Dale Walker
What is a managed IT service?
IT infrastructure digital illustration
Business operations

What is a managed IT service?

With two-thirds of businesses using them, learn about what managed IT services are and how they’re being used
23 Nov 2020
Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?

Each of these popular cloud platforms boasts robust security - but which does it best?
20 Nov 2020
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
18 Nov 2020
What is blockchain?
A depiction of a chain made up of blue binary code
Security

What is blockchain?

The tech that underpins the biggest cryptocurrency in the world is branching out
18 Nov 2020
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
17 Nov 2020
What is ransomware?
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
17 Nov 2020
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
17 Nov 2020
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
17 Nov 2020
EU inches closer to ban on end-to-end encryption
Someone holding a smartphone with the WhatsApp logo displayed on screen
Security

EU inches closer to ban on end-to-end encryption

Leaked document suggests EU wants "balance" between robust security and ease of access for law enforcement
9 Nov 2020
UK data laws after Brexit: Your questions answered
General Data Protection Regulation (GDPR)

UK data laws after Brexit: Your questions answered

Will we really be free to create our own laws outside of the EU?
30 Oct 2020
IT Pro 20/20: Building a future-proof business
IT infrastructure

IT Pro 20/20: Building a future-proof business

The tenth issue of IT Pro 20/20 looks at the importance of infrastructure in a post-pandemic recovery
30 Oct 2020
What is ethical AI?
Robotic and human hands meeting
artificial intelligence (AI)

What is ethical AI?

How do we define what a 'good outcome' is when it comes to algorithms?
20 Oct 2020
British Airways dodges £183 million data breach fine after coronavirus disruption
data breaches

British Airways dodges £183 million data breach fine after coronavirus disruption

The Information Commissioner's Office will now fine the airline £20 million for a data breach that affected over 400,000 customers
16 Oct 2020
Best VPN services 2020
VPN software displayed on a laptop
Security

Best VPN services 2020

With remote working on the rise, we round up the best tried and tested VPN services
14 Oct 2020
What are biometrics?
Security

What are biometrics?

Your face, iris, DNA ad typing style can all be used as a password
13 Oct 2020
What is Kubernetes?
enterprise applications

What is Kubernetes?

We take a look at the open source platform powering containerisation at scale
8 Oct 2020
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
5 Oct 2020
IT Pro 20/20: The future of augmentation
Abstract image of the back of a woman's neck fitted with a QR code
augmented reality (AR)

IT Pro 20/20: The future of augmentation

The ninth issue of IT Pro 20/20 looks at our changing relationship with augmentation technology
30 Sep 2020
Every Microsoft Teams update from Ignite 2020
collaboration

Every Microsoft Teams update from Ignite 2020

UI improvements, feature updates, new functionality, and a glimpse at Teams' future on Android
23 Sep 2020
Microsoft now has a managed service for adding chat tools to existing apps
An unseen user interacting with a live chat feed displayed on a smartphone
Microsoft Azure

Microsoft now has a managed service for adding chat tools to existing apps

The Azure Communications Service lets developers add chat functionality ‘in minutes using a few lines of code’
22 Sep 2020
Microsoft aims to simplify security portfolio with Defender rebrand
cyber security

Microsoft aims to simplify security portfolio with Defender rebrand

Move coincides with updates for Azure Sentinel, Azure Defender, and Defender for Endpoint
22 Sep 2020
What is DNS?
Domain Name System (DNS)

What is DNS?

We explain what DNS is, how it works, and how outages can be avoided
11 Sep 2020
How to unroot Android
Google Android

How to unroot Android

If you've rooted your Android device, here’s how to get everything back to normal
9 Sep 2020
IT Pro 20/20: The learning revolution starts now
Careers & training

IT Pro 20/20: The learning revolution starts now

The eighth issue of IT Pro 20/20 looks at the rise of self-education during a global pandemic
1 Sep 2020
How to make and receive phone calls through Windows 10
Microsoft Windows

How to make and receive phone calls through Windows 10

A guide to setting up Microsoft's 'Your Phone' app, including its updated call features
18 Aug 2020
The benefits of hot desking
Business strategy

The benefits of hot desking

Many workers are now adopting this new approach, but what makes it so attractive?
17 Aug 2020
What is an artificial neural network?
neural network

What is an artificial neural network?

A look at the role of neural nodes and how deep learning is used to create algorithms
5 Aug 2020
IT Pro 20/20: Small businesses will lead the new normal
SMB

IT Pro 20/20: Small businesses will lead the new normal

The seventh issue of IT Pro 20/20 looks at the pivotal role small businesses will play in a post-coronavirus world
3 Aug 2020
What is EU-US Privacy Shield?
Privacy Shield security concept
safe harbour

What is EU-US Privacy Shield?

A look at the now invalidated framework US companies relied on to transfer data to and from the European Union
20 Jul 2020
European court invalidates primary EU-US data transfer mechanism
Privacy Shield

European court invalidates primary EU-US data transfer mechanism

Privacy Shield ruled to be incompatible with GDPR in landmark case
16 Jul 2020
Businesses worldwide brace for ECJ ruling on data transfers
Visual representation of GDPR and the UK's independence from the EU
General Data Protection Regulation (GDPR)

Businesses worldwide brace for ECJ ruling on data transfers

A guide to Thursday's ruling on data transfers and what it might mean for UK businesses
15 Jul 2020
Google launches Confidential VMs for sensitive data processing
virtual machines

Google launches Confidential VMs for sensitive data processing

New feature allows customers to encrypt data while it is being processed
14 Jul 2020
BigQuery Omni pulls Google, AWS, and Azure analytics into one UI
SQL

BigQuery Omni pulls Google, AWS, and Azure analytics into one UI

Google's Anthos-powered platform lets users analyse data across multiple providers at once
14 Jul 2020
What is serverless architecture?
Server & storage

What is serverless architecture?

We explain the basics of serverless architecture, including benefits and drawbacks
7 Jul 2020
What is a proxy server?
Networks connected with each other across the world
Server & storage

What is a proxy server?

We explain what a proxy server is, how it works, and the different types available
6 Jul 2020