• Home
  • About this blog
  • Digital rights and data privacy
  • Security
  • Ethical
  • Technological advances
  • Programming
  • Networks
  • Health technology
  • Interaction Design
  • Collaboration
  • Cloud
  • IT professionalism
  • Gadgets and wearables
  • Software
  • Uncategorized
  • Media technology

Enthusiasm suits you

"You're so enthusiastic about what you do, it suits you!"
Enthusiasm suits you
 

Menu

Skip to content
  • Home
  • About this blog
  • Digital rights and data privacy
  • Security
  • Ethical
  • Technological advances
  • Programming
  • Networks
  • Health technology
  • Interaction Design
  • Collaboration
  • Cloud
  • IT professionalism
  • Gadgets and wearables
  • Software
  • Uncategorized
  • Media technology
Google Scholar:
For sources, try to look them up on
https://scholar.google.com/
Powered by Verbosa & WordPress.
When health tech goes terribly wrong

When health tech goes terribly wrong

16/06/2019 Ethical / Health technology / TestingLeave a comment

Therac-25 is a name that is often mentioned when discussing ethics and computer testing, and it’s clear to see why. The Therac-25 was a radiation treatment machine that was set to revolutionise the way radiation treatment was done. Thanks to …

Continue reading
Access control and logins

Access control and logins

26/01/2019 SecurityLeave a comment

An end-user might consider a computer system access point to be somewhat simple. Either you have a key – and you get in – or you don’t. If you have a key to the door, you get in. Some areas …

Continue reading
File recovery for dummies

File recovery for dummies

20/10/2018 Cloud / Collaboration / Security / SoftwareLeave a comment

In 2015, the company I worked for at the time implemented Office 365 as the main administrative and collaborate tool suite. This covers not only the Office suite; it also includes the use of Yammer and SharePoint sites for internal …

Continue reading
TCP/IP and their attacks

TCP/IP and their attacks

05/08/2018 Networks / SecurityLeave a comment

There’s an ever-increasing amount of talk about hacking in the news, but what exactly happens? Well, Denial of Service (DoS) and Distributed DoS (DDoS) are both pressing problem and it appears they will continue to be so in the foreseeable …

Continue reading
Security in software as an afterthought

Security in software as an afterthought

05/05/2018 Programming / Security / SoftwareLeave a comment

Software development often uses agile development processes to see the project through from start to finish. Despite the processes being used on network and web applications with high security risks, most agile methods does not have features that specifically targets …

Continue reading
Let’s put labels on it

Let’s put labels on it

02/12/2017 Quality controlLeave a comment

Hashtags! Tags! Labels! Call them what you will, they are here to stay. My favourite tag system is on Twitter as I found their tags were useful to find any information pertaining to a topic. In addition, you can subscribe …

Continue reading
Biometric authorization – can I copy you?

Biometric authorization – can I copy you?

23/08/2017 Digital rights and data privacy / SecurityLeave a comment

Biometric authentication relies on distinguishing physiological and sometimes behavioral characteristics in order to authenticate a particular individual, such as gait appearance. We will have a look at some of the more well known authorization methods. (Tistarelli, Bigun and Jain, 2006) …

Continue reading
In the name of Government Safety, all is fair?

In the name of Government Safety, all is fair?

14/07/2017 Digital rights and data privacy / Ethical / SecurityLeave a comment

In my last post, I talked a bit about how governments might share IT forensic evidence with each other – or not. Well, plenty of shady investigation techniques happens inland too. Don’t mess with the government, or even something the …

Continue reading

Posts navigation

1 2 3 … 5