Hacker or TV Fans – the VPN User

Whether you need to use something like a VPN or proxy server depends on a whole range of factors. ¬†However they are certainly becoming much more popular among average users throughout the world. ¬†There are probably two main justifications, concerns about online and privacy and being able to bypass the myriad region blocks that are […]

Value of the Software Testing Life Cycle

Anyone who has ever seen a piece of code accidentally released into a production environment will appreciate the value of a strong testing regime. Obviously if the code is 100% correct and contains no errors then the effect will be negligible, however that rarely happens. Untested code can create huge problems and create very expensive […]

A Comparison of Physical Vs Digital Identity

At the core of this particular service-oriented economy are truly network-based, automatic transactions. Automated transactions are actually basically different than the transactions in which occur within the physical realm. The minute I stop by the corner store to purchase a snack, I can easily barter money for peanuts. Unless the clerk happens in order to […]