
Media-Insert Communications
The blog of Media-Insert Communications – featuring freelance P.R. and journalism links to the work of Graham A. Jarvis.

Editing, Journalism, Copywriting, and Public Relations
- 3D Printing (2)
- Artificial Intelligence (184)
- Augmented Reality (2)
- Automotive (115)
- Autonomous Vehicles (72)
- Awards (1)
- Banking (49)
- Big Data – IT (140)
- Blockchain (7)
- Business (326)
- Business Continuity (118)
- Business Process Automation (4)
- Call and Contact Centres (18)
- CFO (11)
- Clients, Past and Present (468)
- Cloud computing (175)
- Connected and Autonomous Vehicles (CAVs) (74)
- Connected Cars (97)
- Connectivity (17)
- connectivity (2)
- Connectivity – 5G (11)
- Consumer technology (12)
- Conversational Process Automation (3)
- Crowdfunding (2)
- Cryptocurrencies (2)
- Culture (1)
- Current Affairs (13)
- Customer Service (30)
- Cyber-Security (30)
- Data Acceleration (126)
- Data centre/data center (15)
- Data Management (86)
- Data Protection (59)
- Defence (1)
- Defence technology (1)
- DevOps (2)
- Digital inclusivity (1)
- Digital Transformation (42)
- Disaster Recovery (92)
- Diversity (1)
- E-Commerce (20)
- Economics (9)
- Edge computing (20)
- Education (19)
- Electric Vehicles (17)
- Email Marketing (2)
- Energy and utilities (9)
- Equality (1)
- finance (18)
- Financial Directors (19)
- Financial Services (51)
- Financial Services Technology (21)
- Fintech (24)
- fleet management (3)
- Flexible Working (9)
- Furniture technology (2)
- Further Education (2)
- General Counsel (1)
- Global Treasury (11)
- Government technology (13)
- Green Energy (4)
- Green fleet management (9)
- Green ICE fuels (3)
- H.R. and Recruitment (11)
- Health and Fitness (14)
- Health and Wellbeing (5)
- Healthcare (18)
- Higher Education (7)
- I.T in Human Resources (8)
- Immigrant Integration (1)
- In-house Lawyers (1)
- Industrial Internet (3)
- Information Communications Technology (410)
- Infotainment (4)
- Infrastructure Finance (1)
- Insurance (30)
- Insurance/Reinsurance (23)
- International Relations (10)
- Internet of Things (50)
- Law (8)
- Legal Marketing (4)
- m-Commerce (4)
- Mainframe technology (8)
- Manufacturing technology (1)
- Marketing (37)
- Mobile Marketing (22)
- Mobile Networks (9)
- Mobility (46)
- Music (1)
- New Homes Online (1)
- Open source (1)
- Pensions Technology (1)
- Pharmaceuticals (6)
- Policing (3)
- Politics (11)
- Power Generation (1)
- PR and Media Services (7)
- Project Finance (1)
- Regtech (5)
- Regulations (2)
- Religion (2)
- Remote Working (12)
- robotics (1)
- robots (1)
- Schools (8)
- Science (2)
- SD-WAN (37)
- Self-driving vehicles (110)
- Smart cities (18)
- Software development (2)
- Software standards (2)
- Software-defined (6)
- Sports (1)
- STEM (2)
- Sustainability (2)
- Teaching (15)
- Television (5)
- The Marketing Leaders (10)
- Trading floor (5)
- Travel Technology (11)
- Uncategorized (16)
- Universities (10)
- WAN Acceleration (10)
- WAN Optimisation (137)
- water leak detection (8)
- Web/Tech (449)
- Weblogs (17)
- website accessibility (1)
- Women (1)
- World Finance – Financial Markets (20)
Recent posts
About and Social Media
Category: Disaster Recovery
-
Organisations in the financial services industry should invest in data acceleration solutions to help them stay ahead of their competitors. With financial services being ever increasingly data-driven, the cost-focus of data management needs to shift because data is a company’s most invaluable asset. Organisations therefore need to ask themselves questions about how to invest wisely…
-
Organisations are so quick to adopt new technologies that they often overlook the value legacy devices have to offer. Scott Jeschonek, Director of Cloud Solutions at Avere Systems thinks that while oil and water don’t mix, legacy and cloud do in comparison. In spite of the hype about moving applications to the cloud and about…
-
There is an overarching fear that Artificial Intelligence (AI) and Machine Learning are going to take over people’s jobs, but there is a counter argument that their main purpose is to support humans as enabling technologies. In their proponents’ viewpoint, they aren’t disabling anyone. However, organisations that don’t train up their staff now to learn…
-
Clive Longbottom, Client Services Director at analyst firm Quocirca commented on Facebook: “I’m assuming that should this NHS attack be shown to be down to cost-cutting measures and corner-cutting by the many private companies involved, they will be held responsible for the financial costs involved, and that their management will be held responsible for manslaughter…
-
The truth…is that wide area networks will always be the foundation stone of both edge and cloud computing. Secondly, Bittman clearly hasn’t come across data acceleration tools such as PORTrockIT and WANrockIT. While physics is certainly a limiting and challenging factor that will always be at play in networks of all kinds – including WANs,…
-
IoT gives birth to IIoT, which involves monitoring the performance of complex machinery such as gas turbines, aircraft, ships, electrical grids and oil rigs. So it’s not just about a diversely spread group of CAD engineers working collaboratively across the globe. “IIoT has never been so diverse and in depth with vast amounts of data…
-
In the short term, the idea is to augment and to automate. As the use of AI grows, this technology will take over certain tasks by analyzing data and reacting accordingly. With experience, it can improve and predict. In the case of Shazam for example, AI can predict the next big hits. That’s great, but…
-
The key is to have a backup plan. Rather than blasting its way through the file systems, ransomware will eventually work silently in the background, encrypting files over a period of time so that they become a part of the backup data sets. It’s therefore important to maintain generations of data sets, not only locally…
-
Read David Trossell’s top 5 tips for protecting your organisation against ransomware…
-
The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks. No longer is it a matter of pride and peer recognition in the…