Blockchain – Part 2 – The 51% hack and the AWS Solution

Blockchain – Part 1 – a Foundation of Distrust Proof of Work In Part 1, I discussed the proof of work algorithm which involves creating a cryptographic hash that would require approximately 10 minutes of compute time for every block that is added to the blockchain. The problem with this mechanism is that for every

Read More

Blockchain – Part 1 – a Foundation of Distrust

Mutual Suspicion In his 1982 PhD thesis entitled “Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups” and subsequent essays including “Achieving Electronic Privacy” some ten years later, David Schaum discusses the need for information sharing, but also the need for privacy.  Banks need to be able to verify banking transactions such as purchases;

Read More

Robotic Process Automation is already here and it’s awesome

Oops! There’s a joke that goes: “I got drunk last night and sent a nude photo to everybody in my address book.  It cost me a fortune in postage.” The joke here is not that the author sent a nude photo to everybody in his address book; because I’m certain we’ve all sent emails in

Read More

Building the Mars Rover with your Kids

Wouldn’t Know Where to Start? Every year we hear about somebody else’s children doing incredibly exciting things with technology.  It always seems to be something well beyond the capability and budget of the average parent and so we dismiss it as – “they’re lucky to have a parent who can do that.” But Cloud Technology

Read More

A useful guide to Cloud Best Practice

With so many guides on best practice, available, a natural response would be not ANOTHER one.  In response to this I have sought to keep this guide brief, pragmatic and relevant to everyone in the business. Understand what you want to achieve as a business (but keep it fluid):   Establish clear targets & metrics aligned

Read More

Consolidating Microsoft Licensing on AWS

As a leading software provider, Microsoft has built a reputation of being a reliable vendor to business and personal users alike. For many, there is no recollection of a time before Microsoft applications that have become a staple part of our lives and long may that continue. Many companies have adopted a Microsoft offering as

Read More

Let the Cloud be your Facilitator, not your Downfall

What does your Business Do? If you were to go to the CEO of the Aerospace company I worked for in my first job fresh out of University and asked him what his business did, he would probably say “We make buttons, switches and panels for aircraft.” If you were to ask one of the

Read More

Application Modernisation

“Let’s go invent tomorrow instead of worrying about what happened yesterday.” – Steve Jobs In an earlier article, I discussed modernisation and noted that the intention to modernise is to replace an older system/ model with an entirely new one and that there cannot be any middle ground.  It was noted that the entire organisation

Read More

What would Modernisation mean for you

“To change something, build a new model that makes the existing model obsolete.” Buckminster Fuller The term modernisation is trending in many different aspects of life. For some, the true meaning and implication of the word has not been understood resulting in poor outcomes that are unhelpful Modernisation is not about making what we have

Read More

Who is knocking at the door? A case for Identify management and access control

Our personal identity is unique to each of us, it makes us who we are and the thought that someone can take that away from us is morally and ethically disturbing. Identity theft is not only a personal attack that robs us of who we are it is also a cause of personal financial loss.

Read More