Profile cover photo
Profile photo
Anammae Griffin
About
Posts

Post has attachment
At the most basic level, almost every human activity carries a measure of risk. Whether it’s crossing the road or ordering a meal, we calculate our exposure to danger and adjust our behavior accordingly. The whole process is usually automatic – except…
Add a comment...

Post has attachment
This Security Audit is not a comprehensive audit of the security requirements of a particular organization. It is a checklist which will give an indication of the kinds of steps that an organization should take in securing its computer and information…
Add a comment...

Post has attachment
Automatic Signal Recognition – an emerging need Imagine a car or ‘phone that responds only to its rightful owner’s voice; a second sensor that warns of an impending axle, gearbox or engine fault; an intruder alarm that tells you if an event is benign or…
Add a comment...

Post has attachment
Biometrics seems to be the utopia in access control with the promise of no more calls to the IT helpdesk complaining of forgotten passwords or lost hardware tokens but unfortunately its just not that simple in the real world. Biometric authentication…
Add a comment...

Post has attachment
Hackathon Hackers is the largest and biggest community of hackathon attendees on Facebook so far. This is a group that gathers them to discuss, chat, entertains new techs and everything related with the hackathon. At the time of this writing, this group…
Add a comment...

Post has attachment
We are going to show you how to get some hackathon ideas for mobile games in this article. Moreover, we love following and watching hackathons because developers usually do unusual things with unusual software projects. As a result, we are able to summary…
Add a comment...
Wait while more posts are being loaded