Posted on 16 February 2012 by Thales DIS
Earlier this year, I posted a somewhat comical blog on a list of the weakest passwords being used in corporations. While we all know we will have users that use “password” for their password, it never ceases to amaze me that even with the number of recommendation and best practices available we still see major […]
Posted on 10 June 2013 by Tim Cawsey
With 2013 now well and truly underway, it’s time for us to take our now traditional look at the other tech, security and mobile blogs we think it’s worth keeping an eye on over the year ahead. While we trust you’ll all continue to check in here on a regular basis, here are five other […]
Posted on 24 June 2013 by Kim Depussé
The subject of indoor vs. outdoor mobile internet access is much debated. Currently, consumers have very different expectations when they access the internet via a mobile device indoors, and when they do so outdoors. As Dean Bubley highlighted on his blog recently, most users expect to jump through a small hoop, like ‘watching an advert, […]
Posted on 16 May 2013 by Isabelle Lodo
There’s no denying the text message is a powerful tool of communication. The mobile phone has revolutionized the way we talk to each other, and the way people consume information. Cultural anthropologist Mizuko Ito noted in her 2005 publication Personal, Portable, Pedestrian that the real power of mobile lies in our ‘close and emotional ties’ […]
Posted on 26 February 2015 by Tim Cawsey
We’ve hand-picked the best people to follow online for MWC 2015 news, interesting blogs and keynote presentations.