Archive for August 2022
Featured Article : The True Cost Of Using Pirated Software
In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software. Benefits On the surface, there appears to be some clear benefits to using pirated software such as acquiring…
Read MoreTech News : Data Centres To Use Raw Water?
Thames Water has said that it wants to work with data centres in its jurisdiction to enable them to use raw water rather than drinking quality water for cooling. Switching To Raw Rather Than Drinking Quality Water Just as the drought has led Thames Water to introduce a hosepipe ban affecting 15 million customers in…
Read MoreTech Insight : What Are The Reasons For The Chip Shortage?
With the world facing a considerable semiconductor microchip shortage, we take a look at the causes and effects of the shortage plus some potential solutions. Why Is This Important? Microchips are now included in virtually everything from watches to white goods and crucially in larger, high demand, big industry items such as cars. Many products…
Read MoreTech News : Google To Run Fake News Information Adverts
Following an experiment by Bristol and Cambridge Universities, Google has announced that it plans to run adverts on YouTube, TikTok, Twitter and Facebook, educating users about how to spot disinformation and misinformation. âPre-Bunkingâ Experiment The University experiment which led to Googleâs decision to run adverts was based on the idea of âpre-bunkingâ from âInoculation Theory.â…
Read MoreSecurity Stop-Press : Plex Warns Users To Reset Password After Suspected Hack
Home media streaming service Plex has warned users to reset their passwords following a suspected hack that could affect up to up to half of its 30 million users. Plex has apologised and said that it has discovered how the threat actor accessed the system and is tightening security to prevent future incidents. This story…
Read MoreFeatured Article : Protect Yourself From Job Phishing Scams
In this article, we look at what âjob phishingâ is, how it works, and how you can protect yourself from this type of fraud. What Is Job Phishing? Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read MoreTech Insight: Calendly Vs Microsoft Bookings
In this insight, we take a brief look at Calendy contrasted against Microsoft Bookings and highlight some of the pros and cons of each. Calendy Founded in 2013, Calendy is a SaaS meeting and event scheduling app for website, Chrome extension or mobile app, which has 100+ partner integrations, and has 10 million users worldwide.…
Read MoreTech News : Excel Collaboration Now Easier
Microsoft Excelâs new @mentions feature allows users to create, assign, and track tasks in a workbook, thereby making collaboration in Excel easier. Added To Roadmap 2020Â The @mentions feature, which was added to Excel for the web in 2020 and added to the Microsoft 365 roadmap in January 2021, has been made popular through its…
Read MoreTech News : Climate Change Affecting Data Centres
A Google data centre going offline in July due to a cooling related failure is just one of a slew of challenges posed by climate change that the big tech companies are facing. Heatwave Knocks London Data Centre Offline The heatwave in July caused outages due to cooling problems at a London data centre used…
Read MoreSecurity Stop-Press : Millions At Risk From Malicious Browser Extensions
A new report from Kaspersky says that millions of people may be at risk from adware hiding in browser extensions, and from malware, adware, and riskware disguised as browser extensions. The advice is to protect devices from malicious browser plugins by only downloading them from trusted sources, and to always check reviews and ratings.
Read More