Tech News

Samsung Galaxy J8 | New mid-range smartphone launched in PH

The newest addition to the Samsung Galaxy J-series family has been recently launched and it is packed impressive hardware to contend in the mid-range segment. It features a 6.0-inch HD+ Infinity sAMOLED display, a Snapdragon 450 Octa-Core processor, 3GB of RAM and also a dual rear lens camera consisting of a 16-megapixel (f/1.7) + 5-megapixel (f/1.9) […]

Enterprise Tech

INTERVIEW | ASG Technologies Continuous To Provide Automation Business Solutions In PH

Originally offering mainframe management software, ASG Technologies has been providing mission-critical technology solutions for hybrid enterprises around the world. “Our clients range from large financial institutions, BPOs, and even telecommunication companies,” said Praveen Kumar, general manager at ASG Technologies for Asia-Pacific in an interview with Ira James. “And most of our clients are very interested […]

Gadget Reviews

REVIEW | MSI GE73 RAIDER RGB 8RF

Whether you are a student, a gamer, or a working professional, there are moments that you need to bring a computer with you that can bring you the power that you need to game and do hardware resource intensive work like video editing and 3D rendering. MSI has been known to bring powerful gaming laptops […]

Gadget Reviews

REVIEW | ASUS Zenfone Max Pro (M1)

Asus has been  penetrating the smartphone market in all price ranges with their Zenfone lineup, offering different models for different kinds of lifestyles. Notably, the Zenfone Max has been a smartphone known for having maximum uptime allowing you to be always connected without having to scour for a power source every few hours. Here, we […]

Cyber Security

Cybersecurity in APAC: The art of simplicity and being on the right side of history

We all have “a-ha” moments when that lightbulb above our heads is just too bright to ignore. One came to me when I was in a previous IT operations role.  It happened on a day when I had two meetings: first with an endpoint agent team and another with a security operations team. The endpoint […]

Cyber Security

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts (source: https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/). For added perspective, a smart contract […]

Categories