Director of Computing, Digital Forensics and Cybersecurity Paul Stephens muses on the best way to sign off an email…
I don’t actually sign my emails. Call it laziness or ultra-efficiency but it’s easier and takes fewer keystrokes to automatically sign off. If I’m forced to, for example, when I create a meeting and my email client doesn’t automatically add a signature I might grudgingly add a ‘P.’. Instead I have a couple of signatures set up Continue reading
The UK government has unveiled a new £1m scheme to help small and medium-sized enterprises (SMEs) protect themselves from cyber attacks.
The initiative is part of a range of measures designed to increase the resilience of UK businesses to cyber attacks, and will provide SMEs with vouchers up to £5,000 which they can use to access specialist services from the UK cybersecurity industry, and so adopt the government’s Cyber Essentials Scheme. Continue reading
2014 was a landmark of occasions for the Internet; the World Wide Web hit the age of 25 with the Internet itself reaching its 45th birthday. This milestone year also saw Dr Abhaya Induruwa, of Canterbury Christ Church University, inducted into the ‘Internet Hall of Fame’ for his pioneering academic contributions and research into networking, but most of all the deployment of the Internet into Sri Lanka. Dr Induruwa’s contributions and success are renowned in Sri Lanka, so much so he is known as the ‘Father of the Internet in Sri Lanka’. Continue reading
A few years ago there was a joke along the lines that whenever someone stated they were about to do something, someone would say that ‘there’s an app for that.’ And to some extent that is true. There are a very large number of apps out there. It can be very easy to create an app to do something, and some are incredibly useful. On my phone I have apps for tide tables, checking pollution at my local beach, setting up intervals for sports training, measuring and mapping my sporting training sessions as well as all the others you’d expect to see. Tools like MIT App Inventor allow children and even Computing Lecturers to create apps for the Android platform fairly easily with a few simple constructs and a programming language familiar to a large number of school children in the UK. Continue reading
Delegates at Planck 2015.
The department recently supported me to give a paper on my work on black holes and quantum information theory at the Planck 2015 conference in Ioannina, Greece. This is an annual, high level meeting of particle physicists and it was exciting to be able to present my work at such a prestigious event, at the invitation of the organisers. Black holes are thought to be the ultimate information storage system, with an incredibly high capacity which is proportional to their surface area. Recent work in quantum information theory indicates that they should be surrounded by a ‘firewall’ of radiation but it is not clear where this would come from. My work suggests that such a hot object could form during gravitational collapse due to an effect from string theory, which would be a dramatic vindication of the ideas used in the development of quantum computers.
About the author:
Mike Hewitt is a lecturer in Computing, Digital Forensics and Cybersecurity at Canterbury Christ Church University.
The programme from the event can be downloaded here.
(Mike’s lecture is listed on page 4).