Take a look at this new content tool

               that we've been working on! 




This site stores cookies. None of them are intended to be harmful to you, they mainly are intended to make navigation easier. We also use Clicky Analytics here to gain understanding of what users are seeing and taking an interest in. If you don't like the idea of cookies and analytics, don't carry on. Leave now. Simple really.

If you navigate this site - we consider that you have given your IMPLIED CONSENT.

If you'd like to see a list of the cookies that NING sites use click here


One of the key aspects of our work is "Content in Context" curation - this site is a "one stop" showcase for much of the content streams and digests that we preside upon.

We hope you find it interesting and pay regular visits to catch up with what I'm seeing that we think is relevant and read-worthy.

As you will see, we sometimes carry "sponsored" links. The policy is simple: if we like it AND it's relevant - we'll maybe tell you about it.

We won't carry links to anything I don't consider worthy. Sometimes we get paid for these links.

If you'd like your company to be featured here - drop us a line and we'll make an arrangement. Painless.

My Main Twitter Feed

Instagram Link


The Active Content Digest by Curation Robot. If you'd like to use this facility for yourself - get in touch!

Why Balance Is Key with Healthcare Data Center Deployments


As healthcare organizations evolve their infrastructure strategies, they must weigh flexibility with cost savings.

Most organizations don't have SSH security policies in place - Help Net Security - MyTopPosts


            Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, even though SSH keys provide the highest levels of administrative ac...

UK citizens blind to how their data is used by organisations


New research released today by Civica reveals that many UK citizens are blind to the true use of their data.

IBM Beats Microsoft-is Top Blockchain Technology Leader - Technotipz


Based on a study IBM has a high-profile R&D engagement with several initiatives such as Hyperledger along with an extensive list of blockchain clients across an array of key verticals and makes use of cases that include banking, asset tracking as well as t...

8 ways to identify and measure security threats


Security execs need to better understand vulnerabilities to improve resiliency of information systems.

The Sage UK Top 100 of SME Global Influencers

Click to see the whole list here. Lisa and Mike both appear in this - look in the middle of the table. 

My Hiscox Guest Blogs on Tech for Small Business

Blog Posts

Which Airline?

Posted by Mike Briercliffe on October 30, 2013 at 1:00 0 Comments

Mike is in the Top100 in BigData - at #16 Globally

I'm in at 16! :-) CLICK to Link to the article.


About.Me is a nice facility ...

All your links in one place - simple but really nicely done AND including some analytics. Come and have a look at my links?

© 2017   Created by Mike Briercliffe.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Web Statistics