How We Solved Authentication and Authorization in Our Microservice Architecture

  At Andela, we have multiple internal apps built by the internal Engineering teams used to manage internal process and to make us more efficient. As time passed, the number of apps increased and each app had to evolve alongside the passing of time to enable us handle our growth. We started experiencing a number[…]

Twitter accounts hacked, Twitter Counter steps forward as culprit

Twitter Counter, a third-party analytics service, appears once again to have provided a gateway for hackers to post messages to high-profile Twitter accounts.An unlikely number of Twitter users suddenly learned to speak Turkish on Wednesday, posting an inflammatory message in the language replete with Nazi swastikas.–– ADVERTISEMENT ––Among those posting the message were the Twitter[…]

For Marketers, a Brand Safety Wake-Up Call – eMarketer

The Google ad boycott is more than a black eye for the internet giant, it’s a wake-up call to the advertising industry. And that may not be a bad thing, according to Marc Goldberg, CEO of Trust Metrics, a publisher verification firm. “Google’s position at the moment has put a lot of advertisers in a[…]

Understanding Today’s Cyber-Security Threats

Over the past few years, digital technologies have rippled through the business world and unleashed unprecedented innovation and disruption. Yet today’s technology framework also has put businesses in the crosshairs and created new levels of risk.No longer are cyber-threats thwarted by clearly defined perimeters such as firewalls. No longer are malware and cyber-attacks blocked by[…]

IoT edge computing presents next big challenge for cloud

As much as we try, it’s impossible to defeat physics. I’m speaking specifically of data gravity and compute. The internet of things on the edge of the network has a dramatic impact on IT operations and vendor services.For example, internet of things (IoT) forced a change in data patterns, prompting Amazon to release Snowball Edge[…]

Words to go: Containers in cloud computing

With the popularity of containers in cloud computing, more organizations are choosing to not think outside the box.Containers have been around for a while, but Docker recently helped bring them into the spotlight for enterprise use. As the cloud evolves, more enterprises see the benefits of adopting hybrid and multicloud models, but it’s a challenge[…]

Guess goes all in on Android Wear 2.0 as it reboots its smartwatch strategy 

While we haven’t seen too much in the way of must-have Android Wear 2.0 wearables from traditional tech companies like LG or Google, fashion watch makers are fully embracing Google’s new mobile OS. In the past week, Tag Heuer and Montblanc have both announced Android Wear 2.0-powered smartwatches, and now Guess is looking to get[…]

It’s time to face the ugly reality of face recognition 

A hoax hit Facebook this week. Fake news about a fake app called Facezam claimed that the app could track down anyone by simply scanning their Facebook photos.Thousands or millions of Facebook users fell for the hoax and freaked out. (A U.K. marketing agency created the hoax as a publicity stunt.)The public reaction illustrates how[…]