Default Banner


  • Stolen passwords

    32 million, 100 million, 360 million… No, were not talking about money, but usernames and passwords. It has been much more common of late to see a headline dominating the news about cyber-crime and more precisely, about stolen passwords.
  • Social engineering

    There was once an infamous computer related ‘inconvenience’ known as the Millennium Bug. This bug (a.k.a the Y2K or Year 2000 Bug) caused many to live in dread of what, looking back, was no more than a supremely hyped matter about an existing programming “bug” residing on the older populace of computers and network equipment at the time.
  • Brand 3.0

    Nowadays everybody talks about brands - they have become the way by which we define our lifestyles and identity as individual creatures in this global town. But when you think about it, what is a brand?
  • Practical tips for protecting everyday devices

    Most of us are connected to the internet 24/7 nowadays - even while we sleep, our mobiles are sending data back and forth over the internet. But it is probably while we are awake and using the internet that we are most at risk and it cannot be stressed enough at how careful we need to be – just one small moment of carelessness can cause real problems.
  • The smartphone app development approach: Native or cross-platform?

    In 2008, the evolution of mobile applications began in earnest with the introduction of smartphones and the ability to install third party applications. This made it possible for developers to start developing mobile applications that could be installed on the smartphone itself. This changed the way we viewed mobile phones as the popular functions available were no longer limited to calling and sending text messages. The first smartphone apps were developed for general productivity and retrieval of information including email, calendar, contacts, stock market and weather information. Different apps were developed later on to satisfy the public demand, made possible with the introduction of new developer tools, themselves also fuelling the speed of evolution.
  • From self-driven cars to “flying cars” - a possible glimpse of our future?

    In the 80’s, teenagers were brought up with popular TV shows such as Knight Rider, which featured Michael Knight and his buddy K.I.T.T, a car controlled by a computer with artificial intelligence, autopilot and other sort of “wizardry”. Another hit movie from that era was Back to the Future, featuring the famous DeLorean car which, by mean of its Flux Capacitors and Fusion Reactor, was capable of flying through time!
  • The power of HR technology

    Most CEOs and top management repeatedly declare that no resource is as indispensable and valuable as the human resources within their organisation. Management acknowledge that each employee is a resource contributing to business success, and this is why adopting an effective workforce management is very important.
  • Financial transformation for the digital era

    The digital economy has brought with it a certain amount of turmoil, especially within the world of financial services. However, most finance professionals have to tackle the challenges faced by the digital economy, because of constant change in both economic and regulatory environments. Despite the threat, many professionals also see it as an opportunity to maximise advantage. As a finance professional, one might wonder what this change is really about and how the digital era differs from what is currently being done in the finance world.
  • A rotating dilemma

    For many of us, owning a website means having a marketing strategy (even if minimal). This basic strategy is designed to bring more attention to our product, to show off our company’s ideas, to capture the need for us to be chosen by the audience – the client. To do so we need to appear as an attractive choice that responds to all the needs a client may have. That is why web designers try to meet all those needs when designing websites.
  • Cyber vigilance starts at home

    I recently came across a study that was conducted on children in the United States by Shugoll Research for the “Center for Cyber Safety and Education”. The children were between the 4th to 8th grade which means they were 9 to 14 years of age. For those unaware, the Centre for Cyber Safety and Education, was previously known as the “(ISC)2 Foundation”. (ISC)2 is a world renowned security organisation that needs no introduction, though it is better known by its acronym than its full name - Information System Security Certification Consortium.