Category: General IT

  • The Internet of Things and Cyber Security

    The Internet of Things and Cyber Security

    What actually is ‘The Internet of Things’? The internet of things is defined as ‘the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.’ Put simply, this describes the way in which many of us use the internet with a variety of devices every day. For […]

  • Implementing DevOps for Cyber Security

    Implementing DevOps for Cyber Security

    What is DevOps? DevOps can be defined as the “integration of development, IT operations, security, and quality assurance under one umbrella”. It is a cross-departmental strategy to revolutionise software development to maximise efficiency and increase productivity. DevOps endeavours to achieve this by utilising working practices which create a continuous cycle of communication between the various […]

  • Is Cybercrime on the increase?

    Is Cybercrime on the increase?

    In recent months, a significant amount of media coverage has been given to the plight of high-profile organisations falling prey to cyber-attacks of rapidly increasing sophistication and severity. With this in mind, you would be forgiven for thinking that there is something of an epidemic in cyber-crime at present. But is this really the case, […]

  • DevOps trends for 2017

    DevOps trends for 2017

    The move towards implementing DevOps to streamline communication between the various different teams involved in software development and operation within an organisation has revolutionised the way in which teams integrate, and this revolution shows no signs of slowing. With DevOps fast becoming standard business practice, the world of DevOps is evolving rapidly. Many tools and […]

  • SNMP Traps or Syslogs to Desktop Pop-up Messages

    SNMP Traps or Syslogs to Desktop Pop-up Messages

    Our customers never fail to amaze us.  We have recently seen a case where a custom used an SNMP Trap monitor to receive traps from a phone system, and attached the Desktop Notifier action to the monitor.  With this simple setup, anytime some specific traps were received, a desktop pop-up alert was shown on one or more […]

  • A guide to Windows 10 for you mobile phone

    A guide to Windows 10 for you mobile phone

    While Andriod and IOS remain dominant in the mobile operating system market, in recent years Microsoft has expanded its offering of phones supporting Windows. With the advent of Windows 10 mobile, it is likely that its market share will continue to increase. In this guide we cover the basics you should know if considering a […]

  • A 5 Step guide to getting started in DevOps

    A 5 Step guide to getting started in DevOps

    So you’re a convert. You understand the value of DevOps, and how it can enhance your operations, and you’re ready to take the plunge and redraw your organisation’s processes along DevOps lines. But how on earth do you get started, and what critical information do you need to have before you can successfully implement a […]

  • Thinking of becoming a DevOps Manager?

    Thinking of becoming a DevOps Manager?

    The emergence of Dev Ops Managers as a distinct role is a relatively new one. The term DevOps was first coined in 2009 by Patrick Debois, who became one of its chief proponents. Since then, the role of the DevOps Manager has evolved significantly. So what exactly is a DevOps Manager? Simply put, DevOps is […]

  • Optimising Windows 10 for a longer battery life

    Optimising Windows 10 for a longer battery life

    Since the advent of Windows 10, there has been a lot of publicity about the power draining nature of the platform. Whilst recent updates have ironed out some of the problems with battery drain, there are still significant issues when running Windows 10 on a laptops, tablets and PCs on standby. Here we look at […]

  • Making the most of Office 365 Security tools

    Making the most of Office 365 Security tools

    Moving to a cloud based service such as Office 365? Many organisations contemplating a move to a cloud based service are rightly concerned about security. With new threats being introduced on a regular basis, organisations need to use all the tools they have at their disposal to secure their data. Official Government Guidance on the […]