News

02:00 PM
Connect Directly
Twitter
Facebook
Google+
RSS
E-Mail
50%
50%

The Seeds of IT Culture

Probably no single factor influenced the development of Bangalore as a center of industry more than the city's long-standing educational culture, fostered by the intertwining influences of Bangalore's colonial administrative establishment and it's pleasant weather. The city's educational establishment comprises institutions such as the Indian Institute of Science-one of the oldest in the country, having been founded in 1911-and several others dating to recent decades, including the Indian Instit

Probably no single factor influenced the development of Bangalore as a center of industry more than the city's long-standing educational culture, fostered by the intertwining influences of Bangalore's colonial administrative establishment and it's pleasant weather. The city's educational establishment comprises institutions such as the Indian Institute of Science-one of the oldest in the country, having been founded in 1911-and several others dating to recent decades, including the Indian Institute of Management, the Institute for Social and Economic Change, the Indian Statistical Institute, the National Law School of India University and Electronics City's own International Institute of Information Technology, Bangalore (formerly Indian Institute of Information Technology).

Bangalore became an industrial center after India gained independence in 1947, with the founding of aerospace and defense companies under government auspices. However, the information technology only got started after the national government began to move away from socialist economic policy tendencies.

The establishment of so-called Export Processing Zones (EPZs) allowed for duty free import of equipment provided it was to be used to support industries with products for export only, according to V. Shankar, executive vice president and head of iflex solutions' PrimeSourcing division, whom I met in Bangalore. "It was one of the few things that the government has done right," he comments. The zones originally applied to specified geographical areas but can now apply to individual facilities. The government later also granted multi-year "tax holidays" to allow companies to gain some financial momentum.

Anthony O'Donnell has covered technology in the insurance industry since 2000, when he joined the editorial staff of Insurance & Technology. As an editor and reporter for I&T and the InformationWeek Financial Services of TechWeb he has written on all areas of information ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.