Unit 2, Eliburn Office Park, Livingston, EH54 6GR
+441506668613

Category: Network

IT Support for SMB

Guess What Most Web Traffic Is Made Up Of?

In this article, we look at how a surprisingly large proportion of Internet traffic is made up of bots, how many of these can be ‘bad bots’, and what businesses can do to keep enjoying the benefits of good bots while guarding against the threats of bad bots. Two-Thirds of Internet Traffic is Bots The…
Read more

Apps & Zaps – Ideas For Automating Your Business

In this article, we look at how Zapier and other alternatives can be used to link apps together and create automated workflows that can carry out daily/weekly marketing tasks for you in the background while you get on with running your business. Zapier Zapier (https://zapier.com/) is a tool that can automate repetitive tasks between two…
Read more

Why is Data Science … Big?

In this article, we look at what data science is, and what is driving its growth and value to businesses and organisations worldwide. Data Science Data science uses multiple disciplines, scientific methods, and processes (e.g. domain expertise, programming skills, data engineering, data preparation, data mining, predictive analytics, machine learning, data visualisation, and knowledge of mathematics…
Read more

Featured Article : What Does “Right-To-Repair” Actually Mean?

In this article, we look at the right-to-repair movement, where it comes from, and how it’s progressing. The Right-To-Repair The ‘right-to-repair’ is a movement that seeks to have rules/legislation passed that forces manufacturers (e.g. of appliances, electrical products, white goods and more) to make parts (and information) available to end customers, not just approved/authorised repairers,…
Read more

Tech News : Five-Year High For Tech Hiring

New figures from job search engine Adzuna and data provider Dealroom show that hiring in the tech industry has reached its highest level in five years. Vacancies Exceeding Pre-Pandemic Levels The data, which was compiled by Adzuna and Dealroom for the Government’s Digital Economy Council shows that job vacancies in the digital tech sector have now…
Read more

AI Designs Chips Better Than Humans, Says Google

AI can now design AI chips hundreds of times faster (and better) than humans. Where will this lead? A recent research paper has described how a deep reinforcement learning approach to chip ‘floorplanning’ has led to AI generating chip floorplans that are superior or comparable to those produced by humans. Floorplans Chip floorplanning is the term for…
Read more

How Secure Is Your Software/Digital Supply Chain?

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…
Read more

Guarding Against The Rise In Router and VoIP Attacks

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…
Read more

Featured Article – The Issue of Push Payment Fraud Reimbursement

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…
Read more

Tech Insight – Tech Insight: What Are Firewalls?

In this article, we take a brief look at what a firewall is, what types there are, and the benefits and drawbacks of firewalls. Firewall A firewall is a network security system that can monitor and control incoming and outgoing network traffic based on predetermined security rules.  Based on these rules, it decides whether to…
Read more