Amid a new round of UK government sanctions targeting Moscow's intelligence apparatus, the NCSC has formally attributed attacks orchestrated with...more
What is biometric authentication?
Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity.
An explanation of local area networks
Local area networks are interconnected systems that share resources within a limited geographic area. They can be wired, wireless or...more
Soracom unveils Connectivity Hypervisor to expand IoT flexibility
IoT technology and services provider takes step towards intelligent connectivity management, giving deployments ‘unprecedented’ flexibility and control over cellular connectivity
DWP accused of shielding AI deployments from public scrutiny
Amnesty International and Big Brother Watch say the Department for Work and Pensions’ ‘unchecked’ and opaque experimentation with AI in...more
CISPE criticised over securing preferential cloud pricing on Microsoft products for members
Microsoft has signed an agreement with cloud trade body CISPE to secure more agreeable pricing on the software giant’s cloud...more
A brief explanation of latency
Latency measures data transmission delays between points. Causes include physical distance and hardware issues, while solutions might involve hardware upgrades...more
Sizewell C deploys VodafoneThree dedicated 5G
UK operator inks strategic agreement as a tier one contractor for currently underway nuclear power station project deploying dedicated 5G...more
Is history repeating itself with the government’s push to open public sector cloud deals to SMEs?
The UK government is on a mission to help public sector IT buyers do away with their legacy tech and...more
Peer warns IT suppliers against partnering with Fujitsu in government contracts
According to publicly available figures, Fujitsu has won over half a billion in government business as prime contractor since January...more
















