Analytics: Sifting order from chaos

I remembered a particular product of a carbonated drink manufacturer, I then found out what happened to the product and searched on twitter to see the public opinion about the product in recent times. I later noticed the promoted tweets…

All you need to know about the System Development Triangle

As a geek, the author couldn't help but think of "sweet in the middle" when considering the struggle between developers and security experts to find the perfect balance in system development. Functionality, ease of use, and security all play important…

Short story: The truth about Two Factor Authentication (2FA)

Authentication is a process we perform daily, using what we have, know, or are. In unsafe environments, multiple layers are necessary, resulting in multi-factor authentication (MFA) or two-factor authentication (2FA), requiring two factors from different categories. MFA is the generic…