Back to Top

Welcome to The Easy Pace!

We are James and Oliver, and we started The Easy Pace because we wanted to examine the most popular technologies, discussing their pros and cons. Our goal is to help people understand how various technologies work, allowing them to decide if they should be utilized in their homes and businesses (or not).

We use this website to highlight the positive and negative aspects of the Internet, wireless standards, IoT gadgets, various security mechanisms, operating systems, cloud services, etc.

You can find articles that discuss these hot topics (and more) on our Blog. We hope that you will enjoy your stay here! Don't forget to revisit The Easy Pace soon; we plan to update its content regularly.


Key Technology News

How this fortune 100 executive is diversifying the technology industry

READ MORE

Artificial intelligence technology powers online college degrees

READ MORE

Ford factories experiment with gaming-style body tracking technology

READ MORE

Energy-blockchain advocates hit back at criticisms

READ MORE

Our Mission

We help people figure out the inner works of the Internet and other technologies by deconstructing them into easy to understand subsystems.


We offer an unbiased view, highlighting the pros and cons of each technology.

Recent Blog Posts

Python pros and cons


Oliver: Python was invented back in 1991 as a script-based programming language which was supposed to help automate boring, repetitive tasks.

It was similar with the language used for the batch files that were utilized while the DOS operating system was ruling, if you will. However, Python's popularity and flexibility have exploded over the last few years.

According to Stack Overflow, Python has recently broken into the world's top three most popular programming languages.

It is not surprising, because Python is easy to learn and easy to use. Fortunately, Python distributions are available for all the important OSs, and most of them are 100% free.

Here's how the code for a "Hello World" application looks like in Python:

print("Hello world!")

So, let's compare the source code with the one that is needed for the same application written in C++...

Read the article

An unbiased Wi-Fi guide


Oliver: Computer networks are essential, especially in a business environment. Not only that, but more and more peripherals can be connected to a network, and most of them provide Wi-Fi support as well. So, what are the pros of a wireless network?


It may be obvious, but one of the key advantages of a wireless network is device mobility. We are all used to taking our laptops, tablets and phones to another room without carrying a LAN cable with us, aren't we? In addition to this, public wireless networks make it really easy to work in coffee shops and other similar locations, thus increasing productivity. Wi-Fi also makes it possible for an employee who is traveling to get access to the company database securely by using a VPN service, and then check the current stock levels, for example.


Wireless networks are also easy to set up. To get started, you will only need to use an access point. More than that, the range of a Wi-Fi network can be expanded easily, by adding more access points or better antennas and external cables.


Everyone knows that money can be a serious issue for small business owners. So, another positive aspect is the fact that you can create a wireless network for your company for...


Read the article

Why you should use 2FA


Oliver: Two-factor authentication, also known as 2FA, adds an extra level of security to your accounts. You can use 2FA to secure your email account, social media accounts, online banking account, and more. Two-factor authentication will help keep your accounts safe even if a hacker manages to get access to your user ID and password for a particular account. It's a very simple way of preventing data breaches, which have grown by an alarming 41% in the UK in 2017, for example.


2FA utilizes something that only you should know to complement the login data. It may be a master password, a pin code, an SMS code, a hardware dongle, the answer to a secret question, and so on. In fact, this is exactly how credit cards work! A person who steals your card will not be able to withdraw money from it, because it doesn't have its pin. So, in this case, your pin code is the second authentication factor.


Let's imagine that you want to access your online banking account. You visit the login page, and then you input your user name and password combination. Rather than logging you in, the site will send an SMS code to your mobile phone, and then ask you to input it in a dedicated website form. If you input the wrong code, the website will deny access; otherwise...


Read the article

 

Join Us


If you like The Easy Pace, there are several ways to help:

- Email us interesting article ideas, or help our team improve by giving us valuable feedback;

- Join our small group of tech experts and write unbiased, easy to understand articles;

- Buy us a coffee/give us a tip;

- More.

CONTACT US