A white-paper related to securing future mobile networks Continue reading “Security in 4G and Other Mobile Networks”
I have developed a PHP script that allows you to shorten links on your own website. It is easy to apply CSS to and is very light-weight. Continue reading “FREE PHP script for shortening URLs like tinyurl.com”
This script is geared toward other developers who want to speed up their programming of a billing solution. It allows you to take payments directly from your website and creates a subscription so that the user is billed monthly for the selected amount of time. The script uses PayPal Pro as its payment processor. It works with any HTML form!
A small script for accepting recurring subscriptions with PayPal. Continue reading “PHP Script for accepting direct recurring subscriptions through PayPal Pro”
Human-computer interaction usability test of PhotoDex’s ProShow Gold software. Continue reading “ProShow Gold Usability Review”
Enterprise system security risks and measures. Continue reading “Enterprise Security Risk and Evaluation”
An overview of enterprise resource planning and its benefits. Continue reading “Enterprise Resource Planning”
This article describes how usability issues can alter the success rate of a new enterprise system. Continue reading “Usability Issues in Enterprise Architecture”
This article describes how working in virtual teams has evolved recently and ways that it can improve efficiency in the workplace. Continue reading “Working in Virtual Teams”
This article describes the differences between enterprise and systems architecture. Continue reading “Enterprise vs. Systems Architecture”
This is an introduction to the many threats that computer systems and users face on the internet. Methods that users can implement to protect themselves are also explored. Article by Kevin Rio.
This is an introduction to the many threats that computer systems and users face on the internet. Methods that users can implement to protect themselves are also explored. Article by Kevin Rio. Continue reading “Internet Security Threats And Protection Methods”