Blog

Cloud-based Data Storage

http://www.winsupersite.com/article/windows-live/cloudbusting-skydrive-live-mesh-google-drive-dropbox-142922   https://skydrive.live.com/?cid=20f065afc1acdb2e&resid=20F065AFC1ACDB2E!1263&id=20F065AFC1ACDB2E!1263  ...

Goodbye Freeserve, Hello…Who?

Many people on LinkedIn will be using their own branded domain names but every so often I come across someone who has had their old freeserve, fsnet etc. email address for so long that it's been hard for them to give it up. Well, now needs must; at the end of the...

Daubeneys is back from sabbatical

About three years ago I took a sabbatical to work on an equine database. Defra’s new Central Equine Database should go live this June. It’s been fascinating: an opportunity to see yet another side of the IT world and to catch up on some of the latest technology. The...

Digital Diet Time – Addicted to Technology?

Digital Diet Time - is it time to trim off some digital tonnage? My friend’s daughter recently lost her mobile phone just as she was setting off for a weekend break with her girlfriends in Paris. Although my immediate comments were a sympathetic ‘what a nuisance’, my...

Online Security and Protection: Stranger Danger

Do you and your staff know how to a recognise possible Phishing attacks? Be careful - there are lots of dodgy characters out there! If you are old enough, some of you may remember the early 1980’s when businesses in the UK were bombarded with telexes from Nigerian...

EU legislation and old IT equipment – how green is your office?

Are you compliant with EU legislation concerning the disposal of old IT equipment and hazardous goods? Did you know that there is now strict IT law governing how you should dispose of your old computer equipment? In fact since 2008, you can no longer just dispose of...

Microsoft cold calling scams – beware malware

These Microsoft cold calling scams are about IT vandals installing malware onto your computer. The definition of malware is a simple one: malware is software that is intended to damage or disable computers and computer systems. These scams usually start with a phone...

Self Defence for IT users

Protecting yourself, your data and your equipment Defensive Software, Data Encryption and Physical security Most people think they have a fair idea of what is required to stay protected in the digital world; sadly, far too few of us carry out regular due diligence to...

Mobile communications: Staying in touch when you are out

Benefits of Mobile/Remote Working Huge numbers of us work in jobs where we are expected to be accessible virtually 24/7 whether we are in the office, at home or on the road. Three out of every four UK businesses have staff who work away from the main office some or...

Get In Touch

Call