Category Archives: IT

Inner: Big Data – 3 Vs (volume, velocity and variety) and advantages

Big data and Cloud services are hot IT words in these days. Big data and cloud computing are different technical terms in the world of technology and broad in their meanings and functions. In this rapidly growing age of internet, … Continue reading

Posted in IT, Technology | Tagged , , , , , , , | Leave a comment

Interview With Bob Rudis and Jay Jacobs, Authors of “Data Driven Security”

Bob Rudis and jay Jacobs have wide experience in the field of information security & IT Risk Management. In their book “Data Driven Security” they explore practices and principles of data analysis and visualization. Following is an interview with Mr.Bob … Continue reading

Posted in Technology, Web Security | Tagged , , , , , | Leave a comment

5 top challenges in Mobile Cloud Computing

Mobile cloud computing (MCC) is a technique that allows to use built resources like applications and it is hosted by cloud computing. Mobile cloud computing uses cloud to data storage, processing, and other thorough operations like Google Maps, mobile Email … Continue reading

Posted in Technology, Web Security | Tagged , , , , , | 1 Comment

How secure is Bitcoin Cryptocurrency

Cryptocurrency is a digital currency that uses cryptography for security; it makes easy to transfer funds between Internet users. Bitcoin is the first Cryptocurrency introduced in early 2009. Since then many cryptocurrencies have been developed and traded in the market but … Continue reading

Posted in Technology, Web Security | Tagged , , , , , | 4 Comments

An overview of Cloud computing and services

Cloud computing seems debatable subject because you may get different answers from different experts about Cloud Computing, we can see it everywhere in computing world, Cloud computing is a real time computing that integrates all the different resources of computers … Continue reading

Posted in IT, Technology | Tagged , , , , | 3 Comments

Network Attacks: types and how to prevent

About computer network attack and how it is performed is a little complex to understand for the users who does not relate with that field, it been helpful to understand about these in age of internet networking. Encryption is a … Continue reading

Posted in Web Security | Tagged , , | 1 Comment

Digital Certificate (Public Key Certificate): what it’s all about

The use of internet for online transactions is increasing in these days, so there are chances to grab the private information and misused it by cyber mugger, to prevent misuse of the information, users need to do secure transactions. With … Continue reading

Image | Posted on by | Tagged , | 1 Comment