The Internet of Things—and machines: Linking machines to machines
Permalink

The Internet of Things—and machines: Linking machines to machines

The ‘Internet of Things’ has been a hot topic for a long time. The concept…

Continue Reading →

To Restore Trust in Online Transactions, Retailers Need to Develop a Virtual Handshake
Permalink

To Restore Trust in Online Transactions, Retailers Need to Develop a Virtual Handshake

At one time, transactions between merchants and consumers were often sealed with a handshake. This…

Continue Reading →

Progressive Web Apps vs Native: Which Is Better for Your Business?
Permalink

Progressive Web Apps vs Native: Which Is Better for Your Business?

Are native apps doomed? We don’t think so! And, mind you, this is coming from…

Continue Reading →

The Myth of the Digital Native
Permalink

The Myth of the Digital Native

The term “digital native” – popularised by education consultant Marc Prensky in his 2001 article…

Continue Reading →

Infographic: What is Privacy?
Permalink

Infographic: What is Privacy?

Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving…

Continue Reading →

Negativity, be gone: this new online tool can retrain your brain
Permalink

Negativity, be gone: this new online tool can retrain your brain

Anxiety and depression can have devastating effects on people’s lives. In some cases, the mental…

Continue Reading →

Innov8: V-Commerce Application
Permalink

Innov8: V-Commerce Application

The program invites companies and individuals from around the world that are developing disruptive technologies…

Continue Reading →

Painless Protection Against Ransomware Attacks
Permalink

Painless Protection Against Ransomware Attacks

Online criminals extort money from unsuspecting individuals by encrypting data on their computers and demanding…

Continue Reading →

Painless Protection Against Ransomware Attacks
Permalink

Painless Protection Against Ransomware Attacks

Online criminals extort money from unsuspecting individuals by encrypting data on their computers and demanding…

Continue Reading →

Proven cybercrime fighter moves from government to private sector
Permalink

Proven cybercrime fighter moves from government to private sector

FLOWER software app helps stem cyberattacks Some Department of Energy facilities experience thousands of attempted…

Continue Reading →