Category: Network

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

The Difference Between Backup and Disaster Recovery

We’re all familiar with the value of making a backup of business data, but how does this fit with ‘Disaster Recovery’ and ‘Business Continuity’ strategies?  This article takes a brief look at how these elements fit together to ensure that businesses can survive, function and get back up to speed when disastrous events (external or…
Read more

Some Of The Tech ‘Promises’ Made By The Main Political Parties

With the UK’s General Election due to take place on 12 December, many issues have been covered in the media.  One key area of interest for businesses is technology and for those of you who may not have time to plough through the manifestos of the main parties, here’s a quick look at some of…
Read more

Research Says Memes Can Tell Between Humans and Bots

Researchers from the University of Delaware have concluded that when it comes to authentication for logins, Memes may be one of the strongest techniques to distinguish between a human and a bot. The Bot Challenge One of the great challenges to websites when it comes to authentication for logins is that software bots can fool…
Read more

Despite Patches, Researchers Warn That Intel Chips Are Still Vulnerable

The New York Times has reported that despite Intel issuing patches for security flaws (that were discovered last year) in its processors, security researchers are alleging that the processors still have some serious vulnerabilities. What Flaws? In January 2018, it was discovered that nearly all computer processors made in the last 20 years contained two…
Read more

‘Moore’s Law’ and Business Innovation Challenged By Slow-Down In Rate of Processing Power Growth

Many tech commentators have noted a stagnation or slow-down period in computing-related to ‘Moore’s Law’ being challenged, but has the shrinking of transistors within computer chips really hit a wall and what could drive innovation further? What Is Moore’s Law? Moore’s Law, named after Intel co-founder Gordon Moore, is based on his observation from 1965…
Read more

$20 Million Fight Highlights Value of Social Media

The popularity and influence of two YouTube celebrities making their boxing event an all-time global Top 20 pay-per-view phenomenon and splittin a $20 million prize is a reminder of the magnifying value of online PR. What Happened? Two of the world’s leading YouTube celebrities and ‘Generation Z’ heroes Logan Paul and Olajide “KSI” Olatunji followed…
Read more

BBC Puts News On ‘Dark Web Browser’ To Avoid Censorship

The BBC has announced that it is making its International news website available via the ‘Tor’ browser (usually associated with the ‘dark web’), in order to get around censorship in other countries. Blocking by Some Countries The BBC is concerned that countries including China, Iran and Vietnam have tried to block access to its website…
Read more

ICO Warns Police on Facial Recognition

In a recent blog post, Elizabeth Denham, the UK’s Information Commissioner, has said that the police need to slow down and justify their use of live facial recognition technology (LFR) in order to maintain the right balance in reducing our privacy in order to keep us safe. Serious Concerns Raised The ICO cited how the…
Read more

Google Leadership Accused Of Developing Internal Surveillance Tool

Some Google employees have accused the company’s leadership of developing a browser-based file extension for all of Google’s in-house computers that could flag-up signs of workers trying to organise meetings and protests. Google Employees The story came to light in a memo written by a Google employee that is reported to have been seen and…
Read more

Amazon Echo and Google Home ‘Smart Spies’

Berlin-based Security Research Labs (SRL) discovered possible hacking flaws in Amazon Echo (Alexa) and Google Home speakers and installed their own voice applications to demonstrate hacks on both device platforms that turned the assistants into ‘Smart Spies’. What Happened? Research by SRL led to the discovery of two possible hacking scenarios that apply to both…
Read more