Categories
Medical

Security for Your Medical Centre – Part 1

Security is essential for any medical centre running IT systems. These days there are more threats than ever before, and to keep guard is one of the requirements for any health IT infrastructure. This series on data security measures for your medical centre entails topics such as basic terminology of attackers, different attacking methods, statistics […]

Categories
Exabyticals

Security for Your Business – Part 2

Statistics of IT Security Threats This article is a continuation of Security for Your Business – Part 1. We will discuss various statistics related IT threats and security concerns. This article points out clearly the importance and significance of securing your IT infrastructure. Do not hesitate in anyway from ensuring proper security measures, as not […]

Categories
GPIT

Usage Based Billing for the Internet: Canada’s Economic Folly

What is Usage-Based Billing? Usage-based billing (UBB) is something that was introduced to the CRTC in 2008 by Bell. What it does is, it puts a cap on the amount of Internet you consume and applies a fee for every gigabyte you use thereafter. What’s the problem with that? Well, it stifles Canada’s economy’s by […]

Categories
Exabyticals

IPV6 – The New Internet Scheme

Believe it or not, the Internet has run out of addresses. This means we need to transition to a new addressing scheme, IPv6, that facilitates our growing need for Internet addresses and that helps our businesses grow. To access company networks and the Internet, each device or computer is assigned a logical address. That basically […]

Categories
GPIT

Is Software Piracy Ethical?

We’ve heard of the legend of Robin Hood, the lone vigilante who steals from the rich and gives to the poor. The right being done by the granting of provisions not available to the poor from those who have more. Right or wrong, this same ethical issue faces many people in the digital and technological […]

Categories
GPIT

The New Grounds for Cybertheft

Theft used to be limited to stealing of physical goods or the classic burglar robbing the bank for cash. Now the concept of theft has radically changed as the digital age advances and the lines between the physical and virtual become blurred. Most people know cybercrime for its stealing of people’s money from their bank […]

Categories
Exabyticals

Virtualization For Businesses

One of best ways to streamline business infrastructure is to use a process called virtualization. Virtualization basically reduces the need for physical hardware as it uses software environments to create and share hardware resources. On one physical desktop computer you can run multiple operating systems, each sharing the hardware of the desktop computer to give […]

Categories
GPIT

The Cloud, The Computer and the Human Brain

Comparing the human brain with the computer is like comparing a car to a bicycle. The human brain has developed in great detail over the evolutionary patterns of time, whereas the computer is a creation of our brain in infancy. What we can do to revolutionize our IT industry is to think and innovate along […]

Categories
Exabyticals

Security for Your Business – Part 1

Security is essential for any business running IT systems. These days there are more threats than ever before, and to keep guard is one of the requirements for any IT-business infrastructure. This series on data security measures for your business entails topics such as basic terminology of attackers, different attacking methods, statistics of IT security, […]