Category: Cloud

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Voice Recognition ‘Sexist’

Delip Rao, CEO and co-founder of start-up R7 Speech Sciences has brought the issue back into the spotlight that voice recognition systems struggle more with female voices. Not New The issue has been known about for some time and has been brought into sharper focus with the popularity of voice-activated digital assistants like Apple’s Siri,…
Read more

Accountants To Use AI For The ‘Boring’ Stuff

A study by Sage that identified how 83% of clients would like their accountants to extend their services has seen 50% of accountants looking to solutions like AI to allow them to free up the necessary time to do so. Off-Load Repetitive Tasks To AI With accountancy clients looking for consultancy and advice (42%) as…
Read more

Eight New Cyber Threats Every Second

The latest McAfee Labs threat report shows that in the last quarter of 2017, organisations faced 8 new cyber threats a second as there was an 18% increase in the number of reported security incidents across Europe. 478 New Cyber Threats Every Minute The report makes worrying reading as businesses and organisations try to secure…
Read more

UK Economy Could See £26bn From Rural Digital Investment

A study has revealed that greater investment in digital technologies and connectivity in rural parts of the UK could add between £12bn and £26.4bn annually to the British economy. Digital Strategy and Investment Needed The study, which was commissioned by Amazon and conducted by think tanks Rural England and Scotland’s Rural College (SRUC), showed that…
Read more

Tech Tip – Windows 10 – Using The ‘My People’ Feature

The ‘My People’ feature in Windows 10 provides a handy way for you to access all your favourite contacts from your taskbar using the inbuilt settings and account that is linked with the email that you have used in your Windows. Here’s how to activate the feature: 1-Check whether your taskbar has the “people” icon…
Read more

Office 365 Training for users

Microsoft have been working hard to produce a training portal for end suers to help them get familiar with the full suite of products provided with Office 365 Office 365 User Training Portal https://go.microsoft.com/fwlink/?linkid=853062 If you do nothing else we would encourage you to have a look a these guides Learn the basics https://support.office.com/en-gb/article/office-365-basics-video-training-396b8d9e-e118-42d0-8a0d-87d1f2f055fb?wt.mc_id=otc_home&ui=en-US&rs=en-GB&ad=GB Get…
Read more

Tech Tip – Timeline For Windows 10

Currently being tested and likely to come out soon in an update is a browser history for your Windows desktop known as ‘Timeline’. This feature will allow you to search through files, apps and sites you’ve previously had open, and jump back and pick up what you were doing. What’s more, it will extend to…
Read more

Licence Plate Recognition -1 Million Mistakes a Day!

Concerns over the possible misreading of hundreds of thousands of vehicle licence plates each day have led to calls for statutory regulation of the UK’s automatic number plate recognition (ANPR) system. Over 1 Million Mistakes Per Day! The ANPR system uses 9,000 ANPR cameras, to record and store up to 30 million vehicle records each…
Read more

School Heating Hack Risk

Cyber-security Company, Pan Test Partners, have warned that schools with building management systems that are linked to the Internet could face the risk of hackers turning the school heating system off – or worse. The Problem The problem is that many electricians and engineers may be lacking in knowledge about cyber security and / or…
Read more

Supply Chain Attacks

With GDPR on the way, it is more important than ever for companies to protect themselves from online attacks via a 3rd party in their supply chain. What’s The Risk? Many companies have professional relationships with 3rd parties in their supply chain / value chain that involve granting them access to systems and sensitive data.…
Read more