Feedback

Guides

How to know when your data is "big"

3 hours ago  by Michele Nemschoff
How to know when your data is "big"
Most companies today are working with some level of data operations. Many are wondering whether they’ve already crossed the threshold into big data. Here's how you can tell.

A guide for two-factor authentication: Which websites offer it, and how to set it up

15 Apr 2014  by Eric Griffith
A guide for two-factor authentication: Which websites offer it, and how to set it up
Heartbleed has made everyone think twice about online security – and one way you can stay safer is by using two-factor authentication.

4 tips to reduce network latency, the right way

07 Apr 2014  by Paul Heywood
4 tips to reduce network latency, the right way
In this 24/7 economy, 2 seconds or less is the expected page-load time for 47% of consumers, and poor website performance is why 79% are less likely to revisit. Here's how to keep latency down.

Trusting robots: 3 steps towards effective CRM

03 Apr 2014  by Tom Phelan
Trusting robots: 3 steps towards effective CRM
In a bid to improve its CRM, iRobot has teamed up with Trusted Shops to bring the trustmark to its UK and EMEA region units, but what stages contribute to the CRM process?

Bury XP or bury your data: 7 tips for a stress-free migration

03 Apr 2014  by Paul Cooper
Bury XP or bury your data: 7 tips for a stress-free migration
Upgrading Windows XP to either Windows 7 or Windows 8 is critical both from a cost perspective and security point of view. Here are my top tips in migrating whilst you still can!

How to run a global meeting, the right way

03 Apr 2014  by Martin Large
How to run a global meeting, the right way
The world is getting smaller and, with what feels like the ever-accelerating pace of business, organisations need to keep up as many teams are located across continents.

The challenge of the Internet of Things in the workplace and data centre

02 Apr 2014  by Dan Raywood
The challenge of the Internet of Things in the workplace and data centre
The challenge around the Internet of Things (IoT) is less around smart devices in the home, but more about devices in the workplace and in the data centre.

Headless browsers: legitimate software that enables attack

01 Apr 2014  by Dan Raywood
Headless browsers: legitimate software that enables attack
Headless Browsers are legitimate browser web kits that have been modified to target basic UIs on your website. Dan Raywood discusses how to protect yourself and your site against this threat.

4 ways to stay secure in the age of the Internet of things

01 Apr 2014  by Raj Samani
4 ways to stay secure in the age of the Internet of things
From connected cars to wearables, mobile is changing. The possibilities opened up by this Internet of things are endless, but with the ability to communicate comes the potential risk of cyber attack.

How to choose a free VPS web hosting service that works for you

01 Apr 2014  by Matthew Sarrel
How to choose a free VPS web hosting service that works for you
Virtual private servers give you the near-complete control of a private server while still providing such conveniences of hosted environment such as availability, scalability, and reliability.

Financial services: Sort our your mobile banking apps

26 Mar 2014  by Tom Levey
Financial services: Sort our your mobile banking apps
Delivering a first-class mobile banking service to customers relies on multiple applications and IT systems working seamlessly, but unfortunately it doesn't always work like that.