Posts

How to make sure your IoT devices don’t become tasty bait for data trawlers. Our previous blog where we examined how the net is full of security holes, in this blog we look at possible precautions against data trawlers.

As ways of breaking into casinos go, a fish tank is an unusual route. Yet that is what was used in an unnamed American gambling house in 2017. It had invested in a internet-connected tank in which the temperature and salinity of the water were remotely controlled. 

As the internet of things (IoT) rolls out hackers have found ingenious ways of conning you out of your cash. Today we see how hackers can break into IoT kit, take control and then demand a ransom.

Software developers are building new cloud-based software with such ease that there are warnings of future headaches for IT teams responsible for infrastructure and operations. A recent Gartner study found that by 2025, 70% of IT infrastructure teams will be unable to support the business. Only ¼ of IT Infrastructure leaders would have teams with the right skills and working practices to support the requirements for IT operations.

Blockchain has huge potential, but it seems no one knows what for yet. There are positive legal applications, security applications, insurance applications as examples, but few have seemed to apply the technology in a live environment.  

Is the use of innovative technology going too far? For over two centuries new technology has been introduced in the business world and workers have had to adapt their positions to accommodate the change. Now that change means Robotic Process Automation (RPA).  

The coming months will mark 100 years since the peak of the 20th century’s most deadly catastrophe: Spanish Flu. Considering this, I would like to explore how IT has shaped modern medicine and may help prevent a future disastrous outbreak.