Latest Stories
Most recently published stories in 01.
Best 4K Monitors in 2018. Top Story - August 2018.
Want to enhance your computer experience? Then transition to 4K. Whether you’re a gamer or someone who is constantly buying the best media streaming devices, 4K monitors can offer you an experience of a lifetime with ultra HD graphics that are sharp and lifelike.
By Bill Shaffir8 years ago in 01
10 Ways the Internet Affects Peoples' Minds
The internet is one of the most significant innovations of all time. The story of who invented the internet is even significant. With it, the world has been able to interact with one another in ways never before imagined. As amazing as the changes have been, this unprecedented shift in the way we work has affected our brains in a myriad of ways.
By Joshua Samuel Zook8 years ago in 01
Outdated Frameworks and Legacy Code Hampers Future Technology
There's a long-standing tradition in the IT realm that revolves around leaving the legacy code alone unless it fails spectacularly. Plenty of factors can be attributed to why so many important networks run off of code that hasn't been modernised in over a decade, be it cost or concerns relating to a loss of services should upgrades go poorly, but this insistence on sticking to the familiar is bogging down our march towards the future.
By Andrej Kovacevic8 years ago in 01
What is UX and UI Design?
UX & UI Design is often spoken of as a pair; They’re the twins that are always associated with each other. While User Experience and User Interface Design both work towards the same end goal: creating a clean, unobtrusive, responsive site, they each have their nuances.
By Ariana V.S.8 years ago in 01
Social Engineering: How Cyber Criminals Thrive on Human Psychology
Social engineering is becoming one of the most popular methods used by cybercriminals for both big and small crimes. Essentially, social engineering is a way to gain access to networks, systems, or data by exploiting human psychology and curiosity rather than using technical hacking techniques. Using a variety of methods, including phone calls and social media messaging, attackers trick people into giving them access to valuable personal or corporate information.
By Laura Tyrell8 years ago in 01
How to Choose the Right Laptop for You
Remember the days when your entire family shared one big ol' desktop computer, and you'd fight tooth and nail for your half hour of playing minesweeper? Ah, simpler times. But now, we have access to incredible technologies, computers that can do a thousand times more than those old desktops. And that's great! But it also means that when you need a new laptop, you have a LOT of options to sift through. You want to make sure you choose the right laptop for you and your individual needs, not just the best laptop to buy this year based on what's most highly rated or popular at the moment. That means you should take into account a wide range of factors, and consider such things as: how you plan to use the laptop, your budget, and your memory requirements. Here, I'll go into a little more detail about these kinds of factors, and how to choose the right laptop for you.
By Nicola P. Young8 years ago in 01
A Virginia Bank Breached Twice and No Fix
Hello folks, this is Jared once again, and this time, I’m here to talk about an article entitled "Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M" and how I think its the bank that neglected to fix the underlying problem.
By Jared Rimer8 years ago in 01
A Theory of Wireless Electricity. Top Story - July 2018.
We discuss the revitalization and development of wireless electricity technologies within our generation. The goal is to show that society is developing wireless technology cautiously and ethically as opposed to the blind pursuit of technology demonstrated by our past. We achieve this goal by examining the various power generating and consumer electronics applications in use or planned use, by developed nations. We reviewed the concept of wireless electricity against the following areas: political and legal issues, economics, psychology and sociology, culture and the media, environmental implications, morality, and ethics.
By Felix Martinez8 years ago in 01
Book Review: 'Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground' by Kevin Poulsen
Hello everyone, this is Jared, this time I’m here on Vocal to talk about a book entitled Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen as I’ve recently read it as of late.
By Jared Rimer8 years ago in 01
Best Laptops for Students Under $500
Save that pretty penny, or in this case, a few hundred dollars because, although you are a student, that doesn’t mean that you have to be broke. We often hear horror stories about students going into debt by thousands of dollars paying for tuition, rent, or taking out a loan for a brand new laptop. Let’s face it, in this day of age, it is seemingly impossible to go through school without a laptop as most of the curriculum is online-based. Sure, you can settle and go to the school library every day after class to do some research and get homework done, but it’s just not the same as having your own personal laptop.
By Joshua Samuel Zook8 years ago in 01












