i2i Office during the occasion
We wish Bridgei2i a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Inspace Team celebrated its 13th Anniversary during on 11th October. To
mark this grand event, the staff members celebrated the coinciding
Ayudha Pooja with family and friends.
Few photos taken during the event…
In the above picture the winner of traditional dress competition
Mr. RG Kannan receiving the gift from our CFO Mr. Sumant Mehrish
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
INBOX
WELCOME TO THE CLUB…
Recently Inspace secured few prestigious client and added them to their
esteemed list of clientele. Some of them are,
- Chennai
- Ambasamudram
- Chennai
- Chennai
- Chennai
- Chennai
- Chennai
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS
Welcome back to another edition of our BAIT Series, which aims primarily to
align business with technology. This month we would discuss on the
importance of IT Security…
IT Security also known as Computer security or cyber security, as the
Wikipedia defines it, is the protection of information systems from theft or
damage to the hardware, the software, and to the information on them, as
well as from disruption or misdirection of the services they are designed to
provide.
It includes protecting against harm that may come via network access, data
and code injection, and due to malpractice by operators, whether
intentional, accidental, or due to them being tricked into deviating from
secure procedures. As everyone may agree, this field is of growing
importance due to the increasing reliance on computer systems and the
Internet in most societies, wireless networks such as Bluetooth and Wi-Fi -
and recently due to the growth of "smart" devices, including smart phones,
televisions and tiny devices as part of the Internet of Things.
.
.
Business Aligned IT (BAIT Series 18)
By Samuel Raj Anbudaiyan (Technology Auditor)
IMPORTANCE OF IT SECURITY!
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 17)
By Samuel Raj Anbudaiyan (Technology Auditor)
To understand the importance of IT Security it is essential to gain
knowledge on how vulnerable is a system susceptibility or flaw. Many
vulnerabilities are documented in the Common Vulnerabilities and
Exposures database.A hacker can exploit a vulnerability and may cause
harm to the IT assets. Thus to secure a computer system, it is important
to understand the attacks that can be made against it, and these threats
can typically be classified into one of the categories below:
 Backdoors
 Denial-of-service attack
 Direct-access attacks
 Eavesdropping
 Spoofing
 Tampering
 Privilege escalation
 Phishing
 Click jacking
 Social engineering
Thus we find that Computer security is critical in almost any industry
which uses computers. Currently, most electronic devices such as
computers, laptops and cellphones come with built in firewall security
software, but despite this, computers are not 100 percent accurate and
dependable to protect data. There are many different ways of hacking
into computers. It can be done through a network system, clicking into
unknown links, connecting to unfamiliar Wi-Fi, downloading software
and files from unsafe sites, power consumption, electromagnetic
radiation waves, and many more. However, computers can be protected
through well-built software and hardware. By having strong internal
interactions of properties, software complexity can prevent software
crash and security failure.
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 17)
By Samuel Raj Anbudaiyan (Technology Auditor)
In the recent times, IT Security is not the prerogative of IT Team alone,
but rather the all computer users become part of the security
environment and thus contribute towards an effective security. Thus it
is essential that all such critical users are trained in basic security
concerns by creating awareness of the security risks involved in their
operations. The user must be informed that he or she is responsible in
containing the security threat and thus help securing the environment.
In this regard Computer Security protection becomes essential. In
computer or IT security a countermeasure is an action, device,
procedure, or technique that reduces a threat, a vulnerability, or an
attack by eliminating or preventing it, by minimizing the harm it can
cause, or by discovering and reporting it so that corrective action can
be taken. One such measure is to conduct a thorough IT Security Audit.
Inspace Security team is actively involved in conducting in-depth IT
Security Audits. Please call us to know more and how Inspace’s Team
can identify such security threats and thus help mitigate them.
LOL!
Lets relax…
CONTENTS
Get in touch with us! All are encouraged to contribute towards the contents
of this newsletter. Please reach out to Editor’s Desk @
newsletter@inspacetech.com
(This newsletter is for private circulation only. The Editorial committee
reserves the right to publish contributed contents).
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!

More Related Content

Similar to Newsletter connect - Sep 2016

Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
Arish Roy
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
Arish Roy
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
Arish Roy
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
Arish Roy
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
Arish Roy
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
RES
 
Inspace Connect
Inspace ConnectInspace Connect
Inspace Connect
Arish Roy
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security Environments
Joe McCray
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
Robert Baldi
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
Arish Roy
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
Terry Gilsenan
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 

Similar to Newsletter connect - Sep 2016 (20)

Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Inspace Connect
Inspace ConnectInspace Connect
Inspace Connect
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security Environments
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 

More from Arish Roy

Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
Arish Roy
 
Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
Arish Roy
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
Arish Roy
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
Arish Roy
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
Arish Roy
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
Arish Roy
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
Arish Roy
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
Arish Roy
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
Arish Roy
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
Arish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
Arish Roy
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Inspace Corporate Presentation
Inspace Corporate Presentation  Inspace Corporate Presentation
Inspace Corporate Presentation
Arish Roy
 
Technology audit
Technology auditTechnology audit
Technology audit
Arish Roy
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentation
Arish Roy
 

More from Arish Roy (19)

Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 
Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Inspace Corporate Presentation
Inspace Corporate Presentation  Inspace Corporate Presentation
Inspace Corporate Presentation
 
Technology audit
Technology auditTechnology audit
Technology audit
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentation
 

Recently uploaded

It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
alexjohnson7307
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
bellared2
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
Zilliz
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
softsuave
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
KIRAN KV
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
Arpan Buwa
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
ZachWylie3
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
BrainSell Technologies
 

Recently uploaded (20)

It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
 

Newsletter connect - Sep 2016

  • 1. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! Our Inspiration From Jeff BezosCONTENTS “I knew that if I failed I wouldn’t regret that, but I knew the one thing I might regret is not trying.” Tip: For latest posts relating to schools and education please make a visit to Chalo Facebook page @ https://www.facebook.com/Chalo-School-1339162339445839/
  • 2. NAC Jewellers Opens New Showroom @ Old Washermanpet! Recently our associates NAC Jewellers opened their new showroom at Old Washermanpet. The event was marked with a grand gala ceremony and attended by many celebrities. A picture of NAC Jewellers New Showroom at Old Washermanpet. We wish NAC Jewellers a grand success in their endeavour! CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS...
  • 3. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Style One winsRetail Icon Award 2016! One of our associates Style One was awarded Winner of “Best Family Store – Retail Icon Awards” for the consecutive year in Chennai. The grant event was organised by Times Group of India was attended by many dignitaries. In the above picture Vinod Sharma and Prakash Sharma – Managing Directors of Style One are seen receiving the award. We wish Style One to win many such awards in the future!
  • 4. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Theni Anantham @ Dindigul! Recently our associates Theni Anantham opened their new showroom at Dindigul with a grand inauguration ceremony. Few pictures from inauguration function… Our Mr. Balamurugan, Director – ITIS and Mr. KC. Sivakumar Sr. IT Consultant, presenting the bouquet to Mr. Dharmaraj, Managing Director of Theni Anantham Textiles at the occasion of their new showroom inauguration We wish Theni Anantham a grand success in their endeavour!
  • 5. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Magalakshmi Group @ Namakkal! Our associates Magalakshmi Group (of Villupuram fame) inaugurated their new Hypermart at Namakkal. Below are few pictures taken during this auspicious event… Few pictures from inauguration function… Magalakshmi Group Directors - Mr. K. Ramesh, Mr. Venkatesh and Mr.Rajesh, honouring our Sr. IT Consultant Mr. KC. Sivakumar and Team for giving their unconditional support. We wish Magalakshmi Group a grand success in their endeavour!
  • 6. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Bridge i2i Inaugurates New Office at Bangalore! Bridgei2i Analytics, our associates shifted their operations to a new location at Bangalore. Inspace Team were actively involved in the process. Few snaps taken at the new office location... Few pictures from inauguration function… Our Business Head Mr. Rajavel at the new Bridge i2i Office during the occasion We wish Bridgei2i a grand success in their endeavour!
  • 7. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Inspace Team celebrated its 13th Anniversary during on 11th October. To mark this grand event, the staff members celebrated the coinciding Ayudha Pooja with family and friends. Few photos taken during the event… In the above picture the winner of traditional dress competition Mr. RG Kannan receiving the gift from our CFO Mr. Sumant Mehrish
  • 8. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! INBOX WELCOME TO THE CLUB… Recently Inspace secured few prestigious client and added them to their esteemed list of clientele. Some of them are, - Chennai - Ambasamudram - Chennai - Chennai - Chennai - Chennai - Chennai
  • 9. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Welcome back to another edition of our BAIT Series, which aims primarily to align business with technology. This month we would discuss on the importance of IT Security… IT Security also known as Computer security or cyber security, as the Wikipedia defines it, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they are designed to provide. It includes protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. As everyone may agree, this field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi - and recently due to the growth of "smart" devices, including smart phones, televisions and tiny devices as part of the Internet of Things. . . Business Aligned IT (BAIT Series 18) By Samuel Raj Anbudaiyan (Technology Auditor) IMPORTANCE OF IT SECURITY!
  • 10. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 17) By Samuel Raj Anbudaiyan (Technology Auditor) To understand the importance of IT Security it is essential to gain knowledge on how vulnerable is a system susceptibility or flaw. Many vulnerabilities are documented in the Common Vulnerabilities and Exposures database.A hacker can exploit a vulnerability and may cause harm to the IT assets. Thus to secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below:  Backdoors  Denial-of-service attack  Direct-access attacks  Eavesdropping  Spoofing  Tampering  Privilege escalation  Phishing  Click jacking  Social engineering Thus we find that Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent accurate and dependable to protect data. There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, power consumption, electromagnetic radiation waves, and many more. However, computers can be protected through well-built software and hardware. By having strong internal interactions of properties, software complexity can prevent software crash and security failure.
  • 11. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 17) By Samuel Raj Anbudaiyan (Technology Auditor) In the recent times, IT Security is not the prerogative of IT Team alone, but rather the all computer users become part of the security environment and thus contribute towards an effective security. Thus it is essential that all such critical users are trained in basic security concerns by creating awareness of the security risks involved in their operations. The user must be informed that he or she is responsible in containing the security threat and thus help securing the environment. In this regard Computer Security protection becomes essential. In computer or IT security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. One such measure is to conduct a thorough IT Security Audit. Inspace Security team is actively involved in conducting in-depth IT Security Audits. Please call us to know more and how Inspace’s Team can identify such security threats and thus help mitigate them.
  • 12. LOL! Lets relax… CONTENTS Get in touch with us! All are encouraged to contribute towards the contents of this newsletter. Please reach out to Editor’s Desk @ newsletter@inspacetech.com (This newsletter is for private circulation only. The Editorial committee reserves the right to publish contributed contents). • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL!