A Look at Cyber Security Trends for 2014
We’re now more than halfway through 2014, and as with any year, the world of technology has been rapidly progressing…
Revamp: Maybe It’s Not Time to Bury Blackberry
Alright we couldn’t believe that headline either, until we started looking into Blackberry’s new revamp, and it’s quite a revamp…
Improving Security on the Internet of Things
Mark Stanislav calls himself a “security evangelist.” Online Tech has previously provided him a virtual pulpit from which to preach…
Why Your Business Needs Unified Comms
With so many communication options available, wouldn’t it be good if they were all connected in some way? Well,…
Google Will Soon Favor Websites Using HTTPS Connections
When visiting a website and you notice that it has the prefix ‘https’ as opposed to ‘http’, of if your…
How to Get Management to Pay Attention to Your Research Results
We’ve all been there. You’ve written a grand survey, conducted an amazing series of focus groups, pulled all the data…
Russian Hackers Steal More Than 1 Billion Passwords in Record-Breaking Data Breach
Hold Security, a firm credited with uncovering significant data breaches – such as the one at Adobe Systems in October…
Engagement or Experience?
This may sound a bit like a rant, and I suppose it is really, but I’m tired of having this…
IDE and Debugging Function Comparison Between esProc, Perl and Python
esProc, Perl, and Python are all the scripting language for data analysis and processing. However, they differ in syntax style,…
Businesses Must Make Self-Service Reporting a Priority
One of the charitable causes to which I devote time puts on an annual vintage car show. The Concours d’Élegance…