Author avatar pending

Sophie Davidson, Author at Compare the Cloud

0
Articles
15
Opinions

Improving inspections in confined spaces with the right industrial drone

[vc_row][vc_column][vc_column_text]Confined spaces like mine shafts, electrical vaults, storage tanks, boilers, culverts, tunnels, pipes, ducts and drainage shafts are all essential parts of industry...

Don’t Be A Victim! 10 Ways To Protect You and Your Business From Fraud

[vc_row][vc_column][vc_column_text]The rise of fraud means it’s more important than ever to be ‘security aware’ both personally and in business - here are some pointers to protect against cybercrime:...

Three pieces of bad news about botnets you need to know

The Council on Foreign Relations ended 2018 with a report arguing that we need to work towards an internet with zero botnets. Those malicious powerhouses that are each comprised from millions of enslaved devices. Botnets are the bane of the internet.

How Micro Segmentation Delivers Mega Benefits For The Hybrid Cloud

How Micro Segmentation Delivers Mega Benefits For The Hybrid Cloud

SD-WAN as a Service: the solution for today’s organisations

For many years, the technology of choice for linking together remote locations into a seamless and secure WAN has been MPLS links, since network boundaries coincided with physical ones. With the rise...

Beyond The Call Of Duty: Drones Are A Major Industrial Multitool

There are a number of technologies that began as tools for the military, top-secret or otherwise, that have surpassed their armed services roots to take the world by storm. The internet, for one, and...

Total control: how the IoT surpasses M2M

Even though both machine to machine (M2M) communication and the Internet of Things (IoT) both concern connecting devices to each other, the IoT is built upon fundamentally more interoperable, more sca...

Critical terminology that could help you combat CNP fraud

Among the challenges facing ecommerce today is fraudulent orders made with stolen credit card information (including the card number, expiration date, and even the security code). The technical name f...

How Far Can Immersive Technology Encourage Business Growth?

We are now living in a time where technology is almost evolving faster than we can keep up – and technologies that are already available to us such as Artificial Intelligence, seem almost futuristic....

Access Denied: What DDoS Attacks Are All About and How They Vary

The liver disease Hepatitis comes in five flavours: A, B, C, D, and E. And while some of them are easily prevented by vaccines, all of them are downright awful. You know what else comes in many forms...

The country with the craziest Euro Cup fans: lessons from a CDN

There are many metrics by which the hardcore-ness of a nation’s soccer fans can be measured: merchandise purchases, how far they travel for games, fervor for face painting and impassioned acts of hool...

How To Improve Accuracy With Cloud Computing, To Ultimately Improve Customer Engagement

You can eradicate a potentially damaging scattergun approach to marketing and CRM by using cloud computing systems to better target your consumers. Properly harnessed, a cloud-as-platform system will...

Is Online Gaming an Invitation for Hackers?

Without the right modes of protection, online gamers may be left open to hackers wanting to access their essential information such as financial and personal data. This is why it is of the utmost impo...

Is New Car Tech Putting Drivers at Risk?

There is no doubt car technology has made a huge difference to safety, comfort and efficiency over recent years with the driverless car on the horizon. Even a fairly modestly equipped car includes the...

How to close the door on security risks

Many homes and businesses need to have a certain level of security to satisfy their insurance companies, but thieves are always finding new ways to enter properties. With new technologies and online s...