IT & Security News

featured-article

Life After Cookies

With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who…

clubhouse

Clubhouse For Android Launched In The UK

Drop-in audio conversation social network app ‘Clubhouse’ has launched its Android (beta) version for download in the UK. Clubhouse Android Launched In English-Speaking Countries San Francisco-based Clubhouse announced on May 9 that, starting in the U.S., and quickly following in other English-speaking countries, it was rolling out of the beta Android version of its popular…

ai-keystroke

AI Keystroke Spy Tools

With AI recently in the spotlight in Europe over the need to regulate over some ‘unacceptable use’, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it…

insight

Tech Insight – Business Intelligence

In this article we look at ‘business intelligence’, how it can be obtained, and why it’s important. Business Intelligence Business Intelligence refers to how a company/organisation can use its historical data to improving strategic decision-making and thereby provide a (hopefully sustainable) competitive advantage. What Data? In day-to-day operations, businesses and organisations generate, receive, gather, and…

featured-article

10 Programming Languages And Examples Of Their Uses

In this article, we take a brief look at ten popular programming languages and what they’re used for. Recent History What we would recognise as the first computer programming languages date back to the 1940s, were very specialised and were based on mathematical notation. The 1950s saw the development of the first compiled programming language…

google-users

Google Users To Be Auto-Enrolled In Two-step Verification

In a recent blog post, Google has announced that the automatic enrolment of Google account users in Two Step Verification ‘2SV’ is coming soon. Passwords – Single Biggest Threat To Online Security In the blog post on ‘On World Password Day’ (May 6), Google’s Director of Product Management, Identity and User Security, Mark Risher, shared…

old-router

Old Router Risks Could Affect Millions

An investigation by consumer watchdog ‘Which?’ has highlighted how millions of people around the UK are using old routers with security flaws. The Investigation The Which? investigation surveyed 6,000 UK adults and, with the help of Red Maple Technologies, looked at the security aspects of 13 models of (commonly used) old routers from companies such…

Softcat – 2020 Review

https://mklink.co.uk/wp-content/uploads/2020/08/Softcat.pdf The above link takes you to a review written in 2020 about Softcat’s financials, compared to other VARs of similar stature.

insight

Tech Insight – What Is An MSP?

In this article, we take a brief look at what an MSP is, what services they provide, and what benefits businesses get from using an MSP. MSPs A Managed Service Provider (MSP) is a company that delivers outsourced IT services and support to businesses and organisations.  The MSP remotely and proactively, manages, monitors, updates, reports…

featured-article

Image Optimisation

In this article we look at image optimisation, the different types of compression and image files, and how files different file formats can be compared and best used. Vectors or Bitmaps? Raw, digital image files start as either vectors or bitmaps/rasters/pixel maps. Bitmaps are made from pixels whereas vectors are made using mathematical formulas, co-ordinates…

[grid_plus name="Tech News"]