In this tech-insight, we take a brief look at billionaire Elon Musk’s usage of Twitter, how and why he makes such use of the platform, and what Mr Musk’s interactions can teach businesses about using Twitter. Who Is Elon Musk? South African-born, business magnate Elon Musk, is the CEO, early investor and Product Architect of…

Read More

In this article, we look at whether there is evidence to suggest that people lie more online, and what the message is for businesses.  Lying  Just 3 years after the World Wide Web was introduced to the public domain, a report was published by University of Virginia psychologist Bella M. DePaulo (DePaulo, Kashy, Kirkendol, Wyer, and Epstein) which revealed that most people,…

Read More

In this tech insight, we take a brief look at the WEP and WAP security protocols, and what happened to them. What Is WAP? Developed by Ericsson, Motorola, Nokia, and Unwired Planet, and introduced back in 1999, Wireless Application Protocol (WAP) was a security standard for devices with a wireless Internet connection on a mobile…

Read More

In this insight, we look at what a digital twin is, what the benefits of using one are, and which industries commonly use digital twins. What Is It? A digital twin is an accurate virtual model of a physical object that uses data gathered from sensors on the physical object to run simulations, study performance…

Read More

In Apple’s new “Building a Trusted Ecosystem for Millions of Apps” white paper, it describes the threat posed by ‘sideloading’ on its App Stores. Here’s what you need to know.  Sideloading Sideloading normally refers to transferring a file between two local devices without the use of the internet e.g., by connecting your computer to a smartphone…

Read More

In this tech-insight, we look at the role of the Information Commissioner’s Office, and how it can be a source of valuable compliance information and help to businesses. What Is It? The Information Commissioner’s Office is the UK’s independent, non-departmental public body set up to uphold information rights in the public interest. The ICO also…

Read More

In this tech-insight, we take a look at what QR codes are used for, review some well-known security risks, and outline what action you can take to protect yourself from malicious QR codes. Quick Response (QR) Codes A QR code is a machine-readable (e.g., by smartphones), matrix barcode invented in 1994 by the Japanese Toyota…

Read More

In this tech-insight, we take a brief look at what solid-state batteries are, their benefits and challenges, and how why they hold a great deal of promise for use in electric vehicles in the near future. Solid State A solid-state battery is a battery that has solid electrodes and solid electrolytes to transfer ions from the…

Read More

In this article, we look at what doxing is, the legality of it, some examples of doxing, and we consider what we can do to protect ourselves and our businesses from attack. What Is Doxing? Doxing is a term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxing is a…

Read More

In this article, we look at what 3D printing is, its benefits, and how it is being used now to add value in many different industries. What Is It? 3D printing (“additive manufacturing”) describes how, using a special printing machine, a three-dimensional object can be constructed from a CAD model or a digital 3D model.…

Read More