Given how widely the internet and messaging applications are in use today, the extent to which our access and data is secure, and to whom it is accessible is very important. The ubiquitous use of technology ensures that a large portion of our lives are stored online, and that private information will remain potentially vulnerable […]
Blog



The substance behind the hype of the enterprise blockchain
After an initial and short lived burst of enthusiasm and hype around blockchain, the technology is reaching a more sober and serious phase. Blockchain used to be touted as a cure all panacea, but (fortunately) that is now past. There are many articles in the press that claim that the bubble has burst, and that […]


7 Black Mirror Predictions That Are Becoming A Reality
So what is black mirror about? At first glance, Charlie Brooker’s Black Mirror explores how technology dominates our lives. The meaning of the title has something to do with the dark reflection of our society and the reflection you see on your device once it is turned off- a black mirror. Depending on the narrative […]


Is Military-Grade Encryption 100% Secure?
There is no shortage of news about increases in the number of cyber attacks, and given how frequent “hacks” are, many of us find ourselves wondering whether anything online is secure. Is my bank account safe? Are all of my private messages accessible by anybody with the right technical knowledge? It’s a legitimate question! Let’s […]


7 Ways SME’S Can Stay Safe From Cyberattacks
Is your enterprise ready to tackle a cyber attack? About 87% of small businesses believe they will never experience a cyberattack when half of them are actually targeted by cyber-criminals. And, half of the SMEs that experience a cyberattack go out of business within the next six months according to this report. SMEs […]
Topics
ActuarialAgileArtificial IntelligenceAWSAzurebitcoinblackmirrorblockchainBudgetChange ManagementCloudcloud systemscontract jobscontract workContractorCRM solutionsCryptocurrencycryptographycustomer servicecustomer supportCVcyber crimecyber criminalsCyber SecurityData Sciencedata storageday ratesdeep learningdegreediffie hellmanDigital CVDigital Transformationdistributed computingEnergy savingenterprise blockchainFinanceFlexible workingfutureGender Pay EqualityhadoopHiringHolidayshybrishybris contractorsinfrastructureInsuranceinternet of thingsInterviewinterview hintsinterview tipsIoTIoT devicesIoT JobsIR35IR35 categoriesIR35 rulesIT contractorIT ContractorsIT jobsIT RecruitmentITILITSMjava conceptsJava Enterprisejob opportunitiesjobsknowledge managementlogisticsloyalty schemesMachine Learningmanagement toolmathematical conceptsmobile appsMortgageNo SQLoptimizationpartnershipRecruitment agencyreward schemessapSAP CommerceSAP Hybrisservice deskService Managementskillssmart officeSmart OfficesSpring conceptsstatistical modellingSwifttask managementtaxTechTech hirestechnologiesTechnologyTechnology and productivityTravelUK OpportunitiesVirtual Realityvoice assistantWomen in Techwomen in tech statswomen in technology