-
March 16, 2016 | Blog, Uncategorized | Infosystems | 0
Ever wonder how many calories are really in the foods you eat? How much fat is in that slice of bread or chunk of cheese? A new app called DietSensor claim it will scan your food
-
February 29, 2016 | Blog, Uncategorized | Infosystems | 0
Given the unlimited use of technology in most departments of an organisation, it comes as no surprise that the HR function has also benefited over the last two decades a brief
-
February 24, 2016 | Blog, Uncategorized | Infosystems | 0
The union between fashion and tech has finally taken a major step forward. The fitting room, formerly nothing more than a heinously lit closet with a full-length mirror, can now
-
February 22, 2016 | Blog, Uncategorized | Infosystems | 0
”There are 2 kinds of companies: Those who have been hacked and those who don’t know that they have been hacked!” John Chambers – Executive Chairman, Cisco.
-
February 18, 2016 | Blog, Uncategorized | Infosystems | 0
Cyber risk appears in many forms, all of which can represent major threats to business. Companies increasingly face new exposures, including first and third-party damage, business
-
February 17, 2016 | Blog, Uncategorized | Infosystems | 0
For years, you’ve ventured to the local department store to get your makeup done by an expert, but now your makeup expert will be your smartphone. Ladies, let your
-
March 16, 2015 | Blog, Uncategorized | admin | 0
Is it possible to make ‘boring’ banking a social media conversation starter? Yes, it is! And the 2015 Digital Banking trends and predictions report covers the biggest
-
March 13, 2015 | Blog, Uncategorized | admin | 0
Since the start of the Internet of things, consumers have seen lots of new ios and android apps being released in response to overwhelming demand – and this has just whetted
-
March 13, 2015 | Blog, Uncategorized | admin | 0
Regulations governing the internet of things (IoT) are undergoing changes with great frequency to keep up with the breakneck pace of this technology. Hence, legal systems are
-
March 6, 2015 | Blog, Uncategorized | admin | 0
In this era of communication overload, internet security is one of the most important assets that a company must invest in. Of these, UTM power security is one of the most