News
Cyber security professionals underestimate vulnerabilities until hit
Is Your IT Team Proactively Protecting Your Digital Infrastructure? With constant news of private and public security breaches.
ContinueArticle
The IT-driven management revolution
The Information Technology (IT) industry has helped birth a new culture of management and leadership.
ContinueNews
The future of human computer interaction
Although the computer has been an indispensable part of our lives for decades, the mouse/keyboard method of
ContinueNews
Ensuring database security
Database breaches are an exponentially increasing threat. This is why we at OWDT consistently integrate leading-edge security into our websites.
ContinueNews
The new, improved internet
Http/2 (Hypertext Transfer Protocol 2) is a relatively new Internet binary protocol that is fast becoming the new standard.
ContinueNews
The smartphone changes everything
To say that the smartphone ranks among the greatest technological changes of all time sounds like hyperbole.
ContinueNews
Computer technology breakthroughs in 2014 & 2015
Major developments in 2014 There were major desktop/laptop/monitor and portable device breakthroughs in 2014.
ContinueNews
Evaluating tor and other anonymizing security tools
Last October I wrote several blogs on differences between the Surface Web, the Deep Web and the Dark Web.
ContinueNews
Security update recommendations
Internet criminals are armed with a growing repertoire of stealthy, often automated, tools.
ContinueNews
Tech revolutions that will shape the coming decade
With the deluge of news about the tragic terrorist attacks in Paris last week, less media attention has been given ISIS' intrusion into cyberattack on U.S....
Continue





