Social CreditWhat will future society look like as technology’s role grows? The answers are speculative and concerning. It is clear that the daily use…Feb 18, 2022Feb 18, 2022
A Safe CareerCyberterrorism is considered a real threat by governments around the world, and many believe that future wars will be fought in this arena…Dec 3, 2021Dec 3, 2021
Trojan horsesAccording to historical accounts, the Greeks implemented a unique strategy to finally conquer the independent city of Troy. After…Sep 20, 2021Sep 20, 2021
The real digital theftsDuring virtually the entire history of civilization, one of the prerequisites for carrying out a theft has been the presence of the…Jun 7, 2021Jun 7, 2021
Password: 123456In a progressively more connected world, the expansion of the Internet and the falling price of sensors are making it possible for…May 10, 2021May 10, 2021
White Hat, Black HatThe word hack (the root of the word hacker) was already a few hundred years old before it became associated with attacks on computer…Apr 13, 2021Apr 13, 2021
The First HackerThe inexorable advance in connectivity, linking equipment used daily by billions of people, has led “Information” to the top of modern…Jan 22, 2021Jan 22, 2021
Future TellerThe primary objective of big data technology is the extraction of recommendations based on a vast sample set. Sometimes all samples…Dec 17, 2020Dec 17, 2020
Our Digital TracksThe originally French word routine comes from the word route (meaning road). Literally, routine means the road normally taken, and…Nov 13, 2020Nov 13, 2020
The Rule of DataIn 1979, American historian Elizabeth Lewisohn Eisenstein (1923–2016) published a book titled The Printing Press as an Agent of Change…Oct 30, 2020Oct 30, 2020