Thom Heemstra's blog

Welcome to Thom Heemstra’s blog

4th August 2017 by thom Leave a Comment

Welcome to my blog. My name is Thom Heemstra. My blogs will be of a technical nature, some may have a more philosophical or ethical ground.
I’m very interested in Internet of Things (IoT), Blockchain technology, Big Data (Analysis/Processing).
Very early in life I started my own company, which was later named XSbyte, an internet service company (B2B).

Feel free to connect with me: LinkedIn | Twitter

Filed Under: Announcements Tagged With: meta

Recent Developments in Blockchain

27th February 2020 by thom Leave a Comment

Blockchain is a list of records that are growing and which are connected or linked using a technology called cryptography. It is basically a design of an open ledger which is used to record the transactions between two parties in an efficient and permanent manner. The technology of blockchain has evolved over these years but it has maintained its position in the market as it still offers much more than the other technologies available in the market (Abrams & Agarwal, 2016). Following are some of the recent developments of blockchain that will leave you amazed. [Read more…]

Filed Under: BlockChain, Money, Responding to news, Security Tagged With: baas, security, smart contracts

Top 5 SEO Mistakes Made By Marketing Agencies

25th October 2019 by thom Leave a Comment

SEO is search engine optimization and due to the advancement of technology, the importance of digital marketing has increased. It is now a requirement for everyone to be on the digital platform in order to attract new customers. Due to this, everyone is making major investments to beat the game of SEO. The marketing agencies are the ones which are more into it as it’s their core responsibility to deal with customers in terms of catering them and retaining them (Brag, 2018). [Read more…]

Filed Under: SEO Tagged With: black hat seo, marketing, on page SEO, on-site SEO, SEO, white hat SEO

Why Is Link Building Important For SEO?

11th October 2019 by thom Leave a Comment

Links and link building is always important for websites. It allows the other websites to link back to your website. This process is also known as internal linking. Everyone including the marketers and businessmen are interested in building links. It helps to earn higher rankings which will ultimately lead them to be considered as the most visited websites which are now a dream of everyone out there in the digital world. The building of links is important for another reason as well and that is if the links are built then it will be considered that your website is a quality assured website by the search engine optimization and is free of thin content (Kumar, 2017; Maviridis, 2015). The websites can get link building by both good and bad ways but it is highly recommended to earn the link building rather than buying it. The bad way is to purchase the link building from other websites which shows that your website is not competitive enough to earn that link. [Read more…]

Filed Under: New Media, SEO Tagged With: on-site SEO

Internet Privacy Issues And Ways It Can Be Compromised

13th September 2019 by thom Leave a Comment

It has become nearly impossible for everyone to live an anonymous life on the internet. No one can imagine how much they are vulnerable and to what extent their personal information is available on the internet (Chaum, 2016). Everyone has to face privacy issues as the marketers keep on gathering information about individuals in order to run their business and cater to new customers. [Read more…]

Filed Under: Big Data, Privacy, Responding to news, Security

10 Practical Tips to Improve Online Privacy

23rd August 2019 by thom Leave a Comment

In today’s digital and progressive world where everything is available online and everybody feels compulsory to have accounts on social websites then the risk of violation of online privacy increases. The following are some of the tips that should be followed by everyone in order to improve online privacy (Naughton, 2015; Perekalin, 2019). [Read more…]

Filed Under: Privacy, Security, Tutorials Tagged With: Encryption, login, passwords, phishing, security, wifi

5 Interesting Developments In The Iot World

2nd August 2019 by thom Leave a Comment

The internet of things is a system of interrelated computing devices, people, objects, mechanical devices that provide two benefits. The first one is that it requires unique identifiers (UIDs) and the second one is that it helps to transfer the data over a network without any interference of anyone. The technology is emerging immensely that it has IoT to put forward its contributions as well by making amazing developments that are as follows (Fan & Chen, 2017): [Read more…]

Filed Under: Big Data, Internet of Things, Privacy, Responding to news, Security

Why Should A User Have An Adaptive Defense?

12th July 2019 by thom Leave a Comment

With the progressing field of information technology, network attacks are also something that has grabbed everybody’s attention. The network attacks have been increased due to which the developers have to introduce systems or methods which will help in detecting these attacks. Based on the principle of Adaptive Defense, Panda has developed a security suite and it is known as Panda Adaptive Defense. It operates on the basis of four principles. The first principle is prevention, detection and response. It is applicable for both the malware and malware-less attacks. The second principle is real-time and historical visibility. It not only detects the threats rather it also provides detailed information about all the actions that are taken in order to trace that threat (Panda Security SL (ES), 2015). The third principle is that it provides 100% classification of processes. They follow this principle by detecting threats using machine language and the malware experts as well. The last principle is threat hunting and forensic analysis. As it is an advanced cybersecurity system so it detects or hunts the future threats as well and after that, the analysis is performed by the expert analysts. [Read more…]

Filed Under: Artificial Intelligence, Big Data, Privacy, Security

IOT Security regulations: Is it the answer?

1st March 2019 by thom Leave a Comment

The Internet of Things brings both magical opportunities and devastating vulnerabilities.

The basic idea of IoT, internet of things, is taking all the things in the world and uniting them to the internet. As we know, that by connecting a device to the internet; you give it the ability to send data and receive data. For example, connecting our smart phones to the internet lets us view the weather and read the news, of all around the world. (McClelland, C. 2017)

Likewise, an example of IoT helping the world would be that farmers can remotely get a report about the soil moisture of their farm. Such can help them in judging when they need to water their crops. (McClelland, C. 2017)

It’s all sun and shine till we get to the part that connecting anything to the internet makes it more vulnerable to hackers and automated hacking attempts. [Read more…]

Filed Under: Internet of Things, Security Tagged With: iot, opinion, security

What can domain owners do to protect private information?

1st February 2019 by thom Leave a Comment

It is becoming more evident that privacy in this digital age requires more than just maintainence.

The digital age has made it easier than ever to connect with our friends and family. Opening an account on a social media site only takes a few minutes. Once they fill up the site’s registration form, they are good to go.  (Martineau, M. 2016)

However, by filling the form, they also agree to something that never gets stated outright. That something is the chance of losing one’s data. [Read more…]

Filed Under: Privacy, Responding to news, Security, Webhosting Tagged With: domains, Privacy, saas, whois

Cloud computing & Cybersecurity: The changing trends

4th January 2019 by thom Leave a Comment

Cloud Computing and Cybersecurity is slowly becoming one with each other. Without the latter, the former isn’t feasible.

A simple way to describe Cloud computing is that it’s the delivery of on-demand computing services through the means of internet, basically using someone elses computing power. It is used to deliver the processing power needed to run applications, storage of files or processing requests. Generally, to a person that needs those services, but lack the required infrastructure. It was storage that Cloud computing was initially famous for. (Rossi, B. 2017)

Now, let us see some trends that are quickly changing in Cloud Computing and Cyber Security. [Read more…]

Filed Under: Big Data, New Media, Responding to news, Security Tagged With: Artificial Intelligence, cloud, cloud computing, security

  • 1
  • 2
  • 3
  • …
  • 6
  • Next Page »
Error: To protect our users from spam and other malicious activity, this account is temporarily locked. Please log in to https://twitter.com to unlock your account.

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2023 · Agency Pro Theme on Genesis Framework · WordPress · Log in