How to survive a data breach
If someone with the proper motive and means (time, money, and resources) wants what you have badly enough, they are…
Analytical stories of tech trends, products, services, moves and technologies including cloud computing, security, big data, analytics, internet of things, artificial intelligence, storage, blockchain
If someone with the proper motive and means (time, money, and resources) wants what you have badly enough, they are…
When German radio manufacturers gathered in 1924 to show off their products, just a year after regular broadcasting began in…
Here’s something that never works out well: A small project comes along, one that doesn’t necessarily need a full-time project…
One of the dominant themes in this column is the idea that the “next billion” and the “next next billion”…
Why has BT (Britain’s biggest telecoms corporation) bought the English Premier League rights for £897millon and rights for the European…
Most people start thinking about retirement when they turn 70, if they haven’t already called it a career. Not Oracle…
The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing…
The business models employed by Nigeria’s mobile network operators (MNO) are undergoing a notable period of evolution according to global…
Once viewed as the sole preserve of large organizations with significant resources and large addressable markets, the world of advertising…
There’s a push to adopt chip-equipped payment cards in the U.S. following high-profile breaches at large retailers and restaurant chains…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.