Cookies are a term used in browsing the internet but what are they really. This article explains in as non-technical a way as possible what a cookie is, does and the pros and cons of them. Cookies save so much effort but can be abused. Here’s what cookies do for you. Browsing basics Saving you time Sense checks [read …
To build a beautiful interface is traditionally difficult due to subjectivity with beauty in the eye of the beholder. However as you try to articulate your ideas and wonder what a system could look like this article allows a computer user articulate their ideas very visually with little effort. This is a fun try it and see article for every …
Breaches pose the biggest threat to modern business currently and seem to happen frequently with difficult consequences. What is a breach, why they happen and what can you as a manager do to limit them. This is non-techy article. This article seeks to help non technical managers understand the challenges faced by IT and Security teams and what can be …
Person-centric design is a way of perceiving systems and data that focuses on the people rather than the system. A person-centric approach is a strategic win for your business. This article introduces the area and its advantages and offers a way of updating your approach without throwing out the baby and the bathwater. Focused on solutions from a business / …
The Information Systems Pyramid provides a context for managers to be able to request reports and systems to give information at different levels. The model developed in the 1980s still has relevance for modern business but the definitions need some review. This article seeks to contextualise reporting levels for managers to further discussions with their IT teams. This article should …
Virtualization allows the physical hardware of your machine play host to numerous operating systems. Sound complicated? It’s timeshare of the hardware of your machine. Understanding the hows and whys of virtualization in business terms can save money and infrastructure hassles but requires a little understanding. This article is designed for business professionals and managers who would benefit from understanding what …
RISC is Reduced Instruction Set Computing and CISC is Complex Instruction Set Computing. Both are the key stone of modern computing but which is better? This article introduces the area and provides to non-technical people a basis for discussion. A very simple instruction Quick history and challenges Modern applications This article makes reference to “The Minions” characters from the Despicable …
Tags are the essential part of HTML but what are they really and why should you know about them? This article is aimed at readers who don’t have any knowledge of web and programming and helps to make some discussions much easier to understand. The basics A document Dropping some names [read more=”Read more” less=”Read less”] The basics Basic …
Interface design is an incredibly difficult and passionately discussed topic. HCI, UX and Accessibility are part of the story but a trick has been missed. Having developed interfaces for over a decade and having followed the research developed by a PhD paper this article offers a better solution for interface design with some lateral thinking and real life experimentation. This article …
Data security is the review of where and how your data is stored to ensure nothing goes wrong. What can go wrong though? Having been involved in more security audits than I care to remember this article explores some of the more interesting fundamentals that should be asked of all solutions especially those that reside in the cloud. This article …









