
More Thinkpieces:
Modern ICT Use, Trends, & Legislation
In a world where our phones are smarter than us, ICT revolutionizes life, leaving us blissfully illiterate. Legislation like GDPR ensures our data is ‘fairly’ handled—like a toddler with a cupcake, but with a better outcome!
Enhance Your Fiction: Show, Don’t Tell Explained
So, the whole “show don’t tell” thing in writing is about mixing action and emotions instead of just stating them, making stories more engaging. It’s about creating atmosphere without overexplaining or boring readers.
Utilizing IIFE and Lambda Functions in JavaScript for Effective Scope Management
One of the biggest headaches when working in JavaScript is that it has no implementation of namespaces or modules – custom functions you define may accidentally overwrite existing functions in your code or in any of the libraries that you use, making it easy to accidentally declare global variables, mess up your scope, and introduce…
Cybersecurity Chunks: Diffie-Hellman Key Exchange
In this article we look at the DH process, its uses, and the mathematics behind it.
Cybersecurity Chunks: Zero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA) is a culmination of the principles of Zero Trust to provide secure remote access to networks, data, and devices by providing granular control to specific resources and ongoing security checks of connected devices.
Cybersecurity Chunks: Zero Trust
In a world where internet cowboys and threat actors are out to breach your network defenses and steal all your precious personal and organisational data, who can you trust? Furthermore, how do you ensure trusted users remain trustworthy?
Something went wrong. Please refresh the page and/or try again.



Leave a comment