Information Technology
-
Possible Cyber Attacks in the Enterprise
“Cyber Attack” is an attempt through which an attacker can gain access to enterprise computer or networks to implant a payload – referred to ... -
JavaScript Frameworks in 2019
Popular libraries and frameworks of JavaScript are incredibly useful tools to familiarise with any front-end web developer. You can add powerful features to your ... -
Are we compromising our free will?
This era is defined as the digital era, where the human hand is being replaced by digital technology. Such promising and admired terms like ... -
Penetration testing to identify attacks in enterprise computer systems and networks
Penetration testing or pen test is defined as the simulation of a real-world attack on a target network or application through a wide range ... -
Beefing up vehicle security systems using GSM
A major challenge that the world is currently facing is the insecurity and increasing crime rate in society. Vehicle crime rates are on the ... -
Cybersecurity
Hi, I am Nishchitha and I’m currently pursuing the Bachelor of Science (honours) in Information Technology awarded by Teesside University at MDIS. I chose ... -
Leveraging on technology, people and processes
A secured living environment is essential for all. To achieve a secured living, various biometric systems are available, such as, Iris scanner, Finger print ... -
Artificial Intelligence (AI): What’s the Buzz?
I’m a Student from MDIS’ School of Technology currently undertaking an International Foundation Diploma in Information Technology. I chose this particular course because I ... -
Technology innovation using Virtualisation and Virtual Machine
With the advent of ubiquitous virtualization technology, we are now able to lease hardware and computing power from vendors with some reasonable price. We ... -
Responsive Web Sites
Responsive Web Design is a term coined in 2010 by Ethan Marcotte. It is an approach which states that the design and development of ...