How data poachers went phishing in a fish tank

As ways of breaking into casinos go, a fish tank is an unusual route. Yet that is what was used in an unnamed American gambling house in 2017. It had invested in a internet-connected tank in which the temperature and salinity of the water were remotely controlled. 

How Artificial Intelligence AI Can Help Businesses

Artificial Intelligence is starting to become more present in workplaces and applications. Will AI start to generate real economic value across multiple sectors in 2020? According to PwC, the widespread adoption of AI will add £12.8 trillion to the global GDP by 2030. Initially, you would think that this contribution would primarily be from AI-focused companies. […]

Tech May be Able to Help You Work From Home

Most of the population are adjusting to working from home. This may be new for many people and navigating this can be difficult. Tech may be the answer to effectively turn your home office into a productive space.

PSTN switchover

In the previous blogs we discovered how the French and Germans tackled their own PSTN switchover. Both European neighbours are tackling the issue with characteristic élan and efficiency.  However unforeseen challenges arose in both countries and so with the age old military principle of ‘pre warned is pre armed’ we highlight potential challenges that may […]

Zoom and Working Remotely

What is Zoom? How does it work? Is it safe? There have been suggestions that competitors Microsoft and Google are safer applications.

We previously examined the experience of Germany’s telephony migration in PSTN Switch Off: Avoiding Germany’s mistakes. Here we examine the PSTN migration experience for our French cousins just across the Channel.

Cloud Agnostic Desktop-as-a-Service (DaaS)

Riding a particular cloud vendor may be computing heaven – yet is there a case for being supplier agnostic? What’s your Desktop-as-a-Service (DaaS) strategy?

Don't be ground down by Internet of Things ransom demands

As the internet of things (IoT) rolls out hackers have found ingenious ways of conning you out of your cash. Today we see how hackers can break into IoT kit, take control and then demand a ransom.

The PSTN migration

Looking at Germany’s PSTN migration and how we in the UK could avoid making the same mistakes? Broadly speaking it went off swimmingly but there were notable car crashes on the German data autobahn, especially within the country’s pharmaceutical supply sector and for customers migrating their fax machines.