BLOG

Read our blog about the latest trends on mobile computing and best practices on safe and secure computing

The power of Twitter

The power of Twitter

A true story about Ashley Kerekes, a young Nanny from New England USA, and the game of cricket which to some is as complicated as IT. Ashley tweets (or micro blogs) under the name @theashes to a small group not aware that a major sporting event was taking place in Australia.

Are you commited to digital marketing rethink or get left behind

Are you commited to digital marketing rethink or get left behind

Just how serious is your business about digital channels? The pervasiveness of smartphones (iPhone, Android, BlackBerry), tablets (iPad, Samsung, Dell) and the app economy that surrounds them is quickly becoming a dominant business force. We also can’t ignore the growth of Facebook. During the holiday break, Facebook was named the most visited site in 2010,Read more about Are you commited to digital marketing rethink or get left behind[…]

The road ahead… 2011 Internet threats

The road ahead… 2011 Internet threats

Hacktivism A denial-of-service attack was launched against the WikiLeaks site. WikiLeaks supporters retaliated. Credit: Sophos.com In the second half of 2010, no single topic dominated cybersecurity news more than WikiLeaks. From the initial document leak to the subsequent denial-of-service attacks launched against PayPal, Amazon, MasterCard and Visa, even the least tech-savvy person seemed to haveRead more about The road ahead… 2011 Internet threats[…]

1 14 15 16 17