Dale Walker
Every Microsoft Teams update from Ignite 2020
collaboration

Every Microsoft Teams update from Ignite 2020

UI improvements, feature updates, new functionality, and a glimpse at Teams' future on Android
23 Sep 2020
Microsoft now has a managed service for adding chat tools to existing apps
An unseen user interacting with a live chat feed displayed on a smartphone
Microsoft Azure

Microsoft now has a managed service for adding chat tools to existing apps

The Azure Communications Service lets developers add chat functionality ‘in minutes using a few lines of code’
22 Sep 2020
Microsoft aims to simplify security portfolio with Defender rebrand
cyber security

Microsoft aims to simplify security portfolio with Defender rebrand

Move coincides with updates for Azure Sentinel, Azure Defender, and Defender for Endpoint
22 Sep 2020
What is DNS?
Domain Name System (DNS)

What is DNS?

We explain what DNS is, how it works, and how outages can be avoided
11 Sep 2020
How to unroot Android
Google Android

How to unroot Android

If you've rooted your Android device, here’s how to get everything back to normal
9 Sep 2020
What is ethical AI?
Robotic and human hands meeting
artificial intelligence (AI)

What is ethical AI?

How do we define what a 'good outcome' is when it comes to algorithms?
9 Sep 2020
IT Pro 20/20: The learning revolution starts now
Careers & training

IT Pro 20/20: The learning revolution starts now

The eighth issue of IT Pro 20/20 looks at the rise of self-education during a global pandemic
1 Sep 2020
How to make and receive phone calls through Windows 10
Microsoft Windows

How to make and receive phone calls through Windows 10

A guide to setting up Microsoft's 'Your Phone' app, including its updated call features
18 Aug 2020
The benefits of hot desking
Business strategy

The benefits of hot desking

Many workers are now adopting this new approach, but what makes it so attractive?
17 Aug 2020
What is an artificial neural network?
neural network

What is an artificial neural network?

A look at the role of neural nodes and how deep learning is used to create algorithms
5 Aug 2020
IT Pro 20/20: Small businesses will lead the new normal
SMB

IT Pro 20/20: Small businesses will lead the new normal

The seventh issue of IT Pro 20/20 looks at the pivotal role small businesses will play in a post-coronavirus world
3 Aug 2020
What is EU-US Privacy Shield?
Privacy Shield security concept
safe harbour

What is EU-US Privacy Shield?

A look at the now invalidated framework US companies relied on to transfer data to and from the European Union
20 Jul 2020
European court invalidates primary EU-US data transfer mechanism
Privacy Shield

European court invalidates primary EU-US data transfer mechanism

Privacy Shield ruled to be incompatible with GDPR in landmark case
16 Jul 2020
Businesses worldwide brace for ECJ ruling on data transfers
Visual representation of GDPR and the UK's independence from the EU
General Data Protection Regulation (GDPR)

Businesses worldwide brace for ECJ ruling on data transfers

A guide to Thursday's ruling on data transfers and what it might mean for UK businesses
15 Jul 2020
Google launches Confidential VMs for sensitive data processing
virtual machines

Google launches Confidential VMs for sensitive data processing

New feature allows customers to encrypt data while it is being processed
14 Jul 2020
BigQuery Omni pulls Google, AWS, and Azure analytics into one UI
SQL

BigQuery Omni pulls Google, AWS, and Azure analytics into one UI

Google's Anthos-powered platform lets users analyse data across multiple providers at once
14 Jul 2020
What is serverless architecture?
Server & storage

What is serverless architecture?

We explain the basics of serverless architecture, including benefits and drawbacks
7 Jul 2020
What is Kubernetes?
enterprise applications

What is Kubernetes?

We take a look at the open source platform powering containerisation at scale
6 Jul 2020
What is a proxy server?
Networks connected with each other across the world
Server & storage

What is a proxy server?

We explain what a proxy server is, how it works, and the different types available
6 Jul 2020
What is the Investigatory Powers Act 2016?
Policy & legislation

What is the Investigatory Powers Act 2016?

The act, better known as the Snooper's Charter, dictates how much of your internet history the government can see
6 Jul 2020
What is the California Consumer Privacy Act (CCPA)?
Network & Internet

What is the California Consumer Privacy Act (CCPA)?

As enforcement begins, we examine the groundbreaking new data law that's often referred to as "America's GDPR"
1 Jul 2020
UK data laws after Brexit: Your questions answered
General Data Protection Regulation (GDPR)

UK data laws after Brexit: Your questions answered

Will we really be free to create our own laws outside of the EU?
30 Jun 2020
What is natural language processing?
machine learning

What is natural language processing?

Creating systems capable of meaningful conversation is one of the hardest tasks facing AI researchers
24 Jun 2020
What is the Communications Act 2003?
In an increasingly interconnected world, it's more important than ever to make sure you're following telecommunications laws
Policy & legislation

What is the Communications Act 2003?

A look at the principle law governing telecoms in the UK, including its contentious Section 127
24 Jun 2020
The best UK cities to live and work in
Business strategy

The best UK cities to live and work in

You don’t have to work in London to thrive in tech
23 Jun 2020
What is Li-Fi?
Li-Fi
Network & Internet

What is Li-Fi?

A look at the Wi-Fi alternative that uses visible light to transfer data at staggering speeds
22 Jun 2020
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
18 Jun 2020
What is strong customer authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is strong customer authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
17 Jun 2020
What is a Trojan?
Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
15 Jun 2020
The top 12 password-cracking techniques used by hackers
list of poor passwords on notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
12 Jun 2020
What is reinforcement learning?
machine learning

What is reinforcement learning?

We look at a method of AI development built on the idea of positive and negative feedback
11 Jun 2020
What is a botnet?
Botnet graphic
botnets

What is a botnet?

An in-depth look at the evolution of this highly effective method of cyber crime
10 Jun 2020
Coronavirus lockdown gave me a new perspective on the importance of mental health
Business strategy

Coronavirus lockdown gave me a new perspective on the importance of mental health

Efforts to support employees in a time of crisis reveals how little we do in times of normality
5 Jun 2020
What is blockchain?
Security

What is blockchain?

The tech that underpins the biggest cryptocurrency in the world is branching out
2 Jun 2020
Hackers revive years-old malware to exploit mass remote working
malware

Hackers revive years-old malware to exploit mass remote working

Strains that rely on social engineering are once again growing in popularity
2 Jun 2020