Information Technology

Are we compromising our free will?

This era is defined as the digital era, where the human hand is being replaced by digital technology. Such promising…

3 years ago

Penetration testing to identify attacks in enterprise computer systems and networks

Penetration testing or pen test is defined as the simulation of a real-world attack on a target network or application…

3 years ago

Beefing up vehicle security systems using GSM

A major challenge that the world is currently facing is the insecurity and increasing crime rate in society.  Vehicle crime…

3 years ago

Cybersecurity

Hi, I am Nishchitha and I'm currently pursuing the Bachelor of Science (honours) in Information Technology awarded by Teesside University…

3 years ago

Leveraging on technology, people and processes

A secured living environment is essential for all.  To achieve a secured living, various biometric systems are available, such as,…

3 years ago

Artificial Intelligence (AI): What’s the Buzz?

I’m a Student from MDIS’ School of Technology currently undertaking an International Foundation Diploma in Information Technology. I chose this…

3 years ago

Technology innovation using Virtualisation and Virtual Machine

With the advent of ubiquitous virtualization technology, we are now able to lease hardware and computing power from vendors with…

3 years ago

Responsive Web Sites

Responsive Web Design is a term coined in 2010 by Ethan Marcotte. It is an approach which states that the…

4 years ago

Cloud Enabled Content Management for Digital Signage

Interested in improving your business productivity with Cloud Enabled Content Management? Read on to gain insights on how you can…

4 years ago

What is Machine Learning?

Machine learning is defined as teaching a machine through experience by giving them sample data. The machine will then be…

4 years ago