|
Is digital money about to go mainstream in 2026? Digital money is edging closer to everyday life, with regulators, banks and central banks aligning. This post looks at what might click into place in 2026, from tokenised payments to a UK digital pound. It's not guaranteed, but the direction feels clear ... Datacentres Demand Power and Water: How Will AI Affect Our Resources? The rise of datacentres, fuelled by generative AI and quantum processors, is driving unprecedented demands for power and water ... Do You Test Your Email Systems Regularly? I recently sent an email to someone I had corresponded with previously but thought it weird when I got a bounce-back ... Spending billions on AI startups: A Disturbing Trend in Valuations Spending billions on AI startups leads to inflated valuations for companies producing subpar technology with questionable utility ... The Importance Of Being Earnest I believe that 'people buy from people', yet we seem to be in a world where people are pressured into buying technology ... Thanks to cybercrime, do we need a new internet? Combat cybercrime and protect your online presence. Rebuild trust in the internet with accountable platforms and stronger standards ... What's Your Back Up Strategy? Don't make the same mistake I did - back up your data! Learn from my experience and avoid losing important information ... AI vs human writing: which one is best? AI vs human writing compared - an experiment using AI systems to write a blog post. See the results and decide for yourself ...,
Fraud, Fraud, Fraud! What's The Cost To Your Business? Protect your SME from fraud with these tips. Learn about the impact of fraudulent activities on UK businesses. Start safeguarding your business now .. Why you should only use AI as a research tool, not the final word Learn why to use AI as a research tool for ideas, but always verify and decide the final answer yourself ... What is Email Security, And Why Do You Need To Be Really Careful About It? Did you know that emails can be intercepted and the contents manipulated, modified and forwarded back to the intended recipient without you even knowing about it? Sounds frightening, doesn't it? Europe plans to ditch US tech giants for open-source resilience Europe plans to ditch US tech giants and embrace open source for resilient, sovereign, privacy-first infrastructure ... The Essential Role of Two Factor Authentication in Preventing Hacking Attacks Secure your personal information with Two Factor Authentication. This crucial security measure adds a layer of protection against hacking ... The Alarming Decline of Basic Survival Skills in Modern Education Parents and schools must revive basic survival skills in children, ensuring they can thrive without technology in emergencies ... UK Mobile Operators And Protection Against Scam Texts: The Art Of Defence Discover how UK networks deliver protection against scam texts through blocking, reporting and security partnerships ... What Is The Most Important Part Of Your Business Network? Discover the common point of failure in your business network as we transition to the VoIP era. PSTN/ISDN networks are being disconnected forever About The Security Of Your Core Business Network Securing your business network with the latest technology. Learn how telecommunications has evolved since the Morse code telegraph in 1837 ... Riding the Crest of the Wave Part 3 and the Big Copper Switch-off Approaches And all of a sudden, we had Blackberry dominating the Global market. Their handsets are no longer with us ... Riding The Crest Of The Wave Part 2 And The Rise of the Internet In 1997, the showrooms closed and I moved to the business call centre where the first dial-up disks were emerging ... Riding The Crest Of The Wave. Part 1 sees me Starting out at Dixons in Oxford It's November 1990 and I am a fresh-faced salesman working in the flagship Dixons store at the Clarendon Centre in Oxford ... |




















