Which? Condemns Windows 10.
Curiosity Killed the (Victorian) Cat.
HP Printer Owners Angry as Printers Suddenly Reject Budget Cartridges.
Printer cartridges are a necessary but often expensive purchase and budget cartridges are therefore popular. Many HP printer owners are angrily discovering that their printers stopped recognising unofficial cartridges back on September 13th!
Frustrated HP printer owners who have now discovered that their printer cartridge costs are about to go up through the roof no longer having the choice between official and unofficial cartridges have sought answers from the company.
HP have said that some of its printers already had the cut-off instructions built-in, whereas other printers received the instruction to accept only official cartridges via the latest firmware update.
Tech Tip - Who's Copying You?
If you are ever concerned about people copying your web based content, then you can use proprietary services like Copyscape to protect your work.
However, there is, of course, a cost associated with that so if you're only running perfunctory checks now and again to see where (or if) your material has been repeated, you can simply use trusty old Google.
Simply highlight a sample of several words within your text that should be unique to your own content and hit CTRL 'C' i.e. control C. This then copies that text to your clipboard.
Think You Spend A Long Time At The Computer? Think Again.
Archaeologists working on a shipwreck in Greece have discovered what they believe to be 2,000 year old body of a man next to an early form of computer.
Shipwreck With Link To Today’s Technology.
The discovery of the remains of a man right next to an early kind of analog computer was made at a shipwreck off the Greek island of Antikythera. It is believed that the now badly corroded analog computer device known as the ‘Antikythera mechanism’ was originally used for calculating planetary movements.
Blockchain Will Outgrow Bitcoin.
Technology commentators agree that the popularity of Blockchain, the technology underlying Bitcoin, looks likely to grow well beyond its original intended use with the cryptocurrency, but to do so it will need to overcome several challenges on the way.
What is Blockchain?
Blockchain is an open and programmable technology can be used to record transactions for virtually anything of value that can be converted to code from finances to accounts, votes, insurance claims, and important documentation like marriage / birth / death certificates. It is a kind of incorruptible, distributed ledger.
Its advantages include that it allows mass collaboration, is constantly being updated and reconciled (so it's always current), and it has security and reliability hard coded into it through the use of the Blockchain ‘trust protocol’.
Tech Tip - Customise the Start Menu in Windows 10.
One of the features of Windows 10 is that it allows you to customise your start menu so that it has your most used software to hand and a look that you are happy with.
You can achieve your perfect blend of traditional interface with the Live Tiles by right-clicking on any tile and select resizing it to alter the tile’s dimensions until you’re happy with it.
9 out of 10 Businesses Were Hacked In The Last 5 Years.
Research by Insurance giants Lloyds of London has shown that even though a staggering 9 out of 10 businesses have been hacked once in the last 5 years, less than half of CEOs are concerned that they may be hacked again in the near future.
Wrong Attitude and Reactive Security.
One of the reasons for the apparent lack of concern by such a large proportion of CEOs, despite almost weekly news reports of high profile hacks, can be seen in another alarming statistic. The Lloyds research showed that only 13% of businesses believe they would lose customers if they experienced a data breach.
The thought ‘try telling that to TalkTalk’ who lost an estimated 101,000 customers (3% of their subscriber base) after a hack last October comes to mind.
By having a less blasé and more realistic attitude, CEOs may be more inclined to take precautions that could prevent serious attacks. Some of the feedback in the research also pointed to an unhealthy reliance on reactive security systems.