Have you ever had a need to test email functionality on an application within your local development setup?  I have found this process to be both time consuming and confusing in the past, especially when working within firewall restrictions.  Of course we can always test with real dummy email addresses, but what if we accidently send a mass email out to real users?  It is much better to test everything locally first. Continue Reading…

Software monitoring and blocking tools have become commonplace within the work environment and have been used in order to protect company intellectual assets from employees who either deliberately or accidently become the cause of security issues. In addition to this, one of the main arguments for such tools is the idea that they increase employee productivity. Continue Reading…

Copyright has become a huge issue and talking point recently with continual legal challenges, the introduction and defeat of the Stop Online Piracy Act (SOPA) and considerations for future legislation, challenges and controversy.  The United States leads the world in having some of the toughest copyright laws on the books. Continue Reading…

During the 1980s the role playing games like Dungeons and Dragons saw the rise in popularity of model or figurine molds, which essentially allowed players to create character’s using casting kits.  These were in effect a very early day version of 3D printing, which has introduced the production of physical objects in the home.  3D printing has become more sophisticated in recent years and with that, the overall costs have decreased dramatically to the point where they are becoming widespread.  Continue Reading…

One of the ongoing discussions in the United States focuses on the need for regulation versus the need to free business from restrictive laws that would hinder innovation.  There are many sources that provide strong arguments for both sides.  You only have to look as far as the current state of patent regulations and recent lawsuits involving tech giants Samsung and Apple to see the impact these laws make within the industry.  Continue Reading…

Identity theft has been a growing concern over the last decade.  In recent years it has become a major problem for many as the Internet has taken over much of the day to day banking many traditionally did at their physical located branches.  Is there however a bigger concern with less knowledgeable and inexperienced Internet users, and are these users at a higher risk of becoming victims of identity theft?  Continue Reading…

Anonymity on the Internet provides an important layer of protection for people to express themselves online, while keeping their real life identity private.  It has led to both positive as well as negative implications over the years and there has been much discussion on the benefits and drawbacks on both sides.  Continue Reading…

(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are drawn along industry lines.” This contrasts other parts of the world, such as the European Union, which has a non-sectorial approach where, for example a comprehensive privacy law applies to all organizations regardless of their industry. Continue Reading…

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media. Continue Reading…

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.

Continue Reading…