Skip to content

Electronics and ICT (EICT)

Electronics, Information and Communications Technology

  • Home
  • About Us
  • Electronics
  • IoT
  • Sensors
  • Cyber security
  • web hosting
  • cloud
  • Contact Us
Categories cloud

Protected: Key Criteria to Consider When Moving On-Premise Deployments to the Cloud

Amos KingatuaPosted onJune 19, 2019

There is no excerpt because this is a protected post.

Categories cloud data center

Protected: Best Practices When Moving On-Premise workloads to the Cloud

Amos KingatuaPosted onJune 17, 2019June 24, 2019

There is no excerpt because this is a protected post.

Cyber Attacks Despite Heavy Spending on Security Products
Categories Artificial Intelligence Cyber security Machine learning security

Cyber Attacks Despite Heavy Spending on Security Products

Amos KingatuaPosted onMay 21, 2019

The number of cyber attacks continues to sour despite heavy spending on security solutions. Today, the changing computing landscape that now includes the cloud, traditional … Continue ReadingCyber Attacks Despite Heavy Spending on Security Products

Categories Artificial Intelligence Cyber security security

Risks and Future of ML and AI in Cybersecurity

Amos KingatuaPosted onMay 13, 2019March 30, 2020

Using ML and AI in cybersecurity solutions has great potential to improve security as long as the technologies use accurate and clean data. Unfortunately, it … Continue ReadingRisks and Future of ML and AI in Cybersecurity

Powering Cybersecurity with Artificial Intelligence and Machine Learning
Categories Artificial Intelligence Cyber security data Data Privacy Machine learning

Powering Cybersecurity with Artificial Intelligence and Machine Learning

Amos KingatuaPosted onMay 7, 2019February 3, 2021

Artificial intelligence and machine learning have the ability to automate and increase the speed of detecting and responding to cyber threats. The technologies can enhance … Continue ReadingPowering Cybersecurity with Artificial Intelligence and Machine Learning

Don’t Fear Your PC’s Command Prompt
Categories Computers Software tools

Don’t Fear Your PC’s Command Prompt

Amos KingatuaPosted onFebruary 9, 2019September 16, 2019

There are many people who use their PCs for years without ever opening the Command Prompt. The Command Prompt, aka Command Line Interface or Command … Continue ReadingDon’t Fear Your PC’s Command Prompt

Categories Cyber security Data Privacy personal data

Protected: Personal Data Privacy Techniques in the Wake of GDPR

Amos KingatuaPosted onJanuary 29, 2019January 29, 2019

There is no excerpt because this is a protected post.

Top 10 IoT Applications
Categories building automation IoT

Top 10 IoT Applications

Amos KingatuaPosted onJanuary 22, 2019January 9, 2021

IoT applications enable organizations and individuals to improve the quality of their operations in many ways. Basically, the internet of things or IoT is the … Continue ReadingTop 10 IoT Applications

Researchers Develop Malware that Compromise Building Automation Systems
Categories building automation Cyber security

Researchers Develop Malware that Compromise Building Automation Systems

Amos KingatuaPosted onJanuary 18, 2019December 19, 2019

Research by a security company, ForeScout, has demonstrated how hackers can use malware to compromise building automation systems (BAS). The company did this by developing … Continue ReadingResearchers Develop Malware that Compromise Building Automation Systems

Categories Cyber security

Protected: AI and ML in Cybersecurity Risks and Future

Amos KingatuaPosted onOctober 24, 2018November 1, 2018

There is no excerpt because this is a protected post.

Posts navigation

Older Posts
Newer Posts

More Categories

Cobra ACXT145 compact, affordable, and lightweight two-way radio/walkie talkie for everyone - up to 16-mile range, NOAA Weather Alerts, Roger Beep Tone, Battery/Power Saver and more. 3 pack - $72.6 and 2 pack -$51.8

Recent Posts

  • PromptLock: The First AI-Powered Ransomware and What It Means for Cybersecurity
  • What is Data Decryption? How it Works, Benefits, Applications and Challenges
  • What is Data Encryption? How Data Encryption Works, Benefits, Uses and Limitations
  • Using Digital Twins, AI and ML to Streamline 6G Network Design and Optimization
  • Types of Printed Circuit Boards (PCBs)
  • Printed Circuit Board Layout Considerations and Best Practices
  • Electronics Circuits Design and Components Selection for Compliance

Recommended products

  • Smart Desk that Reduces Back Pain and Health Risks

Subscribe to Blog via Email

Copyright © 2025 Electronics and ICT (EICT) | DevotePress by Catch Themes