How To Check Your Web Usage

Bandwidth

In this insight, we look at the many ways to check how much bandwidth you’re using, thereby helping to avoid exceeding data caps, and providing other benefits.  Why Monitor Bandwidth?  As we move deeper into the digital age, internet usage is skyrocketing, and with it, the necessity to manage bandwidth. For businesses, this is even…

Read More

Python in Excel … So What?

Python in Excel

Following the announcement that Microsoft is releasing a public preview of Python in Excel, we look at what this will mean for Excel users and how it could help businesses.  What Is Python?  The initial version was created in the late 1980s by Guido van Rossum, with its first official release, Python 0.9.0, coming out…

Read More

70% Of Companies Used Generative AI

A new VentureBeat survey has revealed that 70 per cent of companies are experimenting with generative AI.  Most Experimenting and Some Implementing  The (ongoing) survey which was started ahead of the tech news and events company’s recently concluded VB Transform 2023 Conference in San Francisco, gathered the opinions of global executives in data, IT, AI, security, and…

Read More

What Is ‘Synthetic Data’ ?

What Is Synthetic Data?

In this insight, focusing particularly on AI and ML, we look at what synthetic data is, where it comes from and what it’s used for, its challenges, and the implications for businesses.  What Is Synthetic Data?  Synthetic data is data that’s been artificially created rather than derived from real-world activities. Synthetic data is not a…

Read More

What Are ‘Deepfake Testers’ ?

Deepfake Testing

Here we look at what deepfake videos are, why they’re made, how they (might) be quickly and easily detected using a variety of deepfake detection and testing tools.  What Are Deepfake Videos?  Deepfake videos are a kind of synthetic media created using deep learning and artificial intelligence techniques. Making a deepfake video involves manipulating or…

Read More

What Are ‘Zero-Day’ Attacks?

Tech Insight : What Are 'Zero-Day' Attacks?

In this tech insight, we look at what ‘zero-day’ attacks are, then look at some recent high-profile examples and ultimately at what businesses can do to protect themselves from zero-day attacks.  Sophisticated Attacks That Highlight Vulnerabilities  In the ever-evolving landscape of digital threats and cyber warfare, one term often sends chills down the spines of…

Read More

Voice Changers 

Tech Insight : Voice Changers

In this insight, we look at ‘voice changers’, technology that lets users change and disguise their voices in real time and in playback.  What Do They Do & How?  Voice changing software (and hardware) alter the sound of a person’s voice in real-time or during playback. Voice changers can be implemented through software applications installed…

Read More

Considering a Refurbished Mobile ?

Considering Refurbished Mobiles?

In this insight, we look at what refurbished phones are, their pros and cons, things buyers may wish to consider when purchasing one, examples of where they can be purchased, and how refurbished phone retailers could help customers to choose their ideal refurbished phone. What Is Meant By ‘Refurbished’? A refurbished phone is a pre-owned…

Read More

Email : Terminating Trackers

Email : Terminating Trackers

In this insight, we look at what email trackers are, how they work, what the main concerns about them are, plus how you can protect yourself from email trackers. What Is An Email Tracker?  An email tracker is a tool or technology used to monitor and track the activities associated with emails. It provides information…

Read More

Google Deletes Dormant Data

Google Deleting Dormant Data

In this insight we look at Google’s updated inactive account policy whereby Google accounts not used for 2 years could be deleted, meaning the loss of important emails, photos, data and more. Gmail, YouTube, & Google Photos Accounts The inactive account deletions are part of a policy change for Google’s products and will apply to…

Read More