Security Let's Encrypt vs Paid SSLs HTTPS encryption makes a huge difference to online security; by encrypting all data transferred to and from your site, you can be certain that potential attackers aren’t listening in.... read more
Security The importance of two-factor authentication Two-factor authentication is a name for any login or entry system which requires two different methods of identifying yourself. It’s one of the most recommended security features for online... read more
Security Pros and cons of password managers Even though Face ID and thumbprint scanning is on the rise, passwords are still the primary method of logging in to services, and the number of accounts that the average... read more
Digital Show your British pride with a UK-specific domain When registering a domain name, gone are the days when you were limited to non-specific extensions like .com, .net, or .org. Now you can tell your user something about your... read more
Servers What is IPv6? Every single device that connects to the internet needs some form of unique address that can be identified and located. IP addresses provide this functionality. So, what is IPv6? What... read more
Digital Free email vs paid email For many of us, we don't go a single day without interacting with our email at some point in the morning or evening. Whether it's a notification on our phone,... read more
Digital How RBLs send spam into a black hole The fight against spam can feel never-ending. Whether it contains potentially dangerous links to scams and malware, or just an avalanche of annoying ads, junk email is never welcome in... read more
Servers What is NVMe storage? Like a spinning hard disk, storage technology never stops moving for long. Maybe it’s ironic then, that the latest and greatest storage hardware doesn’t feature any moving parts.... read more
Digital The brave new world of app localisation Mobile devices are everywhere, and so are the apps that run on them. Vast numbers of smartphones mean vast numbers of users – users who demand a wide range of specialised... read more
Security That escalated quickly: how to prevent privilege escalation Late last year, a major vulnerability was uncovered in the Kubernetes container orchestration system. It was a severe threat, not just because of the large number of organisations using Kubernetes,... read more
Security Malvertising: when ads attack Like it or not, advertising is a fact of life on the internet. As the primary source of income for huge publishers and social media platforms, it can be tough... read more
Digital Designing for touch: the key considerations As a smartphone user, one of the most frustrating experiences is when you tap on something and it doesn’t work, or worse still, the interaction delivers an unexpected result.... read more
Digital Building apps for emerging markets It’s easy to take technology for granted, especially in a developed country with widespread access to fast internet and powerful devices. But across emerging economies in South America, Africa... read more