New Technology


New Technology

  • When is an elephant not an elephant ?


    While you may be happy with social sites identifying what’s in your photo, there are people that go to lengths to ensure that the images posted online are not identifiable as to what the image contains. This means for automated systems scanning for specific types of image, they are fooled into believing that an elephant is a bowl of guacamole. The BBC reported last year ( ) that some images with a single pixel change could fool image classification software.

    Thanks to research by Aaditya Prakash, Nick Moran, Solomon Garber, Antonella DiLillo and James Storer of Brandeis University , their new published paper (Protecting JPEG Images Against Adversarial Attacks, 2018) identifies new algorithms which could be used to protect the images.

    To give a visual, here’s the elephant example that the team worked on, among others.

    Elephant images

    As can be seen to the human eye, the 4 pictures look extremely similar. Working from left to right, the team start with the original image, then the image that has had the attack applied, this shows the classification as guacamole. The third photo is the image first being compressed to JPEG and then classified, this shows that it correctly classifies the elephant, but with low confidence, and considers it may be a chimpanzee. The final image uses the new Aug-MSROI method, which renders an image that is classified correctly with good confidence, and can still be decoded by normal JPEG routines.

    So if you were thinking that by over/underlaying hidden images you could turn the photo of your pet kitten to be identified as a bowl of chilli, then think again, the likelihood of it still seeing a purring kitten is high.

  • 64 financial ratios less likely to predict company failure than 6 qualitative measures

    Financial Prediction

    If you asked people 6 questions about a company, or you researched 64 financial indicators about a company, which would you think was going to predict a company will fail within a year ?

    Jacky C K Chow, Aston Business School, Birmingham University knows the answer. Chow’s MBA dissertation[1], which studied and compared the options available. During her research, Chow looked at different methodologies of Machine learning to understand and predict the financial distress of a company. Using methods such as Linear Regression, Decision trees, Artificial Neural Networks amongst others, Chow took the available data on companies in Poland to generate predictions on the financial future of companies.

    Also undertaken was the analysis, using the same methodologies, of second dataset from a previous study which had six qualitative measures (Industrial risk, Management risk, Financial Flexibility, Credibility, Competitiveness, Operating Risk ) from loan experts.

    The results gave a very distinct answer. The loan experts qualitative answers, when analysed gave a better indication of insolvency than the 64 financials [see table below]. Furthermore, her findings indicated that by asking 4 questions of the loan experts on a company, their combined answers, could then be analysed via decision tree classifier to give a 90% accurate prediction. The cost of collecting from financial experts is more expensive. Also noted was that quality control must be applied as in some techniques the conclusion can easily be biased.


    Need assistance with predicting your IT budget, speak to a telanova Consultant about how we can help your IT be more predictable.

    Call now on 01344 567990

    [1] Jacky C K Chow, Analysis of Financial Credit Risk Using Machine Learning, 2017

    64 Financial Measures

    • 1 net profit / total assets
    • 2 total liabilities / total assets
    • 3 working capital / total assets
    • 4 current assets / short-term liabilities
    • 5 [(cash + short-term securities + receivables - short-term liabilities) / (operating expenses - depreciation)] * 365
    • 6 retained earnings / total assets
    • 7 EBIT / total assets
    • 8 book value of equity / total liabilities
    • 9 sales / total assets
    • 10 equity / total assets
    • 11 (gross profit + extraordinary items + financial expenses) / total assets
    • 12 gross profit / short-term liabilities
    • 13 (gross profit + depreciation) / sales
    • 14 (gross profit + interest) / total assets
    • 15 (total liabilities * 365) / (gross profit + depreciation)
    • 16 (gross profit + depreciation) / total liabilities
    • 17 total assets / total liabilities
    • 18 gross profit / total assets
    • 19 gross profit / sales
    • 20 (inventory * 365) / sales
    • 21 sales (n) / sales (n-1)
    • 22 profit on operating activities / total assets
    • 23 net profit / sales
    • 24 gross profit (in 3 years) / total assets
    • 25 (equity - share capital) / total assets
    • 26 (net profit + depreciation) / total liabilities
    • 27 profit on operating activities / financial expenses
    • 28 working capital / fixed assets
    • 29 logarithm of total assets
    • 30 (total liabilities - cash) / sales
    • 31 (gross profit + interest) / sales
    • 32 (current liabilities * 365) / cost of products sold
    • 33 operating expenses / short-term liabilities
    • 34 operating expenses / total liabilities
    • 35 profit on sales / total assets
    • 36 total sales / total assets
    • 37 (current assets - inventories) / long-term liabilities
    • 38 constant capital / total assets
    • 39 profit on sales / sales
    • 40 (current assets - inventory - receivables) / short-term liabilities
    • 41 total liabilities / ((profit on operating activities + depreciation) * (12/365))
    • 42 profit on operating activities / sales
    • 43 rotation receivables + inventory turnover in days
    • 44 (receivables * 365) / sales
    • 45 net profit / inventory
    • 46 (current assets - inventory) / short-term liabilities
    • 47 (inventory * 365) / cost of products sold
    • 48 EBITDA (profit on operating activities - depreciation) / total assets
    • 49 EBITDA (profit on operating activities - depreciation) / sales
    • 50 current assets / total liabilities
    • 51 short-term liabilities / total assets
    • 52 (short-term liabilities * 365) / cost of products sold)
    • 53 equity / fixed assets
    • 54 constant capital / fixed assets
    • 55 working capital
    • 56 (sales - cost of products sold) / sales
    • 57 (current assets - inventory - short-term liabilities) / (sales - gross profit –depreciation)
    • 58 total costs /total sales
    • 59 long-term liabilities / equity
    • 60 sales / inventory
    • 61 sales / receivables
    • 62 (short-term liabilities * 365) / sales
    • 63 sales / short-term liabilities
    • 64 sales / fixed assets

  • Affective computing may soon be watching your Valence and Arousal

    Affective computing is the interdisciplinary study of human emotional analysis, synthesis, recognition, and prediction ( Continuous Affect Prediction Using Eye Gaze and Speech , Jonny O’ Dwyer, Ronan Flynn, Niall Murray, Athlone Institute of Technology 2018)

    The research the team carried out at the Athlone Institute of Technology, used open source software connected to cameras, to identify the emotions of the participant during testing, previous research has generally relied on headsets and eyetracking devices, using cameras being significantly less intrusive. They focused on a combination of eye gaze and speech to predict the arousal and valence of the participant. As in the image below these are cross related.

    Arousal-Valence diagram from Abhang and Gawali

    Arousal-Valence diagram from Abhang and Gawali

    The arousal can be classed as the amount of energy in the emotion, and the valence the positiveness or negativeness of the experience. The team used OpenFace and then extracted 31 features from the raw data.

    They combined this with the audio captured featuring 2268 different features of the speech. Work combined the speech and eye gaze results in a number of different methods, and from that they were able to create predictions of 0.351 for feature fusion and 0.275 for model fusion representing a 3.5% and 19.5% improvement for arousal and valence compared to unimodal performances.

    What does this mean for the real world. One potential application will be in health and diagnosis where the true emotions of a subject are needed to understand the interaction, while not having intrusive devices affecting the results.


  • As technology uses data smarter, sharing economy is growing


    Shanghai, Friday, rain expected. Another rainy day in the city, leaving for work by public transport is quite popular, and carrying an umbrella for the regular days of rain the norm. However, all this might be about to change, and before you begin thinking of a conspiracy to change the weather, it’s the smaller item that is changing.

    With advances in technology, and decrease in cost of components, there are now 10,000 umbrellas on the streets of Shanghai, each can be rented instantly. Some may remember when this happened before at the beginning of 2017, that project didn’t get off to such a great start, losing 300,000 umbrellas. Justin Jia, Zhejiang Tianwei Umbrellas, has taken up the challenge, the Chinese entrepreneur has created a pioneering sharing app for umbrellas, and currently you can rent one of the 10,000 umbrella’s in the city.

    Using both a deposit, and then scoring on the person’s behaviour, eg. reporting , damaging, returning on time, etc. the data is key to the profitability. Rather than monitoring the umbrella, it is more the person that is being monitored. Much like you may improve your credit rating, soon you’ll be able to improve your share-ability rating.

    So next time it is a rainy day, you soon may be able to leave your umbrella at home.


  • Back on the road with Deep Reinforcement Learning at the Traffic lights

    When you’re next waiting at the traffic lights, you may be wishing you were in China, thanks to the research being done by Xiaoyuan Liang, Xusheng Du, Guiling Wang, and Zhu Han. They have been working on deep reinforcement learning for traffic.

    Decreasing the pollution created by and energy wasted by vehicles waiting at traffic lights could be a real game changer. Even the smallest gain of 1 or 2 percent could see serious changes to the environment.

    While there have been previous studies into using Deep Reinforcement Learning to control traffic signals, Xiaoyuan Liang and teams research takes it further with a Convolutional Neural network effectively on top, creating a proposed whole network called Double Dueling Deep Q Network (3DQN)

    And the results were good. They calculated the average cumulative waiting time as the measurable result. And in both rush hour and normal traffic rate situations the system reduced the waiting time by over 20%.

    Next time you are at a council meeting, maybe you could raise the new options available to the county planners, a 20% cut in pollution is surely worth investment.


  • Code Smells, a rise to maturity

    The smell of Orchids

    Today’s world is full of an increasing amount of program code. Back in 1999 Martin Fowler[1] defined the basis of Code Smells. Smells, being the inherent way humans in nature detect bad, and good things, likewise, Code has a smell, be it bad or good. A bad code smell being code that contains bad programming techniques, duplicate code, ie. poor quality. A new paper called Code Smells, by Peter Kokol, Milan Zorman, Bojan Žlahtič, Grega Žlahtič [2] , has been published.

    Kokol’s paper[2] analysed the rise of discussion around code smells. Using bibliometrics to analyse research papers which contain references to code smells, Kokol was able to map and detect the changes in frequency and geographical distribution of papers.

    Their results highlighted 337 publications which contained references and of those 70% were related to conference proceedings. Which they concluded may mean that code smells is still in the rising state of maturity.

    They plotted the details on a timeline and identified that the largest rises were in 2009, then in 2014. They also identified which countries were using the term the most, and as might be expected USA was top, with almost twice the next country, Italy. Italy contained the individual institution that had produced the most papers, with 19 papers published by the Universita degli Studi di Milano.

    The research papers indicated that code smell research was split into 3 themes, smell detection, software refactoring, development & anti-patterns. Of these themes code software development and anti-patterns, was the most popular themes, using anti-patterns and knowledge of software development problems code quality can be increased.

    Overall an interesting and highlighting paper that shows that in the future, machine learning, and other analysis tools may be used against software development code to identify if it smells of sulphur or wild orchids.

    [1] M. Fowler, Refactoring: Improving the Design of Existing Code., Reading: Addison - Wesley, 1999.

    [2] Peter Kokol, Code Smells, 2018


    Looking to test the quality of your IT configuration, talk to our consultants about what changes you can make to get that wild orchid smell :

    Call telanova on 01344 567990

  • Counting the people just got a lot more accurate. How many people in this scene


    The next US president may well be able to confirm the number of people attending his inauguration, and this down to deep learning and convolutional neural networks.

    Thanks to the team, Yuhong Li, Xiaofan Zhang, and Deming Chen from Beijing University of Posts and Telecommunications and the University of Illinois at Urbana-Champaign, their recently published work, CSRNet: Dilated Convolutional Neural Networks for Understanding the Highly Congested Scenes, may revolutionise how accurate and fast crowd counting will be in the future.

    The congested scene analysis work is based on 2d images, and can break down an image and calculate where the higher density of crowds are located. This will help organisers in the future to understand how to keep people flowing, and for static situations, how to keep the density low enough to ensure attendee comfort.

    The teams work focused on density map creation, and by using dilated CNN on crowd counting for the first time, the system outperforms other state-of-the-art crowd counting solutions. Demonstrating their approach using five public datasets, the overall model, is smaller, more accurate, and easier to train and to deploy.

    Using the ShanghaiTech crowd dataset, which is a dataset of 1198 images with a total of 330,165 people, split over 2 areas, one being a highly congested scene, and one being sparse crowd scenes, the method improved the accuracy, dropping the error rate by 7%.

    On the other datasets, the CSRnet system continued to outperform in most of the scenes, only bettered in 1 out of 5 sets by CP-CNN method.

    The method doesn’t need to be reserved for counting people, it can also be used for counting vehicles, and using the TRANSCOS dataset it outperformed all other methods.

    In summary, next time you’re in a photo, there may be a new method of counting how many other people are in the picture with you, with a better accuracy than previously attained. Time to invest in some camouflage.


  • Did you see that stop sign


    Hee Seok Lee and Kang Kim have recently been working with Convolutional Neural Networks in detecting Traffic Signs. To most drivers, a traffic sign is normally fairly clear and identifiable. However, to a computer figuring out where a sign is in a flat image is not so simple.

    The system isn’t expected to handle having trees growing over the signs, so any signs that aren’t fully visible, so it is a time to get out the pruning shears. However, CNN is really proving itself when it comes to recognising the shapes at speed.

    Using different parameters such as using a lighter base network, ie. deeper neural networks give better results, but to do that requires a higher level of processing power than the rewards. Changing the resolution also allowed recognition of the sames signs at a high frame rate, and cropping the image also assisted in speeding up recognition, ie. far away traffic signs in the centre of the image of a vehicle camera aren’t recognisable, and the normal location for traffic signs will be on the side of the road, so detection can be targeted at the appropriate locations.

    In summary the team identified that for the best accuracy at speed, by using the latest architectures, of object detection such as feature pyramid networks and multi scale training, they achieved a 7FPS on a low power mobile platform, ideal for your self driving car, or for alerting drivers to signs that they may have missed!


  • Exploring off world and the work going on behind it

    arXiv:1701.07550 [cs.RO]

    It’s not something you’re likely to be thinking about as you wandered around the supermarket at the weekend picking up groceries. However, maybe just maybe you were potholing in a dark cave somewhere in the Pennines, just then you may have thought to yourself how agile you have to be, and how many different ways there are of getting from A to B, and how careful you have to be about getting stuck in a corner. By now you may be drawing parallels with IT and how that sounds amazing similar, be assured there are companies out there that can help you with that, but back on track to where this blog was going, which was to an off world object, be it moon, mars, asteroid.

    You’ve probably seen the amazing Nasa mars lander photos of the surface, not to mention a few conspiracy theory add ons and alien sighting add ons, what lies below the surface is still something of a mystery. What is known is that there are caverns, and possibly lava tubes, now place yourself into theory mode, and consider how you would explore those tubes remotely.

    Seeing the picture of the rover from Nasa doesn’t do justice to its size, and simply driving into a tunnel won’t help as there’s no light for recharging, no knowing how deep you might need to drop down, and once in unlikely to be able to transmit a signal back to earth.

    Well the people, Himangshu Kalita, Steven Morad, Aaditya Ravindran, and Jekan Thangavelautham from the University of Arizona and Arizona State University have released their paper ( Path Planning and Navigation Inside Off-World Lava Tubes and Caves, 2018) on just those considerations.

    The team produced a theoretical paper with some amazing ideas on how to overcome these issues and explore the caverns. Their SphereX bouncing robots will communicate back to a base station, carrying mirror tiles, which will be laid down to bounce a laser light from the rover outside for light, communications and power, they demonstrate how serious things can really look fun, and inspire the fact that space exploration once again is having a ball.

    The algorithms and technology that they have for 3D mapping of tunnels with multi hopping robots, and their “TransFormer” strategy for recharging their robots deep inside a cave, can not be done justice in a short blog post.

    Hop over and download their paper for yourself

    Have an inspired week ahead, everything we do here today brings us closer to being there tomorrow


  • How much downtime is acceptable ?

    System 36 - 30Mb Hard drive

    Many years ago, once a year, in a production factory that ran 24/7, everything would come to a halt for the Test. While the Test was in progress all orders were stopped, people hung around like they were waiting for the starting gun of a race.

    Deep inside a locked room people would be busy dismantling and inserting a loan hard drive into the System 36 and then the big restore from 12 inch disks in magazines, 1st the monthly back up, then the weekly back up, then the daily back up. After many hours and copious cups of coffee and boxes of biscuits, the system would be sent live to see whether everything had worked successfully. The downtime was costly, and that was thankfully without any live customers trying to connect online to see the status of their order.

    Fast forward to just a few years ago, and replication was the in thing. Some companies built whole triplicates of their server rooms, with a duplicate site only a few miles away, ready for raiding for parts, and another site a few hundred miles away ready for major disasters. Testing the fail-overs resulted in many issues of lost orders, lost data as people didn’t realise they were entering data onto the temporary fail-over test systems.

    Fast forward to a few of years ago, Enterprise companies were migrating to the cloud, aware of the cost, but knowing of the saving of having a system that would be always on and able to expand and reduce as the demand suited, backups are still required but testing of those can be done in a separate cloud area without disrupting the main business.

    Fast forward to today, and the costs have lowered, and now every business Small and Medium can enjoy the cloud benefits. Whether it is full in the cloud servers through Azure, or using Cloud services such as Office 365 and G-Suite.

    What comes next is open to debate, but the server-less architecture looks to be a fair bet, which will see that server you built dynamically grow or shrink depending on how busy and how much work it is doing. So you won’t be paying for power you’re not using, and you will be saving the environment.

    Stick with us and we’ll keep you up to date


    PS. Don't forget to try out our downtime cost calculator

  • How your phone is leaking data in the physical world.

    If you own a modern (post 2012) phone, then you may have had a pop up at some time on your phone when in a shop or cultural or leisure centre. It may be that you found the pop up on your phone useful, you clicked it and it led to an webpage of the place you were in and gave a coupon or information for the location.

    What you may not have known is that same technology can also being used to track your movements. Bluetooth Low Energy (BLE) works by transmitting data to your phone over a very small distance (generally less than 7m). This is very useful in museums for instance, to tell you which room you are in and provide you with a map and information. In doing so your phone tells the beacon your MAC address (one of your phone’s unique identifiers).

    Your mac address can thus be tracked as you move around the area covered with the transmitters, not all beacons will cause a popup, but it will receive your MAC address regardless to allow the tracking.

    What’s the impact for the business? Tracking how people move around and where they stop allows for better product placement and keeping the flow moving. What’s the impact for you ? Tracking anonymous MAC addresses could mean that you do or don’t get offers depending on how often you are in the building. Imaging a regular shopper getting no offers, but a new shopper (new phone) being given the option of a voucher to help them become a customer.

    Will you be keeping your Bluetooth on next time you enter a location, or turning it off to go stealth mode ?


  • Just when you thought it was safe to go online

    Facenet and dating of the future

    Sometimes there are times when you read something that makes you consider the future in a very poor light. Having this particular program made publically available at this early stage of development is also a cause for concern of how skewed the world will become in the near future.

    Many people will have by now at sometime in their adult life joined , have a close friend or family member that has experienced one of the online dating services. The services generally rely heavily on the basis of instant attraction. In many, you are presented with a visual of the person before any details of the personality are supplied to the browser. Again on the visual impact, the browser can choose to like / skip etc.

    Think now to the newly released python script, from Charles F. Jekel and Raphael T. Haftka of the University of Florida [arXiv:1803.04347 [cs.CV]], that based on just 20 of your likes is able to build a generic facial representation, which when applied to further images has an accuracy of 60% of knowing if you will like that image.

    Once trained on 406 profiles, where each like represented a different classifier, it was over 70% accurate. Being one of the first algorithms in the area, accuracy is likely to improve over time. The question being then is where will this lead ?

    Will you be able to take your liking profile from one supplier and use them with another. The reality of how oddly familiar this all seems, think about where else your liking data is used for marketing. Marketing teams will see the usefulness of this data being collected. Will the privacy agreement you’ve signed protect you liking data. The company you use could use that data for their own purposes as long as it is in their privacy agreement.

    Fast forward a few years, and every website you visit could be presented by a computer generated personna that is facially configured to match your dream person. How could you resist not purchasing 63 pallets of widgets that you really don’t need just because you want to please them.

    During the rise of computers we were wowed by the amazing graphics and realism that slowly grew as processors became more powerful. Soon the realism will not be realism but a distortion of reality based on our dreams and desires.

    Back in reality however, it may just be time to think twice about how you let companies use your data, not all of your data is input by you on a clearly laid out form. Your data is how you navigate, how you interact, how you choose, what you look at. Under GDPR companies must release all your data they collect about you to you, and must tell you how they are processing it.

    For more information about the FaceNet script see * arXiv:1803.04347 [cs.CV]

    For more information about GDPR email This email address is being protected from spambots. You need JavaScript enabled to view it.


  • Laptop encryption, why you need it

    Do you lock the doors of your house when you are not in?  I hope the majority answer to this question is "yes of course I do, this isn't Canada you know!" This leads me to my next question. Are your organisation laptops encrypted? The answer to this question should be the same as the first but I bet it isn't. 

    No I don't think you all are spies before you ask, but I do think you should all be at least aware of why laptop encryption is a necessity for EVERY organisation and not just the ones that send their payslips to employees titled agent. 

    Let me quickly explain what encryption is and why you need it.

  • Now's the time to upgrade your wireless infrastructure

    If your business is relying on older wireless infrastructure it is probably time to upgrade. Wireless traffic is only going up, not only is the demand from each device going up, each person typically has more devices - laptop, phone and tablet etc!

    On top of that, nearby wireless access points, bluetooth and other wireless peripherals all compete with you for the limited amount of wireless bandwidth.

    Enter "5GHz". The "5GHz" band has a lot less devices competing. Typically 5GHz has a smaller range than 2.4GHz, which counter to what you would expect is actually a benefit. It means there are fewer devices competing within an access point’s reach.

    Any laptops, phones and tablets replaced within the last few years probably already support the latest wireless protocol 802.11ac which uses the 5GHz band, why not update your wireless infrastructure to support them? Wireless 802.11ac infrastructure is also now quite reasonably priced.

    telanova will guide you through the whole process: defining your requirements, choosing a vendor, creating a secure design, implementation, and post installation support. Contact telanova on 01344 989 530 or This email address is being protected from spambots. You need JavaScript enabled to view it. to get started.

  • PCs and laptops are too complex and troublesome

    For most people, PCs and laptops are too complex, too troublesome and too expensive, especially now you can offload so much to the cloud. Why waste time on antivirus, backup, drivers, service packs, upgrades etc? I've been keeping my eye on Chromebooks since they were launched a couple of years ago. Four weeks ago a new Chromebook came out, the Samsung series 3, and I just had to buy one. I love it: it starts up in just 8 seconds, it's as light as a feather, silent, runs six hours on battery, all for just £200+VAT.

  • The IT Productivity Paradox and how to fight it.


    "You see the computer age everywhere but in the productivity statistics" - Robert Solow

    It doesn't make sense, does it? The fact that even though we live in the most advanced technological breakthrough in the history of mankind, we should see an exponential curve in productivity; but we don't. It has even been argued to be in decline. With the birth of global communication and easily accessed off-the-shelf technology and software that is designed to maximise efficiency, it's hard to believe that this is the case.

    But it is. Matt Richel, for the New York Times, writes, “statistical and anecdotal evidence mounts that the same technology tools that have led to improvements in productivity can be counterproductive if overused."

    He goes on to explain that the big Silicon Valley firms have a monster of their own creation wrecking havoc in the productivity statistics, with employees checking emails up to 77 times a day, with mundane tasks taking up large amounts of time e.g. group emails and attachments. According to Basex, the United States alone loses up to $650bn a year due to unnecessary tasks and delays that could potentially be remedied by more efficient IT systems being implemented.

    So what on earth is going on?

    The answer is actually remarkably simple and is known as The Productivity Paradox, which has taken countless victims over the years. It is the unusual observation that despite further investment in IT technology to improve productivity, worker efficiency has hardly budged. This is not an anomaly however; the same technology 'paradox' has been seen before in the early 20th century.

    Put yourself back to 1881. You work in a dark, humid and hot factory powered by a steam engine. The sound of mechanical machinery is deafening. Labour turnover is at an all time high due to dangerous working conditions and disease. Then, out of nowhere, Thomas Edison arrives to save the day with his brand new electrical motor! You would of thought businesses would of jumped straight onto it, no?


    By 1900, less than 5% of factories used electrical power and instead opted for the traditional method. It took until the 1920s, over 40 years, for 50% of factories to use electrical technology. From this, we can see that despite new and exciting technology that could revolutionise the way we think and work, we still hesitate to use it - and for quite some time.

    Why? Because change is difficult and stagnation is easy.

    We as humans are hardwired to resist and fight change. And so, with such a radical change needed to push through required electrical motor legislation (or in this case, computer technology) and despite us knowing the immediate and long term benefits of adopting a 'new way' to do things, it's still uncomfortable for us because it will completely upend the way we think - which is understandable to an extent.

    But in truth, we all need to get over ourselves and take the initiative. We live in a world of easily accessed software that is a click away. Think of it this way - you have a document you need to distribute and get multiple colleagues to append. Would your business send it on Google Documents, with live editing powered by the cloud and automatic saving? Or would your business use the same method that has been around since the 1990's, requiring all users to send you a separate document and for you to compile it all together manually? 

    Now ask yourself - which of these solutions is the steam engine and which is the electrical motor?

    If your business is using the steam engine, telanova is at hand to help you join the IT Revolution. 

  • When broadband isn't fast enough

    The reality of broadband internet speeds doesn't live up to advertisers' headline rates. The upstream rate, for information flowing from your servers at HQ to people working remotely, is only 5% of the headline downstream rate, and the downstream rate is less than 1% of the speed of your local network. As a company grows with more people working from home, or working at other offices, what do you do next?

  • Why standardise on Windows 8 for your business

    If you're choosing IT for your business, forget about the irrelevant features and focus on how Windows 8 will benefit your business.

  • Your teams are being targeted

    Sharks circling targeting users

    Like spearing fish in a barrel.

    The sharks are circling.

    Advances in technology have seen great benefits to humankind as a whole. Each step forward for mankind, sees an additional step forward for the criminal underground.

    Machine learning is becoming more wide spread. If your company uses Adwords, you may well be using their own machine learning on which of your adverts performs better based on the demographic and information of the person they display the advert to.

    In the past many of us will have received an email purporting to be from a bank or parcel carrier that we’ve never used. You may well have become accustomed to saying to yourself, but I don’t have a Western Union account etc.

    What now if the machine learning was reading your public social media, of you and your friends and tailoring the email or social post to match what you wanted to see. Imagine if you suddenly saw a post on your social feed that said
    I know you went to insert place last year and I wondered if you’d seen these photos of the place insert sample image ,
    catch up soon
    insert a name of a friend

    • How closely would you look at the poster's signature
    • Would you click and check out the photos ?
    • What if it said update your Adobe Reader / Gallery Pack software when you did ?
    • Did it all seem legit ?
    • What if on the gallery page you visit theirs more social engineering, such as donate to just giving page ?
    • What would your employees and friends do ?

    In research published this month shows that by using machine learning to facilitate socially engineered phishing campaigns they are achieving a 5-14% better rate of return.

    • How does a 5-14% higher chance of breach fare with your company?
    • When and how did you last assess your risk of attack?
    • What action have you taken to reduce that risk ?
    • Are you ready for the onslaught ?
    • What actions have you already taken to upskill your employees?
    • What packages are there that can assist you ?

    Want to know more, enter your details below.

    Enter your name, telephone and email address so we can contact you
    Name :
    Email :
    Phone :

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand