Value of the Software Testing Life Cycle

Anyone who has ever seen a piece of code accidentally released into a production environment will appreciate the value of a strong testing regime. Obviously if the code is 100% correct and contains no errors then the effect will be negligible, however that rarely happens. Untested code can create huge problems and create very expensive […]

A Comparison of Physical Vs Digital Identity

At the core of this particular service-oriented economy are truly network-based, automatic transactions. Automated transactions are actually basically different than the transactions in which occur within the physical realm. The minute I stop by the corner store to purchase a snack, I can easily barter money for peanuts. Unless the clerk happens in order to […]

Cybercrime and the Legal Framework

Twenty years ago the concept of cybercrime was virtually unknown, yet today it’s one of the biggest criminal sectors across the globe. The advantages to criminals are fairly obvious, high reward and often extremely low risk. Often these crimes cross international borders and hence jurisdiction can often be a real problem for prosecutions and investigations. […]

Using an IPad for Designers and Architects

Although for the most part, the iPad has been met with serious acclaim across the world. There have been some mutterings of discontent from some high performance users who see it as something of a backward step in mobile computing. With prices of storage and disk space plunging, we have all been handed the capacity […]

BBC Abroad – BBC Blocking VPN Access

Many people use VPNs (Virtual Private Networks) for security reasons, primarily because they create a secure, encrypted tunnel across the open architecture of the internet.  Many firms use them as a secure method of allowing remote users to access corporate file servers and email systems from anywhere in the world.  It has to be said […]