Blockchain – Part 2 – The 51% hack and the AWS Solution
Blockchain – Part 1 – a Foundation of Distrust Proof of Work In Part 1, I discussed the proof of work algorithm which involves creating a cryptographic hash that would require approximately 10 minutes of compute time for every block that is added to the blockchain. The problem with this mechanism is that for every
Read MoreBlockchain – Part 1 – a Foundation of Distrust
Mutual Suspicion In his 1982 PhD thesis entitled “Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups” and subsequent essays including “Achieving Electronic Privacy” some ten years later, David Schaum discusses the need for information sharing, but also the need for privacy. Banks need to be able to verify banking transactions such as purchases;
Read MoreRobotic Process Automation is already here and it’s awesome
Oops! There’s a joke that goes: “I got drunk last night and sent a nude photo to everybody in my address book. It cost me a fortune in postage.” The joke here is not that the author sent a nude photo to everybody in his address book; because I’m certain we’ve all sent emails in
Read MoreBuilding the Mars Rover with your Kids
Wouldn’t Know Where to Start? Every year we hear about somebody else’s children doing incredibly exciting things with technology. It always seems to be something well beyond the capability and budget of the average parent and so we dismiss it as – “they’re lucky to have a parent who can do that.” But Cloud Technology
Read MoreA useful guide to Cloud Best Practice
With so many guides on best practice, available, a natural response would be not ANOTHER one. In response to this I have sought to keep this guide brief, pragmatic and relevant to everyone in the business. Understand what you want to achieve as a business (but keep it fluid): Establish clear targets & metrics aligned
Read MoreConsolidating Microsoft Licensing on AWS
As a leading software provider, Microsoft has built a reputation of being a reliable vendor to business and personal users alike. For many, there is no recollection of a time before Microsoft applications that have become a staple part of our lives and long may that continue. Many companies have adopted a Microsoft offering as
Read MoreLet the Cloud be your Facilitator, not your Downfall
What does your Business Do? If you were to go to the CEO of the Aerospace company I worked for in my first job fresh out of University and asked him what his business did, he would probably say “We make buttons, switches and panels for aircraft.” If you were to ask one of the
Read MoreApplication Modernisation
“Let’s go invent tomorrow instead of worrying about what happened yesterday.” – Steve Jobs In an earlier article, I discussed modernisation and noted that the intention to modernise is to replace an older system/ model with an entirely new one and that there cannot be any middle ground. It was noted that the entire organisation
Read MoreWhat would Modernisation mean for you
“To change something, build a new model that makes the existing model obsolete.” Buckminster Fuller The term modernisation is trending in many different aspects of life. For some, the true meaning and implication of the word has not been understood resulting in poor outcomes that are unhelpful Modernisation is not about making what we have
Read MoreWho is knocking at the door? A case for Identify management and access control
Our personal identity is unique to each of us, it makes us who we are and the thought that someone can take that away from us is morally and ethically disturbing. Identity theft is not only a personal attack that robs us of who we are it is also a cause of personal financial loss.
Read More