TERZO BITES

  • Show All
  • News
  • What We Think
  • What We've Read
SolarWinds and the Holiday Bear Campaign

SolarWinds and the Holiday Bear Campaign

SolarWinds and the Holiday Bear ...
The inevitable weaponization of App data is here

The inevitable weaponization of App data is here

The inevitable weaponization of App ...
Internet revamp for the humble landline

Internet revamp for the humble landline

Internet revamp for the humble ...

Embrace the Rule of Awkward Silence

Embrace the Rule of Awkward ...

The Big Tesla Hack

The Big Tesla Hack: A ...

What Went Wrong With IBM’s Watson

What Went Wrong With IBM’s ...

The IoT-SF Conference 2019

The morning keynote was given ...

Which comms technologies are used for IoT?

Which technologies are used for ...

Burning down the house with IoT

  Burning down the house ...

‘superhuman’ poker AI beats human pros

‘superhuman’ poker AI beats human ...

Expert Says Don’t Teach Kids to Code

Expert Says Don’t Teach Kids ...

Intel, Arm to Collaborate on IoT

Intel, Arm to collaborate on ...

Quantum-embedded chips could secure IoT

  Quantum-embedded chips could secure ...

Why printers add secret tracking dots

Why printers add secret tracking ...

Ransomware attack that targets water supply

Researcher develops ransomware attack that ...

Android Things Released

Google could be getting serious ...

Fax machine vulnerabilities

  Vulnerabilities in Fax Protocol ...

11 signs you’re writing great code

11 signs you’re writing great ...

Not even remotely possible

Remote teams can be more ...

Developer Survey Results 2018

Stack Overflow surveryed over 100,000 ...

Will blockchain technology disrupt the ICS world?

Will blockchain technology disrupt the ...

Don’t dare hackers to hack you!

Don't dare hackers to hack ...

Electromagnetic Pulse Hack

A Diabolical Way of Hacking ...

Microsoft: Government Should Regulate IoT Security

Microsoft: Government Should Regulate IoT ...

IoT Security Anti-Patterns

IoT Security Anti-Patterns  

Former GCHQ boss backs end-to-end encryption

Former GCHQ boss backs end-to-end ...

The WITS Plugfest of May 2017

However, following the release of ...

Apple v Android – my experience

This brief article explores my ...

Think Domino’s is a pizza company?

How Domino's Pizza re-invented itself ...

Why you need software maintenance

Maintenance – normally means bug ...

What is multi-factor authentication?

1-factor authentication 1-factor authentication utilises ...

The uncrackable problem of end-to-end encryption

The uncrackable problem of end-to-end ...

Project Management Tips

1.   Keep in mind the ...

They Write the Right Stuff

They Write the Right Stuff ...

Why learn C?

Why learn C?  

Learning Morse code without trying

Learning Morse code without trying ...

186m needless emails

NHS-wide test message (and replies) ...

The poker-playing AI is getting smarter

The poker-playing AI is getting ...

Programming language for novel biological circuits

Programming language for novel biological ...

WITS Expo October 2016

WITS is a group of ...

What is ‘OT’?

It’s a relatively new term ...

Project warning signs

Some early warning signs for ...

A project in a week

A project definition in advance ...

Cyber-attacks on utilities

Security is such an essential ...

Devoxx UK 2016

The strapline for the conference ...

Installing gdb on a Mac

For me, it can sometimes ...

Young Enterprise

  The scheme for a ...

SWAN Conference

  Simon Harrison (of AWS ...

Survey your customers

Here’s a handful of insights ...

Minimum Viable Product

  Out with the Waterfall… ...

Cloud or Local?

  What do we mean ...

Smart Meter Rollout

 The presentation was led by ...

Guildford IoT Meetup

  Geoff’s talk was particularly ...

Distributech conference

  The purpose was twofold ...

Why Developers Avoid Daylight

Mark has often found late ...

Xamarin 4 Launch

Although one could write an ...

Don’t mess with the live system

I’ve seen this many times ...

Should you use a ticketing system?

Is a ticketing system just ...

IP strategy forum

SCOC had assembled an impressive ...

API Management with apiman

  The talk, entitled “Exploring ...

Don’t Gamble with User Experience

Short for UX-driven design, UXDD is ...

The death of PCs?

Are we witnessing the death ...

The Project Triangle – Explained

Pretty much every project I’ve ...

Consultancy work for AWS

  Anglian Water are currently ...

Complex problem made simple sends computer scientists wild

freeimages.com/Wagner Magni Theoretical computer scientists ...

Secure your website – stop the hackers grabbing your data

freeimages.com/Syam Hassan The Talktalk website ...

Fun at the Football Hackathon

On Saturday we all reconvened ...

Terzo on Twitter

Terzo Digital Ltd has an official ...

Terzo Digital launched

Terzo Digital Ltd has been ...