
5 tips to secure your mobile phone
Your mobile phone has access to a lot of personal data. Here are 5 quick tips to secure your mobile. Security on your phone is as important as security on your computer.
Your mobile phone has access to a lot of personal data. Here are 5 quick tips to secure your mobile. Security on your phone is as important as security on your computer.
This is part 6 of our series on Java modularity. In this article I discuss the unnamed module and automatic modules.
We’ve all heard about ransomware attacks, and how they are increasing all the time. Ransomware is a demand for payment in exchange for returned control over (your own) data or systems.
In part 5 of our series on Java Modularity, we look at how modularity applies to reflection.
Password hygiene is important – we all know that. We know about the importance of POPI and GDPR. But this week I discovered some problems when I tried to improve my password hygiene.
In part 4 of the series on Java modularity, we look at the concept of services. We can use the module system to specify the service interface, service implementation and service client.
If Lewis wasn’t such an outstanding Java lecturer, I’d want to hire him as a handyman. He enjoys DIY tasks, and does them with the same precision as he does everything else. (If you’ve attended one of his courses, you’ll know what I mean. I draw a vague shape on
This is part 3 of the series on Java modularity. We look at a variety of directives that can be used with Java modules.
Big companies have rigid IT policies and systems to protect intellectual property. These policies prevent employees from installing software, visiting certain sites, using USB drives and more. So when the pandemic required people to work from home, a lot of security was already in place. But what about the companies
This is part 2 in our series on Java modularity. We look at Java module declarations and descriptors, directives and naming rules.
Stay home. Stay safe. Stay informed. Find information at www.sacoronavirus.co.za
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com