IT & Security News
Google Workspace vs Microsoft 365
In this article, we take a brief look at the relative merits of Office 365 compared to Google Workspace and how Google’s recent introduction of features and greater integration have been aimed at challenging Microsoft 365’s dominant position. Google Workspace Many of us are likely to have started with a Gmail account and witnessed how,…
Dramatic Decrease in Crypto Consumption of Power
Rising electricity prices, energy-hungry crypto mining operations and falling cryptocurrency prices are thought to be behind a significant decrease in the amount of electricity being used for crypto mining. What Is Crypto Mining? Crypto mining, such as Bitcoin mining, uses specialised computers that are constantly powered-on and connected to the cryptocurrency network to verify transactions…
Why AI Systems Can’t Patent Inventions …Yet
Following a recent Intellectual Property Office (IPO) consultation, it has been decided that AI will not be allowed to patent inventions. What’s The Issue? As highlighted by a legal battle dating back to 2018, some people believe that if AI systems invent something, they should be granted the status of being listed as the inventor…
What Are Wi-Fi 5 And 6 … And What’s The Difference?
In this tech-insight, we look at what Wi-Fi 5 And 6 are including their differences plus the improvements that Wi-Fi 6 offers. Wi-Fi Standards Wi-Fi 5 and Wi-Fi 6 are the names of the most recent Wi-Fi standards. Wi-Fi standards are sets of services and protocols that dictate how a Wi-Fi network (and other data…
How Can You Protect Yourself From ‘Identity Theft’?
With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud. What Are Identity Theft and Identity Fraud? Identity theft is when…
New Windows Feature Displays Which Apps Have Been Listening-In
The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity. See Which Apps Have Accessed Your Microphone and Camera David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…
What Is ‘Data Gravity’ ?
In this insight, we look at what ‘data gravity’ is, what challenges it creates, and some ways in which businesses can tackle data gravity challenges. What Is Data Gravity? Working with (larger) datasets means the need to collect, store and manage the data and move it around to different applications. The data then accumulates (builds…
Internet Explorer is Dead. Long Live The King?
Microsoft’s Internet Explorer browser has been retired after 27 years and here we take a brief look back over its history and why it fell behind competitors before being succeeded by Microsoft Edge. It Came From ‘Mosaic’ Microsoft first launched its Internet Explorer (IE) browser in 1995. The browser was built under license to Microsoft…
Fewer Cookie Pop-Ups – But At What Cost?
A government Bill has laid out a new UK data protection regime (which diverges from EU regulations) and which the government says will ease the burden of compliance on businesses. Data Reform Bill The government says that the ‘Data Reform Bill’, announced in this year’s Queen’s Speech, and outlined as part of London Tech Week,…
[grid_plus name="Tech News"]