If you think someone without your desktop login won’t be able to access your computer’s files, think again. Anyone with mediocre IT skills can take your your hard disk, plug it as a secondary drive to another computer, and extract your files.
So how can you protect your files from hackers?
One option would be to encrypt your sensitive files manually or avoid storing them on your computer altogether and lock them away in a safe cloud. An alternative is to use Full-Disk Encryption (FDE), a technique that scrambles everything stored on your computer and makes it only accessible to the person with the decryption key. Continue reading
Imagine scrolling an online news article by merely staring at the bottom of the webpage. How about reorganizing your desktop files by dragging them around with your gaze?
For years we’ve been using mice and keyboard (and later touch screens) as the main tools to control and send commands to our computers and devices.
But 2016 proved that things are headed for a change. With great leaps in artificial intelligence and machine learning, we saw a new array of highly efficient assistants and devices that can be controlled with voice commands.
The start of 2017 gave a hint at what the next breakthrough might be. Continue reading
Just as blockchain, the technology that underlies bitcoin and other cryptocurrencies, continues to show potential in transforming many industries, it is also showing its potential in the crowdfunding and investment domain.
Initial Coin Offering (ICO) has become a popular way to raise funds for projects that are based on blockchain and cryptocurrencies. An ICO is a cryptocoin crowdsale, where a blockchain-based project allows enthusiasts and supporters to invest in the project by purchasing part of its cryptocurrency tokens in advance. ICOs usually take place in the early phases of a project, and the raised funds are then used to pay development and launch expenses. Continue reading
We rely increasingly on messaging apps to carry out our daily communications, whether for personal use or to do business. And there are literally tons of them on the internet and app stores, each sporting different features and social reach.
Having messaging apps have become an inherent part of our lives, we often use them to exchange sensitive information without regard to how capable they are of keeping that information secure. With messaging apps, we share personal information and photos, or report on sensitive issues in countries where the internet is strictly controlled and monitored by autocratic regimes.
So just how secure and trustworthy is your favorite messaging app? Here are four criteria that will help you decide. Continue reading
Data analytics is something that you read and hear about a lot these days. It’s been touted as the science and technology that can help organizations reduce costs, increase efficiency, identify new opportunities and increase their competitive advantage.
Data analysts uses mathematics, statistics, and sometimes machine learning, to find meaningful patterns across registered data and turn them into meaningful results and actionable insights. While the concept of analytics isn’t new, recent advances in storage and computation technologies are enabling us to store and process data in huge volumes, and are taking data analytics to the next step, opening up possibilities that weren’t conceivable before. Continue reading
The Internet of Things (IoT) is one of the most exciting phenomena of the tech industry these days. But there seems to be a lot of confusion surrounding it as well. Some think about IoT merely as creating new internet-connected devices, while others are more focused on creating value through adding connectivity and smarts to what already exists out there.
I would argue that the former is an oversimplification of the IoT concept, though it accounts for the most common approach that startups take toward entering the industry. It’s what we call greenfield development, as opposed to the latter approach, which is called brownfield.
Here’s what you need to know about greenfield and brownfield development, their differences, the challenges, and where the right balance stands. Continue reading
Blockchain is a term you see fairly much when browsing tech—and non-tech—sites these days. It is widely known as the technology that constitutes the infrastructure of Bitcoin (what’s bitcoin BTW?), a mysterious cryptocurrency created by a mysterious scientist in 2009. Some even confuse it as a synonym for bitcoin. But the reality is that blockchain is a disruptive technology that has the potential to transform a wide variety of business processes. Continue reading