IT & Security News
Life After Cookies
With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who…
AI Keystroke Spy Tools
With AI recently in the spotlight in Europe over the need to regulate over some ‘unacceptable use’, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it…
Tech Insight – Business Intelligence
In this article we look at ‘business intelligence’, how it can be obtained, and why it’s important. Business Intelligence Business Intelligence refers to how a company/organisation can use its historical data to improving strategic decision-making and thereby provide a (hopefully sustainable) competitive advantage. What Data? In day-to-day operations, businesses and organisations generate, receive, gather, and…
10 Programming Languages And Examples Of Their Uses
In this article, we take a brief look at ten popular programming languages and what they’re used for. Recent History What we would recognise as the first computer programming languages date back to the 1940s, were very specialised and were based on mathematical notation. The 1950s saw the development of the first compiled programming language…
Google Users To Be Auto-Enrolled In Two-step Verification
In a recent blog post, Google has announced that the automatic enrolment of Google account users in Two Step Verification ‘2SV’ is coming soon. Passwords – Single Biggest Threat To Online Security In the blog post on ‘On World Password Day’ (May 6), Google’s Director of Product Management, Identity and User Security, Mark Risher, shared…
Old Router Risks Could Affect Millions
An investigation by consumer watchdog ‘Which?’ has highlighted how millions of people around the UK are using old routers with security flaws. The Investigation The Which? investigation surveyed 6,000 UK adults and, with the help of Red Maple Technologies, looked at the security aspects of 13 models of (commonly used) old routers from companies such…
Softcat – 2020 Review
https://mklink.co.uk/wp-content/uploads/2020/08/Softcat.pdf The above link takes you to a review written in 2020 about Softcat’s financials, compared to other VARs of similar stature.
Tech Insight – What Is An MSP?
In this article, we take a brief look at what an MSP is, what services they provide, and what benefits businesses get from using an MSP. MSPs A Managed Service Provider (MSP) is a company that delivers outsourced IT services and support to businesses and organisations. The MSP remotely and proactively, manages, monitors, updates, reports…
Image Optimisation
In this article we look at image optimisation, the different types of compression and image files, and how files different file formats can be compared and best used. Vectors or Bitmaps? Raw, digital image files start as either vectors or bitmaps/rasters/pixel maps. Bitmaps are made from pixels whereas vectors are made using mathematical formulas, co-ordinates…
[grid_plus name="Tech News"]