2019 has opened us up to some wonderful and marvelous promises in the worlds of data science, machine learning, mobile networks, and augmented reality. These technologies are all on the edge of drastically changing the way many organizations handle their technology forever. If you haven’t yet heard about how any of these new technologies are … Read More
Move to the Cloud with Azure
In this video, four companies – ASOS, British Airways, Rockwell Automation and GEICO learn how the Microsoft Azure cloud helps them succeed in their respective industries. Although each of these companies has rigorous, specialised data requirements, Azure delivers the capabilities and massive scalability they need to step up their operations. Azure can do the same … Read More
Your account was hacked!
I’ve had a few people contact me yesterday/today to describe having received an email with this or a similar title. The body of the email goes on to describe the email address of the user and in some cases a password that they use or have used. It then requests an amount of money be … Read More
Security Alert – Java Security Update 8u171
Oracle has released security updates for Java 8. If you must use Java it is highly recommended that you install this latest update. Use the Offline download where possible. This is to avoid the prompter asking you to install the Ask or McAfee or other adware toolbar. Disable Java in your browser unless required. If … Read More
BYOD for Small Business
A significant amount of progressive small businesses are tossing away employee IT equipment for BYOD systems. What is BYOD? BYOD is an acronym for Bring Your Own Device, a new type of business network where employees literally bring their own devices to work. Sounds like a fantastic idea, doesn’t it? Let’s cover some benefits! The … Read More
Protecting Small Business from Ransomware
Ransomware is a big problem for small businesses all over the world. Ransomware is a type of malware that encrypts data on a hard drive, usually user data like documents, contacts, photos, emails, and financial records. It then holds this data hostage, demanding a large ransom in return for this data to be restored and … Read More