Feeds

What is the difference between a drone, a model and a light plane?

We go shooting UAVs in Essex

Top three mobile application threats

Liked those pictures? Here's some more...

A10 Warthog RC plane in flightThe Warthog, not the prettiest, but quite a mover
We didn't catch the name of this plane, but we like itWe think this is a Hellcat This is a Republic P-47C, thank you pedantic commentards - either way, it's terribly nice looking
The UK's shrinking airforceThere's no truth in the rumours that the Royal Air Force Fleet Air Arm, as represented by this Hawker Sea Fury, is shrinking

If you want to find out more about the serious end of model aviation, you should probably start with the British Model Flying Association and the Large Model Association.

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.