Information Technology

The Impact Of Blockchain On Online Customer Experience

The blockchain industry is rapidly expanding. Its international market is anticipated to reach $20 billion by 2024.  And this technology has…

4 years ago

Cybersecurity in the Age of the Millennials

Millennials are often blamed for killing off traditional industries ranging from diamonds and luxury goods to chain restaurants and napkins. Technology plays a…

4 years ago

Detection and Prevention of Network Intrusion

What is Network Intrusion? Network Intrusion is recognised as an unauthorised activity. These are the activities that jeopardise the network…

4 years ago

Possible Cyber Attacks in the Enterprise

“Cyber Attack” is an attempt through which an attacker can gain access to enterprise computer or networks to implant a…

4 years ago

JavaScript Frameworks in 2019

Popular libraries and frameworks of JavaScript are incredibly useful tools to familiarise with any front-end web developer. You can add…

4 years ago

Are we compromising our free will?

This era is defined as the digital era, where the human hand is being replaced by digital technology. Such promising…

4 years ago

Penetration testing to identify attacks in enterprise computer systems and networks

Penetration testing or pen test is defined as the simulation of a real-world attack on a target network or application…

4 years ago

Beefing up vehicle security systems using GSM

A major challenge that the world is currently facing is the insecurity and increasing crime rate in society.  Vehicle crime…

4 years ago

Cybersecurity

Hi, I am Nishchitha and I'm currently pursuing the Bachelor of Science (honours) in Information Technology awarded by Teesside University…

5 years ago

Leveraging on technology, people and processes

A secured living environment is essential for all.  To achieve a secured living, various biometric systems are available, such as,…

5 years ago