Tech Insight
How To Check Your Web Usage
In this insight, we look at the many ways to check how much bandwidth you’re using, thereby helping to avoid exceeding data caps, and providing other benefits. Why Monitor Bandwidth? As we move deeper into the digital age, internet usage is skyrocketing, and with it, the necessity to manage bandwidth. For businesses, this is even…
Read MorePython in Excel … So What?
Following the announcement that Microsoft is releasing a public preview of Python in Excel, we look at what this will mean for Excel users and how it could help businesses. What Is Python? The initial version was created in the late 1980s by Guido van Rossum, with its first official release, Python 0.9.0, coming out…
Read More70% Of Companies Used Generative AI
A new VentureBeat survey has revealed that 70 per cent of companies are experimenting with generative AI. Most Experimenting and Some Implementing The (ongoing) survey which was started ahead of the tech news and events company’s recently concluded VB Transform 2023 Conference in San Francisco, gathered the opinions of global executives in data, IT, AI, security, and…
Read MoreWhat Is ‘Synthetic Data’ ?
In this insight, focusing particularly on AI and ML, we look at what synthetic data is, where it comes from and what it’s used for, its challenges, and the implications for businesses. What Is Synthetic Data? Synthetic data is data that’s been artificially created rather than derived from real-world activities. Synthetic data is not a…
Read MoreWhat Are ‘Deepfake Testers’ ?
Here we look at what deepfake videos are, why they’re made, how they (might) be quickly and easily detected using a variety of deepfake detection and testing tools. What Are Deepfake Videos? Deepfake videos are a kind of synthetic media created using deep learning and artificial intelligence techniques. Making a deepfake video involves manipulating or…
Read MoreWhat Are ‘Zero-Day’ Attacks?
In this tech insight, we look at what ‘zero-day’ attacks are, then look at some recent high-profile examples and ultimately at what businesses can do to protect themselves from zero-day attacks. Sophisticated Attacks That Highlight Vulnerabilities In the ever-evolving landscape of digital threats and cyber warfare, one term often sends chills down the spines of…
Read MoreVoice Changers
In this insight, we look at ‘voice changers’, technology that lets users change and disguise their voices in real time and in playback. What Do They Do & How? Voice changing software (and hardware) alter the sound of a person’s voice in real-time or during playback. Voice changers can be implemented through software applications installed…
Read MoreConsidering a Refurbished Mobile ?
In this insight, we look at what refurbished phones are, their pros and cons, things buyers may wish to consider when purchasing one, examples of where they can be purchased, and how refurbished phone retailers could help customers to choose their ideal refurbished phone. What Is Meant By ‘Refurbished’? A refurbished phone is a pre-owned…
Read MoreEmail : Terminating Trackers
In this insight, we look at what email trackers are, how they work, what the main concerns about them are, plus how you can protect yourself from email trackers. What Is An Email Tracker? An email tracker is a tool or technology used to monitor and track the activities associated with emails. It provides information…
Read MoreGoogle Deletes Dormant Data
In this insight we look at Google’s updated inactive account policy whereby Google accounts not used for 2 years could be deleted, meaning the loss of important emails, photos, data and more. Gmail, YouTube, & Google Photos Accounts The inactive account deletions are part of a policy change for Google’s products and will apply to…
Read More