Cloud & mobile security – take aim, save the data

By Rob Bamforth, Quocirca. This article first appeared on In all the hubbub around mobile users increasingly making their own choices of operating systems and hardware, something has been lost sight of - it doesn't really matter if you bring your own device (BYOD), a more pressing matter for businesses should be 'where is our [...]

By |2017-07-22T13:02:51+00:00December 15th, 2014|Categories: Contributed Articles, Mobile|Tags: , , |0 Comments

Unifyle Sync Provides Local Access to All Your Data

In a previous article (BYOD or BYOIT), I talked about all the benefits of Unifyle for bringing together all your enterprise data sources into a single UI. Today I wanted to follow up on that article and mention another great feature we offer. It's called Unifyle Sync and it's a Windows app that connects to the users [...]

By |2017-07-22T13:02:51+00:00December 12th, 2014|Categories: Apps, Featured Post|Tags: , , |0 Comments

Secure Spaces integration with Blackphone give users unprecedented choice

Secure Spaces provides multiple virtual phone capability to Blackphone - Blackphone's Silent Space delivers the ultimate in private communications for users. OTTAWA, Ontario, Dec. 9, 2014 /PRNewswire-iReach/ -- Graphite Software announced today that the Blackphone will be updated to include Secure Spaces, adding the unique capability for users to create multiple separate spaces for apps, [...]

By |2017-07-22T13:02:51+00:00December 10th, 2014|Categories: Mobile, Security and Privacy|Tags: , , |0 Comments

Google Glass – seeing is believing

By Bob Tarzey, Quocirca. This article first appeared on I must admit to being sceptical about the whole 'wearables' thing. However, I was intrigued at recent Google event to be given an opportunity to try out a pair of Google Glass glasses. Glasses have been part of my life for as long as I [...]

By |2017-07-22T13:02:51+00:00December 10th, 2014|Categories: Contributed Articles, Gadgets|Tags: , |0 Comments

The problem of buggy software components

By Bob Tarzey, Quocirca. This article first appeared on What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers to speed-up the development of their own bespoke programs. Heartbleed was in OpenSSL (an open [...]

By |2017-07-22T13:02:51+00:00December 8th, 2014|Categories: Contributed Articles, Security and Privacy|Tags: , |0 Comments

Think-again Tuesday?

By Bob Tarzey, Quocirca. This article first appeared on How did your web site stand up on Black-Friday and Cyber-Monday (Nov 28th and Dec 1st2014)? These were expected to be the most frenetic online shopping days of the year. Whether you are an online retailer or processing the payments generated, if you were able to [...]

By |2017-07-22T13:02:52+00:00December 5th, 2014|Categories: Contributed Articles|Tags: , |0 Comments

NFC Payments – Apple Pay vs. Google Wallet vs. Bitcoin

Now that Apple Pay has been released, my Buddy Calvin and I did a little experimenting to discover the good and bad points about the different flavors of phone payment that we’re familiar with.  (Maverick gas station, McDonald’s, and Macey’s grocery store are all a few bits richer today.)  Everywhere that we went the vendor’s [...]

By |2017-07-22T13:02:52+00:00December 1st, 2014|Categories: Apps, Featured Post, Mobile|Tags: , , , , , , , |0 Comments
Translate »