In this report, I examine the article, ‘Some thoughts about social implications of accessible computing’, (David and Fano 1965) to…
4G and its current state of play in the UK
What is 4G? The International Telecommunications Union (ITU) defines 4G as the fourth-generation mobile phone communication technology standard. Currently, 4G…
A REPORT ON TWO-FACTOR AUTHENTICATION SYSTEMS
EXECUTIVE SUMMARY The following report explains how two-factor authentication systems work. I was commissioned by the management of Dynamic Plumbing…
WHAT IS WEB 2.0? Design patterns and business models for the next generation of software
Introduction This report is a summary of an article written by Tim O’Reilly, one of the main spokesmen on the…
An Information Technology Security guide for end-users. An overview of the best practices to mitigate cyber-attacks at the front-end of an enterprise environment, with special emphasis on the implications of firewalls.
1 Introduction Welcome to your Information Technology Security guide for end-users: An overview of best practices to mitigate cyber-attacks at…
Welcome to my new computing and information technology blog.
Be Sure to follow my postings here and on facebook on issues in tech that I care about.