Posts

Software developers are building new cloud-based software with such ease that there are warnings of future headaches for IT teams responsible for infrastructure and operations. A recent Gartner study found that by 2025, 70% of IT infrastructure teams will be unable to support the business. Only ¼ of IT Infrastructure leaders would have teams with the right skills and working practices to support the requirements for IT operations.

Blockchain has huge potential, but it seems no one knows what for yet. There are positive legal applications, security applications, insurance applications as examples, but few have seemed to apply the technology in a live environment.  

Is the use of innovative technology going too far? For over two centuries new technology has been introduced in the business world and workers have had to adapt their positions to accommodate the change. Now that change means Robotic Process Automation (RPA).  

The coming months will mark 100 years since the peak of the 20th century’s most deadly catastrophe: Spanish Flu. Considering this, I would like to explore how IT has shaped modern medicine and may help prevent a future disastrous outbreak.

The Internet of Things refers to objects that communicate with each other. Central heating, fridges, toasters and dog collars are being connected through the IoT. What is its impact on business and how many businesses are enhancing the use of IoT? This blog will give you all the information you need to know about AI and IoT in business.

You would have to work hard to ignore Brexit in the media. The most recent updates are everywhere projecting daily doom and gloom for the British public to enjoy. Are businesses prepared for Brexit in March 2019? More pressingly, can we prepare for Brexit?

Dog collars to toasters are connected as part of the Internet of Things (IoT), with experts predicting that by 2020 more than 50% of new businesses will run on the IoT. However, cyber security and privacy are the biggest challenges for IoT, collecting large amounts of personal identifiable information. As soon as some financial benefit from hacking smart devices appears, cyber criminals will find a way to take advantage of it.