"I too would like to recommend Pete PC. His service has always been quick, professional and done to a VERY competitive price. The work I have had done has been completed to a high standard too, and to top it off he is a great bloke. Thank you and I will definitely be using you again - no doubt (though ultimately I'm hoping for better luck now)"

James Murday

Would you be happy to
Leave a Testimonial?


Why publishing images online is riskier than you think
Most of us don't think twice about uploading images to the internet.
Read more: computing.co.uk


Get to know Linux desktop security best practices
Linux workstations are just as vulnerable to attacks as any Windows desktop,
Read more: techtarget.com


Five reasons why smart glasses mean business
Sorry, consumers. Smart glasses are for professional use only for the foreseeable future. Don't try this at home.
Read more: itworld.com


Safeguarding hardware from cyberattack
Engineers are addressing a vulnerability in hardware that some thieves have exploited to steal data
Read more: sciencedaily.com


How Brands Can Leverage Image Recognition Technology to Learn About Consumers
Ever wonder how your iPhone recognizes your face and even attempts to recognize people in your photos?
Read more: adweek.com


How to Choose the Right Platform to Run Your Smart Home
Maybe you're taking your first tentative steps into the smart home market, or maybe you're expanding what you've already got,
Read more: gizmodo.co.uk


Google Will Now Delete Your Data Automatically
You can now force Google to automatically delete your data after a set period of time.
Read more: makeuseof.com


Everything you need to know about Revolut, the UK's digital banking unicorn
If you haven't heard of Revolut yet, you've probably not been paying too much attention to the UK's FinTech scene.
Read more: uktech.news


Revamped Google Glass 2 aims more powerful AR at the enterprise
Google renews its focus on enterprise augmented reality with the Glass Enterprise Edition 2; it packs a better camera and faster processor.
Read more: itworld.com


Mailchimp Debuts a CRM Platform
to Help Small Businesses Act Like Enterprise Businesses
Read more: adweek.com


Twitter bug accidentally shared location data of some iOS users
Twitter says it has fixed a bug that resulted in a user's approximate location information being shared with an unnamed Twitter partner.
Read more: thenextweb.com


Here's How to Get 2x the Results with 1/2 the Content
SERPs have become a zero-sum game in the last decade.
Read more: searchenginejournal.com


Google just smashed the world record for calculating digits of pi
Happy π day! We now know the first 31.4 trillion digits of the tastiest mathematical constant
Read more: wired.co.uk


What do tech giants know about you?
A new tool shows you just how much
Read more: zdnet.com


The shift to edge computing is happening fast -- here's why
Whether you call it the Fourth Industrial Revolution or digital transformation, enterprise IT is being changed fast, and forever, and edge computing is a big reason why.
Read more: techtarget.com


Do You Need Anti-Virus Apps for Your Phone?
While you might be used to having to protect against malware and viruses on your computer, security tools are less common on phones.
Read more: gizmodo.co.uk


Plan to secure internet of things with new law
The rapidly growing "internet of things" (IOT) - internet-connected gadgets - would have to be made more secure under proposed new laws.
Read more: bbc.co.uk


When can we finally get rid of passwords?
The tech exists to replace them, but adoption is lagging behind
Read more: theverge.com


How to use AI in your business in 2019 -- AI sweet spots
Step one in figuring out how to use AI in your business is to know what AI can and can't do today.
Read more: techtarget.com


Google Maps is the new social network
While Twitter tumbles and Facebook flounders, Google Maps has emerged as the best social network for businesses.
Read more: computerworld.com


How to install a wireless networking card
Wireless networking is a must in the 21st century, but yet not all computers come pre-installed with a wireless networking card.
Read more: techadvisor.co.uk


How to run a Linux Desktop Using the windows Subsystem for Linux
Running Linux alongside Windows has proven to be increasingly useful over the years.
Read more: makeuseof.com


Skype adds screen sharing to its iOS and Android apps
Having spruced up its web service, Skype is turning its attention to mobile.
Read more: engadget.com


Tech Tips: How to Stay Secure on Vacation
Using public Wi-Fi is one of the most common, and most dangerous, information-security mistakes anyone can make.
Read more: tomsguide.com


8 Proven Tips to Make Your WordPress Blog Popular
Around 33% of the entire internet runs on WordPress, and thousands of new WordPress blogs are launched every day.
Read more: makeuseof.com


Google Launches New Cloud Security Services
Google has introduced a new set of services to provide cloud customers with improved protection from unsafe websites,
Read more: securityweek.com


Mac Versus Windows Keyboard Shortcuts: What's The Difference?
Mac and Windows keyboards might look the same at first glance, but there are some subtle differences between them.
Read more: interestingengineering.com


Websites to be fined over 'online harms' under new proposals
Internet sites could be fined or blocked if they fail to tackle "online harms" such as terrorist propaganda and child abuse, under government plans.
Read more: bbc.co.uk


Cloud migration: How to do so safely and securely
In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans.
Read more: computerweekly.com


Best vulnerability scanners
Online security and database protection should be prioritised whatever the size of the business, whether that's a startup, SME or large enterprise.
Read more: techworld.com


Multi-cloud management demands a single viewpoint
Remember when the narrative around the cloud was polarised by the simple choice of going public or private? How times have changed.
Read more: comparethecloud.net


Malware Mousetrap – how to catch a hi-tech hacker
Technology is a beautiful thing.
Read more: comparethecloud.net


VPN deals of the week:
Secure your laptop while traveling with a VPN.
Read more: lifehacker.co.uk


The UK's top cybersecurity startups
Britain isn't only a major buyer for cyber security, the industry is a huge growth area for the country.
Read more: techworld.com


How to take your business global
When you're ready to take your business global, how do you choose which territories to attack and which marketplaces are best to launch your international business on?
Read more: tamebay.com


What is cache memory?
We explain the different categories of cache memory, and how it differs from RAM.
Read more: itpro.co.uk


The UK's top cybersecurity startups
Britain isn't only a major buyer for cyber security, the industry is a huge growth area for the country.
Read more: techworld.com


Facebook claims server configuration change caused 14-hour outage to Facebook, Instagram and WhatsApp
Facebook's explanation refutes the explanation yesterday from network management software company NetScout that BGP routing issues were the cause of the downtime.
Read more: computing.co.uk


How to send anonymous emails
If you need to send email messages that aren't connected to your everyday identity. Here's a strategy to do that.
Read more: pcworld.com


Windows 10 quick tips: 12 ways to speed up your PC
Want Windows 10 to run faster? We've got help.
Read more: computerworld.com


Simple steps to protect your home network
If you've got one or two computers in your house, a Wi-Fi network and a smart device such as a TV, you've got a home network that needs protecting.
Read more: clickedonline.co.uk


What's Wrong With the Social Media Model
The social media model has come under increased scrutiny following revelations of data misuse
Read more: ecommercetimes.com


Your old router is an absolute goldmine for troublesome hackers
In the last three years, cyberattacks against insecure routers have rocketed.
Read more: wired.co.uk


Can people really spy on me through my laptop or smartphone camera?
The answer will surprise and worry you.
Read more: digitalspy.com


Hard-disk drives becoming more reliable, Backblaze failure figures suggest
Cloud storage company hard-drive failure figures for 2018 suggest HDDs have improved in reliability
Read more: computing.co.uk


Netflix Resorts to Giving Clues on How to Unlock Secret Bandersnatch Endings
Who knows where this extra hint will take people,
Read more: gizmodo.co.uk


What's next for MSI in gaming PCs
MSI's GS65 Stealth Thin was one of the most remarkable gaming notebooks of 2018.
Read more: engadget.com


The many beating hearts of UK tech
As London rises in the global ranks, cementing itself as a world-class technology hub
Read more: uktech.news


This Trojan attack adds a backdoor to your Windows PC to steal data
Hacking group TA505 is distributing a brand new form of malware - and using it to target banks and retailers.
Read more: zdnet.com


Are You Fully Automated?
One common theme with recent product tests and vendor briefings and that is - automation.
Read more: computerweekly.com



Why publishing images online is riskier than you think
Most of us don't think twice about uploading images to the internet.
Read more: computing.co.uk

Would you be happy to
Leave a Testimonial?