Holidays are coming!

The title of this article is a reference to the historic Coca-Cola advert. Whilst I’m not sure I’d class it as the Christmas season yet, it’s pretty clear that retailers think it is.

Coca-Cola Christmas trucks

The Coca-Cola Christmas ad – what isn’t Christmassy about HGV’s driving through the countryside?

Here in the UK, many shops have had Christmas stock on sale for over a month now, only taking it down for a brief interlude to replace it with Halloween and bonfire night stock. In just over two weeks, it’s the infamous Black Friday, which is meant to be when the Christmas shopping rush really gets started.

One of the key moments in British Christmas is now when the main Christmas advertisements start showing. I’ve yet to see the iconic Coca-Cola ad, but last Friday saw the launch of the festive John Lewis ad.

Over the last decade, John Lewis’s Christmas adverts have become rather famous and somewhat of a seasonal event. Each year the public sceptically awaits the ad to see if it’s going to better last years. This year’s tells the heart-warming (as always!) story of a little girl and an elderly man who lives on the moon.

This years attracted the usual attention. #ManOnTheMoon was the number one trending topic in the UK for most of ads release day (last Friday) and it was instantly parodied. Here are some of my favourites.

Firstly a Royal Mail undeliverable note.

What about The Martian, Matt Damon?

Maybe if the little girl had seen the film Up…

So the real question is: is this excitement just retailers trying to encourage us to spend more money? I’m not sure many people would argue in favour of Black Friday being an event that spreads Christmas cheer, but is there anything wrong with a festive advert pulling at your heart strings?

Genuine happiness creation, or just a clever marking ploy?

P.S Next time you’re in a food retailer, why not ask an assistant if they have any Christmas spirit in stock!

Business advice from industry experts

This is a sponsored post on behalf of Microsoft Cloud who have been working with The Economist. To find out more about sponsored content on Technology Bloggers, please visit our Privacy Policy.

Multinational business magazine The Economist has been working with Microsoft Enterprises business solution, Microsoft Cloud, to create a micro site called Empowering Business.

The site contains some very interesting bite-sized video snippets of business advice from industry experts. In this article I’m going to explore some of the advice that is offered on the site.


Professionals in a meetingIn under 30 seconds, the CMO of technology news site Mashable, Stacy Martinet, explains how businesses can control their own publicity channels. Historically, businesses have been dependant upon buying advertising, or relying upon the media to cover their brand. Now however they can control – to a much to a much greater extent – what messages they send out, when they send them and how; through the use of blogging, social media and other forms of new media. This has fundamentally changed the way we (consumers) perceive organisations, and also how they market themselves to us.

On the Empowering Business site, Stacy Martinet also explains what she believes is the biggest mistake made by marketing professionals. She believes that thinking about marketing campaigns in an old fashioned way – running a project for a set period to achieve specific results – is a mistake. She suggests that businesses today should focus on constantly and consistently building and improving their brand(s) on a 24 cycle, rather than focusing on producing a specific return every 3 or 6 months.


Liz Crawford, CTO of beauty subscription service Birchbox believes that having a good understanding of your market and then being able to use technology to your advantage, to make your organisation more efficient, more effective and more innovative, is the key to being a successful Technology Officer.

Economist Advice Centre screenshot

The Economist in Partnership with Microsoft Cloud – Empowering Business


Senior Lecturer at MIT School of Management, Claus Otto Scharmer, suggests that self-leadership is a skill that every leader needs. He states that before you can lead others, you need to be aware of how to lead yourself. If you can assess yourself to enable to you understand what you do and how you could improve, then you can transfer this knowledge into how you can make other people better too.

Human Resources

HR Consultant Jessica Miller-Merrell, from Xceptional HR, explains how company culture is a bottom-up phenomenon. She suggests that many high level mangers believe that they can dictate company culture from the top-down. Jessica states that because the employees are the culture, managers must get employee buy-in for an organisation to change how it operates.

Information technology security and business

This article is written in partnership with Dell. To find out more about promotional content please visit our Privacy Policy.

Technology has had an undeniably colossal affect on how we do business. We can now communicate with people around the world in real time, pay for goods with the swipe of a card or click of a mouse and download files from the cloud with the push of a button.

Like with most things in life though, technology does have its downsides. Historically, technological problems have centred around speed and reliability. Thanks to advances in programming, processing power and cabling, technology is now faster and more reliable than it has ever been. This is also in part thanks to more people becoming ‘tech savvy’. People expect more of technology, and more people are working to improve it. As such, the age old issues of speed and reliability which have plagued almost all forms of technology, are no longer under the spotlight. I would argue that security is now a bigger issue.

A padlock on an ethernet cableThe growth of the global tech savvy population means that more people understand how technology works, which is great in some respects, but from a security perspective, it can be concerning. If your employees know how to access confidential files you store on your server, or your customers are able to apply 99% discounts to products in your online shop then you have a problem.

In 2014 eBay was one of the most high profile victims. Vulnerabilities in Javascript and Flash code on some listing pages enabled hackers to steal users information, post fake listings and redirect visitors to fake payment pages. In 2013 Sony was fined a quarter of a million pounds by the ICO in the UK for compromising customer details in a 2011 data breach.

In it’s recently released business security e-book, Dell state that they believe many of the security problems we face today are because businesses use fragmented systems and they use a different security solution to protect each one. Whilst your payment system might be completely watertight, if it’s linked to your website, which happens to contain some vulnerable Java technology, then hackers may be able to crawl into your systems. To quote Dell’s Director of Product Marketing, Bill Evans “Patchwork solutions that combine products from multiple vendors inevitably lead to the blame game“. He goes on to say that when using fragmented systems, each vendor “is responsible for only part of the problem” making it very difficult to properly secure your systems.

There are many different solutions for companies out there. As a business you could ground yourself firmly in the first half of the 20th century and refuse to adopt technology of any kind. After all, if all the details on your client, Mrs Jones, are kept in a file in filing cabinet 35B on the sixth floor of the of your customer information storage centre, a hacker cannot squirrel their way into your network and then publish Mrs Jones’ details on the Internet. That does however mean that when Mrs Jones pops in to see you, you have to keep her waiting for 20 minutes whilst you go to find her file – as opposed to typing her name in and pulling up her details on your tablet.

There are often benefits of using software and technologies from different vendors, and it would be foolish to dismiss a good business system just because it has a few minor potential security floors. The challenge then is to find a security system than can protect your new technologies.

A security key on a keyboardUsing a single, comprehensive security system, such as Dell Endpoint Security to protect all your information technologies would help top alleviate many of the problems that arise when using a patchwork network of security systems. Using one system would instantly eliminate conflicts between security software. It can also be much easier to manage one unified system than trying to juggle several separate schemes.

Naturally each individual security system may have some specific advantages that one universal security system may not, but the fact that a universal system is just that, universal to all your businesses technology, is a huge advantage.

Dell believes that all good universal security systems should: protect the entire business both internally and externally; comply with all internal policies and indeed national laws; and enable employees to adopt technologies with confidence and ease, promoting efficiency and innovation.

What are your views on business technology security? Let us know in the comments below.

What’s in Your Computer (and phone, and WiFi)?



This week the news is full of Lenovo, a computer manufacturer that has been selling machines that they have already fitted with what some call Malware or just Adware. Magic in the machine indeed!

The mal/adware in question is made by a company called “Superfish.” The software is essentially an Internet browser add-on that injects ads onto websites you visit. Details here.

Besides taking up space in your computer, the add-on is also dangerous because it undermines basic computer security protocols.

That’s because it tampers with a widely-used system of official website certificates. That makes it hard for your computer to recognize a fake bank website. This means that you are more likely to give all of your personal data away, let nasty things into your computer, and allow people to monitor your use.

No good I hear you say, and all so that they can feed you adverts while you are browsing.

Hidden Extras?

But this news does bring up another question, what else is in the computer? What else is it programmed to do? The simple answer is that I and probably most of you do not know. We have bought a machine that does the things we want it to do, but who knows what else?

Now as I eat my breakfast, I like to read the ingredients on the side of the packet. It is good for language skills as it is usually in several languages. But can I do this with my computer? You don’t get much in the way of documentation with a $400 laptop. Certainly not considering what is inside it.

So the computer company in question have disabled something at their end and the problem is resolved. But if they tell you that they fixed the problem are you going to believe them? After they did something that put your computer and everything saved on it at risk? Or should you put a new operating system on the new machine, wipe the hard drive and start again?

Why do we trust these manufacturers when they consistently do things that are not in our interest? WiFi providers that con your computer into trusting fake certificates so that they can block certain sites (and read your mail or follow your searches)? Samsung that record your voice through your smart TV and send it non encrypted over the Internet to unnamed third parties, social media sites and search engines that collect your data, mobile phone companies that map your every movement, the list goes on.

So if you cannot trust wifi, or computer manufacturers, or Google, or Facebook, or Samsung to treat our data securely and correctly, who can you trust? And more to the point why are we giving them our lives to play with?