Observer investigation reveals UK Biobank opened its biomedical database to insurance firms despite…
Google will change their settings to delete some personal data it collects about individuals automatically. These changes will only apply to new accounts. However, existing users will be able to adjust their settings. This is because the company wanted express permission to delete collected data. Such changes include: Wiping web and app activity, including location data, after […]
The Cloud is a network of servers where each has a different function. Serviceteam IT has written a series of blogs surrounding the benefits and uptake of the cloud and in 2017 and 2018’s research reports. However, when you are choosing a cloud security provider, organisations will need to consider the level of data privacy and security at risk.
Recent information has come to light that Facebook planned to use its Android app to track the location of its customers. This was to allow political advertising and invites to dating sites to ‘single’ people. One would have thought (given recent events) that Facebook would have been more careful with user data.
There are two main fields of investment which have arisen as goals for the end of 2019: cloud migrations and moving away from Windows 7.
Software developers are building new cloud-based software with such ease that there are warnings of future headaches for IT teams responsible for infrastructure and operations. A recent Gartner study found that by 2025, 70% of IT infrastructure teams will be unable to support the business. Only ¼ of IT Infrastructure leaders would have teams with the right skills and working practices to support the requirements for IT operations.
Recent technical advances make disaster recovery as a service (DRaaS) possible. However, what is DRaaS and how can we implement it?
In the 21st century – especially the last few years – there has been a conflict between innovation and everyday IT operations of a business. It is easy to get overwhelmed with trying to implement new technology, ensure that runs smoothly whilst introducing more tech.
When I first came across the term digital transformation, I assumed it meant using technology in the workplace. I hadn’t considered the impact that digitisation is having in the business world. We all use a computer; I thought this was enough. I didn’t understand what this term really meant and the impact it is having.
The UK police are using technology and copious amounts of data to predict crime. Thousands of anonymised reports of previous offences allow police to be deployed where crime is predicted to occur over the next 24 hours. The time and place of previous criminal activity helps to determine future offences. Kent Police are at the forefront of this with their system PredPol.
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.
Archives
- March 2026
- February 2026
- January 2026
- December 2025
- November 2025
- October 2025
- September 2025
- August 2025
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- November 2015
- October 2015
Categories
- 2FA
- 5G
- Active Directory
- Active Directory Federated Services (ADFS)
- Amazon Web Services
- Apple Mac
- Artificial Intelligence (AI)
- AWS Direct Connect
- Azure
- Azure AD
- Azure ExpressRoute
- Backup
- Big Data
- Blockchain
- Blockchain as a Service
- Brexit
- Business Continuity
- Calendar App
- Case Study
- Cloud
- Cloud Analytics
- Cloud Connect
- Collaboration
- Communication
- Compliance
- Connectivity
- Consultancy
- Continuity
- Cyber Fraud
- Cyber Security
- Data Centre
- Data Sovereignty
- Desktop-as-a-Service
- Digital Transformation
- Disaster Recovery
- DNS
- Edge Computing
- EOL
- Exchange Online
- Exchange Online Protection
- GDPR
- Glossary
- Google Cloud
- High Availability
- HowTo
- HP Helion
- Hybrid-Cloud
- IBM
- Identity and Access Management
- Internet of Things (IoT)
- IONOS
- IP Telephony
- Leased Line
- Lock down client IP source
- MFA
- Microsoft Teams
- Multi-Factor Authentication
- MX Fallback
- Networks
- News
- O365
- OData
- Office 365
- Oracle
- Outlook 2011 for Mac
- Outlook 2016 for Mac
- Outsourcing
- Password Management
- Phishing
- PowerShell
- Reporting
- Research
- Restricted Access
- Robotic Process Automation (RPA)
- Salesforce
- Scam Emails
- Security
- Self-service
- SharePoint Online
- Single Sign-On
- Skype for Business
- Smart Network
- Spoof Emails
- SSO
- Supplier Selection
- Teams Direct
- Unified Threat Management
- VoIP

