Is Training The Most Useful Application of Virtual Reality?

training useful application vr

VR was built for gamers, but the best uses are outside of entertainment Virtual Reality is a powerful communication tool. In business-to-business (B2B) negotiations, data visualization via VR could transform how companies interact. As well as B2B, Virtual Reality has a place in business-to-consumer (B2C) relationships. By now, you might have come across the term commerce. …

Read more

Cashless: A Valuable Global Trend?

pros and cons of cashless

Converting to cashless At one time, having a few coins in your pocket was the norm. Today, it is not so common. The prominence of card, online, and mobile-based payments has led many people to stop carrying cash at all – and businesses are taking note. But what does a cashless socio-economy look like, and what are …

Read more

10 Companies Spearheading Innovative Sustainability Initiatives

Companies Spearheading Innovative Sustainability Initiatives

Sustainability as an opportunity Patagonia’s efforts to reduce resource consumption have been well documented, from cofounding the Sustainable Apparel Coalition to the seemingly counterintuitive ‘don’t buy this jacket’ marketing campaign. The company has invested heavily in protecting the planet and is viewed as an example of sustainable success. Of course, there’s more to it than …

Read more

Automation In Accountancy

automation in accountancy

Accountancy has provided the perfect environment for automation. We spoke with Chetan Mistry of Smith & Williamson and Steve Lucas of Receipt Bank about why and how accounting firms have become hives of technology…  Innovation where it counts Receipt Bank was founded in 2010 to create a simple, cost-effective solution for business accounts management. Their …

Read more

Why Are Banks Working With Big Tech?

Why Are Banks Working With Big Tech

Incumbent banks collaborating with Big Tech companies are striking a difficult balance between partnership and competition. Now unless you were living under a rock, 2019 was the year that the vast majority of media outlets would have you believe that all the tech companies were becoming “banks” right!? Ermmm, not quite. The encroachment of the …

Read more

Google Duplex: Google Already Has Your Data, Now It Is After Your Business (Process)

Google Duplex

Google Duplex: a data dictatorship? In the 2019 Google I/O event, CEO Sundar Pichai demonstrated the next evolution of Google’s Duplex technology. Having already built capabilities to automatically book hair salon and restaurant appointments by actually calling the business and speaking with people, Duplex will next be moving to the web and filling out forms for you, …

Read more

Avoiding Cyber Disaster Joep Gommers: Tips & Completed Guides

Avoiding Cyber Disaster Joep Gommers

Cyber attacks aren’t just bad for business… DISRUPTIONHUB spoke to Joep Gommers, CEO of EclecticIQ, to find out how cyber crime has evolved from disturbance to disaster – and how threat intelligence technology can be used to avoid it. In 2018, the World Economic Forum’s Global Risks Report identified cyber attack as one of the top three …

Read more

At A Glance – Zero day Vulnerability

Zero day Vulnerability

Software security flaws with devastating potential A zero-day vulnerability is a software flaw that is unknown to the vendor, or which they have just become aware of but haven’t yet fixed. Typically, when flaws in computer programs which may lead to security issues are discovered, the software company will be notified and given time to …

Read more

Thanks For All The Phish Hacking: Hacking In Action

Thanks For All The Phish Hacking

When is a hacker on your side? When they’re showing you the pitfalls of phishing attacks… For most of us, our knowledge of how to stay safe online is sketchy at best. If we don’t open dodgy emails, don’t click on strange links, and vaguely attempt to keep our antivirus software up to date then …

Read more

At A Glance – Doxxing

at a glance doxxing

Leave a trail of digital breadcrumbs, and you could be doxxed Doxxing (or doxing) comes from ‘dropping dox’, a revenge hacking tactic to discover and publicize personal identities and information. Doxxing can compromise the safety and security of an individual or organization, often with serious consequences. Doxxing techniques include packet sniffing, whereby doxxers infiltrate a …

Read more