01604 926100

               

Utrafast Connectivity · Secure Analytics · Smart Energy
Rugged Technologies · Outdoor Wireless · Fibreglass Technology · Secure Data Storage · Consultancy

Click here to read this blog post
What Do You Use Your Smartphone For?

The increasing number of messages and notifications I get on my smartphone, all day every day is rising rapidly ...

 

Click here to read this blog post

Technology Overload And Mental Health

In 1990, I was selling a different kind of technology and life was very much simpler for all of us ...

Click here to read this blog post

Regarding The UK Technology Jobs Market

If you asked students what it means to have a job in the technology industry, many would say things like computer programming ...

Click here to read this blog post

How Safe Are Mobile Phone Apps?

Thousands of mobile phone apps are uploaded to Google and Apple AppStore on a daily basis ...

   
Click here to read this blog post

Exam Based Or Hands On Experience?

I went to watch Top Gun Maverick on a whim as I had had a meeting in a room within a Cineworld cinema complex last week ...

Click here to read this blog post

Ransomware Is Not Going Away!

There are more reports of hackers getting into networks, stealing data and/or encrypting data and holding the business to ransom ...

Click here to read this blog post

Is Technology Going Too Wild? - Part 3

In the final instalment of this series, I am taking a look at non-business-related technology and having a bit of a rant ...

   
Click here to read this blog post

Downtime Vs Down Time

In today's technological world, there is an urgency to have all systems up and running 24 hours of the day, seven days a week ...

Click here to read this blog post

Cryptocurrency: Where Is It Going?

Today's blog post is an overview of the complex world of cryptocurrency and what may become the norm in the future ...

Click here to read this blog post

Is Technology Going Too Wild? - Part 2

In today's business world, I come across so much technology, I can only describe the market as an absolute jungle ...

 
Click here to read this blog post
Is Technology Going Too Wild? - Part 1

Back in 1976, I was a very lucky 7-year-old to have a few modern appliances and other technology in the family home ...

 

Click here to read this blog post

Convergence: Choosing Your Specialists

It is fair to say that after the word convergence first came out almost 30 years ago, we seem to be finally there ...

Click here to read this blog post

Do You Work Directly or Indirectly With Your Telecoms Supplier?

The UK telecoms market has been deregulated for the best part of 25 years now and there's an infinite amount of choice ...

Click here to read this blog post

How Vulnerable Is Your Smartphone?

I talk often about phishing emails that can lead to hackers penetrating your networks. Smartphones are also vulnerable ...

   
Click here to read this blog post

Not All Sausage Rolls Are The Same!

You can buy a Sausage Roll from almost anywhere these days. You can even get them in supermarkets and petrol stations ...

Click here to read this blog post

It’s Time To Rethink IT And Telecoms Procurement

I usually refrain from ranting and offering personal/professional opinions in my weekly blog post, but not this time ...

Click here to read this blog post

Fibre Internet Access: Know Your SLAs And Ts&Cs

It was a Saturday at around 7am. My phone rang and one of my clients said that he had lost his fibre internet access ...

   
Click here to read this blog post

The Wonderful World Of WiFi

Did you know that unlike HiFi, which is the short form for High Fidelity, WiFi is definitely not the short form for Wireless Fidelity ...

Click here to read this blog post

The Art Of Password Security

Today's blog post is all about password security and it comes from a very personal perspective ...

Click here to read this blog post

Firewalls: Test, Test And Test Again!

What do your IT systems, servers, IP telephone systems, network-connected mobile phones all have in common?

 
Click here to read this blog post
WiFi, Emails And Passwords Are Being Held To Ransom

Every week I write about the cyber-threats and vulnerabilities that hackers use to exploit company networks ...