Tech Tip – How To Quickly Access Symbols and Special Characters

Trying to find and insert particular symbols or special characters into something like a Word document can often be awkward and time-consuming, but Windows provides a quick-access character map for these symbols and characters to streamline this process. Here’s how to find it and use it:  > Search for Character Map in the Start menu […]

Tech Tip – How To Quickly Access Symbols and Special Characters Read More »

Featured Article : ‘AI Washing’ – Crackdown

The US investment regulator, the Securities and Exchange Commission (SEC), has dished out penalties totalling $400,000 to two investment companies who made misleading claims about how they used AI, a practice dubbed ‘AI Washing’.  What Is AI Washing?  The term ‘AI washing’ (as used by the investment regulator in this case) refers to the practice of

Featured Article : ‘AI Washing’ – Crackdown Read More »

Tech Insight : What Is Customer Journey Mapping Software?

In this tech insight, we look at what customer journey mapping is, its benefits, the challenges of using it, and also we look at some of the popular customer journey mapping software solutions available.  What Is Customer Journey Mapping?  Customer journey mapping refers to a strategic process (that’s used by marketers) to visualise and understand

Tech Insight : What Is Customer Journey Mapping Software? Read More »

Tech News : Glassdoor Site Shows Real Users’ Names

It’s been reported that Glassdoor (the website that allows current employees to anonymously review their employer) posted users’ real names to their profiles without their consent.  What Is Glassdoor?  By allowing users to register anonymously, Glassdoor is a website that allows current and former employees to anonymously review their companies and management. Founded in 2007

Tech News : Glassdoor Site Shows Real Users’ Names Read More »

An Apple Byte : Serious Apple Chip Vulnerability Discovered

US researchers have reported discovering a hardware chip vulnerability inside Apple M1, M2, and M3 silicon chips. The unpatchable ‘GoFetch’ is a microarchitecture vulnerability and side-channel attack that reportedly affects all kinds of encryption algorithms, even the 2,048-bit keys that are hardened to protect against attacks from quantum computers.  This serious vulnerability renders the security effects of constant-time programming (a

An Apple Byte : Serious Apple Chip Vulnerability Discovered Read More »

Sustainability-in-Tech : World’s First Bio-Circular Data Centre

French data centre company, Data4, says its new project will create a world-first way of reusing data centre heat and captured CO2 to grow algae which can then be used to power other data centres and create bioproducts.  Why?  The R&D project, involving Data4 working with the University of Paris-Saclay, is an attempt to tackle

Sustainability-in-Tech : World’s First Bio-Circular Data Centre Read More »

Tech Tip – Use Task Scheduler to Automate Tasks in Windows

Automating routine tasks can save time and ensure that critical operations aren’t overlooked. The Windows Task Scheduler allows you to automate tasks such as daily backups, weekly disk cleanups, off-hours software updates, periodic service restarts, and sending reminder emails for events by setting them to occur at specific times or when certain events happen. Here’s

Tech Tip – Use Task Scheduler to Automate Tasks in Windows Read More »

Tech Insight : DMARC Diligence (Part 3) : Implementing and Optimising DMARC for Maximum Security

In this third and final part of our series of ‘DMARC Diligence’ insights, we explore the detailed process of DMARC deployment, its monitoring, optimisation, and preparing businesses for future email security challenges.  Last Week …  Last week in part 2 of this series of ‘DMARC Diligence’ articles, we looked at the crucial yet often neglected aspect

Tech Insight : DMARC Diligence (Part 3) : Implementing and Optimising DMARC for Maximum Security Read More »