TERZO BITES

  • Show All
  • News
  • What We Think
  • What We've Read
gadgets

Start-up BrainChip announces a new chip design for a milliwatt-level AI inference

Start-up BrainChip announces a new chip design for a milliwatt-level AI inference
Terzo timeline

A Journey of Innovation and Excellence in OT Consultancy

Reflecting on 10 Years of Terzo As we mark the 10th anniversary of Terzo, it is both a privilege and a moment of pride to look back on the remarkable journey we’ve embarked upon since our inception on July 31st, 2014. With our roots already firmly established in the water industry, our decade-long journey, from…
WITS Plugfest

The WITS Plugfest Summer 2024

Introducing Azent at the WITS Plugfest During mid-June 2024, we attended a WITS Plugfest. The plugfests are hosted by different members of the WITS-PSAC and this time Schneider Electric kindly held the plugfest at their offices in Coventry. The plugfest was attended by a number of vendors and users from within the WITS community. The…
What should you know?

What managers should know about Lucid

This article explains some of the basics of Lucid and why an organisation might wish to use the protocol. The aim of the article is to support a senior manager within a user organisation so that they can appreciate what Lucid is, where and how it could be deployed within their OT estate, and what…
y2038

The Y2038 Problem. Sooner than you think.

The Y2038 Problem. Sooner than you think.
sea mine

Automation Can Help Make Deep-sea Mining Safer and Less Environmentally Disruptive

Automation Can Help Make Deep-sea Mining Safer and Less Environmentally Disruptive
raspi padlock

Microsoft BitLocker encryption cracked in just 43 seconds with a $4 Raspberry Pi Pico

Microsoft BitLocker encryption cracked in just 43 seconds with a $4 Raspberry Pi Pico
lucid

Lucid Reading

Lucid is an OT (Operational Technology) protocol for IoT/IIoT (Industrial Internet of Things) devices and software applications which provides utility-focused application functionality and behaviour. This page provides links to a series of useful web pages on Lucid. We are in the middle of writing other articles at the moment, these will be added as they…
The base architectural diagram that is used throughout this article

Seven surprising ways to use Lucid

Lucid is a protocol based on MQTT which permits devices to send information about their state and configuration, and to receive instructions. The protocol bridges a gap between Operational Technology (OT) and IoT technology. For more information about Lucid please see our high level description of the protocol or our list of introductory articles. This…

Terrifyingly simple Lucid implementation

Many of the articles written about Lucid, try and explain the protocol and its uses from the users’ point of view. This is one of the first articles to take a developer-centred perspective. In this article we will look at subjects surrounding the development of a new product, or an extension of an existing product,…

Lucid vs WITS-DNP3 shootout

Both the Lucid and WITS-DNP3 protocols are managed by the WITS-PSA. Why have two protocols? What are the differences? Why choose one over the other? This article tries to answer those questions. More background on Lucid and the WITS-PSA is provided in this previous article in our series on Lucid. Some background WITS-DNP3 was born…

Lucid is much lighter than WITS-DNP3 – it was always meant to be

The Lucid protocol was developed by the WITS PSA (Protocol Standards Association) as a complementary protocol to WITS-DNP3. But why did the WITS-PSA go to the trouble of developing another protocol when they were already in control of an established one? This article tries to answer that question and in doing so will give you…
Thanks to La_Caverne_Du_VFX on Pixabay for the image

One IoT protocol to rule them all…?

Intro In this article, we examine the differences between 3 IoT protocols: Lucid, Sparkplug and OPC-UA and ask: “why would you select one instead of another”? Might one of these protocols be enough to do everything and, like Tolkien’s ring “rule them all”? To support the comparison, we have measured each protocol against a single…
padlock

7 countries unite to push for secure-by-design development

7 countries unite to push for secure-by-design development
substation

Practical Advice for the NIS2 Directive

Practical Advice for the NIS2 Directive
nyc

Why remote work is the opportunity of the century for cities

Why remote work is the opportunity of the century for cities
lucid

Lucid – The bare basics

What is Lucid? Lucid is an OT (Operational Technology) protocol for IoT/IIoT (Industrial Internet of Things) devices and software applications which provides utility-focused application functionality and behaviour. Within Lucid the IoT/IIoT devices are known as “Field Devices” and top end software such as SCADA, historians or analytics are known as “Supervisory Applications”. Lucid is built…
risk dial

Cybersecurity Risk Management: An Alternative Approach

Cybersecurity Risk Management: An Alternative Approach
cyber updates

The minimum IoT security requirements for consumer products

…have just notched up a peg from “should” to “shall”.
jenga

The Use of Software Bills of Materials for IoT and OT Devices

The Use of Software Bills of Materials for IoT and OT Devices
rack cabinet

Critical infrastructure gear is full of flaws

Critical infrastructure gear is full of flaws
mobile mast

The sun is setting on 2G and 3G networks

The sun is setting on 2G and 3G networks
agile

Agile and the Long Crisis of Software

Agile and the Long Crisis of Software
doctor laptop

How technology will shape the post-pandemic NHS

How technology will shape the post-pandemic NHS
dotnet20

6 .NET Myths Dispelled — Celebrating 21 Years of .NET

6 .NET Myths Dispelled — Celebrating 21 Years of .NET
pyramid

The Code Review Pyramid

The Code Review Pyramid – what matters during code reviews
4 day work week

After the shift to remote work, new hope for a four-day workweek

After the shift to remote work, new hope for a four-day workweek
binary 1254502 640

Why MQTT is not enough

As part of the development team working on the Lucid protocol (previously known as WITS-IoT), Mark Davison often answers questions relating to how Lucid relates to its underlying protocol of MQTT. Also, we hear people saying that they use or intend to use MQTT as their protocol, but not explaining what they intend to use…
margaret hamilton

Margaret Hamilton Recalls Her Life as a Programming Pioneer

Margaret Hamilton Recalls Her Life as a Programming Pioneer
iss

New images of the International Space Station reveal that it is still a jewel

New images of the International Space Station reveal that it is still a jewel
smart speaker smart phone

Connecting your smart devices with confidence

Connecting your smart devices with confidence
lightning cable

This Seemingly Normal Lightning Cable Will Leak Everything You Type

This Seemingly Normal Lightning Cable Will Leak Everything You Type
SolarWinds and the Holiday Bear Campaign

SolarWinds and the Holiday Bear Campaign

SolarWinds and the Holiday Bear Campaign
How to cut down on Ransomware attacks without banning Bitcoin

How to cut down on Ransomware attacks without banning Bitcoin

How to cut down on Ransomware attacks without banning Bitcoin
The inevitable weaponization of App data is here

The inevitable weaponization of App data is here

The inevitable weaponization of App data is here
Internet revamp for the humble landline

Internet revamp for the humble landline

Internet revamp for the humble landline
Bipedal Robot Becomes First Robot To Run 5K Race

Bipedal Robot Becomes First Robot To Run 5K Race

Bipedal Robot Becomes First Robot To Run 5K Race
Tech firms use remote monitoring to help honey bees

Tech firms use remote monitoring to help honey bees

Tech firms use remote monitoring to help honey bees
Vast Differences Between IT and OT Cyber Security

Vast Differences Between IT and OT Cyber Security

Vast Differences Between IT and OT Cyber Security
The Process is not the Product

The Process is not the Product

The Process is not the Product
The Colonial Pipeline Hack Is a New Extreme for Ransomware

The Colonial Pipeline Hack Is a New Extreme for Ransomware

The Colonial Pipeline Hack Is a New Extreme for Ransomware

A Software Bill of Materials Could Be Required for Applications Soon

A Software Bill of Materials Could Be Required for Applications Soon

Has UML died without anyone noticing?

Has UML died without anyone noticing?

City of Oldsmar, FL Cybersecurity Incident

  City of Oldsmar, FL Cybersecurity Incident  

How an obscure British PC maker invented ARM and changed the world

  How an obscure British PC maker invented ARM and changed the world  

Can one person run an open source project alone?

Can one person run an open source project alone?  

Zoom settles with FTC after making ‘deceptive’ security claims

  Zoom settles with FTC after making ‘deceptive’ security claims  

Embrace the Rule of Awkward Silence

Embrace the Rule of Awkward Silence

Why CAPTCHAs have gotten so difficult

Why CAPTCHAs have gotten so difficult  

Notes on RSI for Developers Who Don’t Have It (Yet)

Notes on RSI for Developers Who Don’t Have It (Yet)

The Big Tesla Hack

The Big Tesla Hack: A hacker gained control over the entire fleet, but fortunately he’s a good guy  

UK Government advances plans to boost security of smart products

UK Government advances plans to boost security of smart products  

“Encryption With A Back Door” And Other Oxymorons

“Encryption With A Back Door” And Other Oxymorons

AI could be the perfect tool for exploring the Universe

AI could be the perfect tool for exploring the Universe

What is IoT? The internet of things explained

What is IoT? The internet of things explained

An AI reading list — from practical primers to sci-fi short stories

An AI reading list — from practical primers to sci-fi short stories  

UK will (at last) use Apple/Google contact tracing tech

  UK will (at last) use Apple/Google contact tracing tech  

Bluetooth LE beacons pinpoint a single car amongst thousands

Bluetooth LE beacons pinpoint a single car amongst thousands  

Attempted cyberattack highlights vulnerability of global water infrastructure

Attempted cyberattack highlights vulnerability of global water infrastructure  

What Went Wrong With IBM’s Watson

What Went Wrong With IBM’s Watson  

Data Science Concepts Explained to a Five-year-old

Data Science Concepts Explained to a Five-year-old

Google tracked his bike ride past a burglarized home. That made him a suspect.

Google tracked his bike ride past a burglarized home. That made him a suspect.

The 25 best programming books of all-time

The 25 best programming books of all-time  

The IET “5G – Unleashed” Conference

The last year has been a fast moving one in the world of 5G. Therefore it was good to get a chance to catch up with the state of play by attending the annual 5G one day conference arranged by the IET RF and Microwave TTN (Technology Technical Network).

How to deliver a technical presentation to a non-technical audience

How to deliver a technical presentation to a non-technical audience  

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

Researchers hack Siri, Alexa, and Google Home by shining lasers at them  

WITS Plugfest Belfast – November 2019

 

In November, Terzo Digital attended the WITS Plugfest at the National Football Stadium in Belfast. We were demonstrating an updated version of our WITS-IoT software stack.

The IoT-SF Conference 2019

Terzo Digital have been members of the IoT-SF (Internet of Things Security Foundation) for several years now. The foundation has a strapline of “Build Secure, Buy Secure, Be Secure” and is trying to promote security best practice within the IoT community. You can read more about their mission statement here.

The Internet Relies on People Working for Free

The Internet Relies on People Working for Free

Kaspersky finds Uzbekistan hacking op… because group used Kaspersky AV

Kaspersky finds Uzbekistan hacking op… because group used Kaspersky AV  

Which comms technologies are used for IoT?

Which technologies are used for IoT? An overview of Low Power Wide Area Networks (LPWAN)  

The Best Free Apps and Software You’re Not Already Using

The Best Free Apps and Software You’re Not Already Using  

Should software developers have a code of ethics?

  Should software developers have a code of ethics?  

Burning down the house with IoT

  Burning down the house with IoT

Vodafone UK ‘rips up industry rulebook’ as it switches on 5G in seven UK cities

  Vodafone UK ‘rips up industry rulebook’ as it switches on 5G in seven UK cities

Mysterious safety-tampering malware infects a second critical infrastructure site

Mysterious safety-tampering malware infects a second critical infrastructure site  

‘superhuman’ poker AI beats human pros

‘superhuman’ poker AI beats human pros  

Wave energy to power undersea data centers

Wave energy to power undersea data centers  

UK code breakers drop WW2 simulators onto the web

UK code breakers drop Bombe, Enigma and Typex simulators onto the web for all to try  

Redhill technology meet-up provides fun and education

Neil Tubman, a Terzo director, helped design and facilitate a new technology Meetup, ‘Red Sprite’. Meeting on a monthly basis at a Co-working space in Redhill, it aims to bring together local IT students, hobbyists and professionals. Read the full article here, authored by Red Sprite co-founder Simon Pither.

Why are IoT platforms so darn confusing?

Why are IoT platforms so darn confusing?  

An IT Guy Gets Fired and Promptly Torches 23 Amazon Web Servers

  An IT Guy Gets Fired and Promptly Torches 23 Amazon Web Servers

10 things the perfect IoT battery should do

10 things the perfect IoT battery should do  

Expert Says Don’t Teach Kids to Code

Expert Says Don’t Teach Kids to Code  

The U.S. National Academies Reports on the Prospects for Quantum Computing

The U.S. National Academies Reports on the Prospects for Quantum Computing  

35 years ago, Isaac Asimov was asked by the Star to predict the world of 2019. Here is what he wrote

35 years ago, Isaac Asimov was asked by the Star to predict the world of 2019. Here is what he wrote  

A few takeaways from “5G – The Advent” at the IET

It seems like 5G has been promised for a long time. I found out recently what the current reality looks like.

Driverless Cars Should Spare Young People Over Old in Unavoidable Accidents, Massive Survey Finds

Driverless Cars Should Spare Young People Over Old in Unavoidable Accidents, Massive Survey Finds  

Intel, Arm to Collaborate on IoT

Intel, Arm to collaborate on IoT

Quantum-embedded chips could secure IoT

  Quantum-embedded chips could secure IoT  

The end of an era for Google hardware

The end of an era for Google hardware

Major browsers simultaneously drop support for old security standards

Major browsers simultaneously drop support for old security standards  

The Five Eyes Statement on Encryption: Things Are Seldom What They Seem

The Five Eyes Statement on Encryption: Things Are Seldom What They Seem

How China used a secret chip to infiltrate America’s top companies

How China used a secret chip to infiltrate America’s top companies

Why printers add secret tracking dots

Why printers add secret tracking dots

Major Quantum Computing Advance Made Obsolete by Teenager

Major Quantum Computing Advance Made Obsolete by Teenager  

Ransomware attack that targets water supply

Researcher develops ransomware attack that targets water supply

Android Things Released

Google could be getting serious about IoT with release of Android Things  

Fax machine vulnerabilities

  Vulnerabilities in Fax Protocol Let Hackers Infiltrate Networks via Fax Machines  

Lyrebird claims it can recreate any voice using just one minute of sample audio

Lyrebird claims it can recreate any voice using just one minute of sample audio  

11 signs you’re writing great code

11 signs you’re writing great code  

Is there a correct way to comment your code?

Is there a correct way to comment your code?  

Not even remotely possible

Remote teams can be more productive than in-person ones  

Vulnerable industrial controls directly connected to Internet? Why not?

  Vulnerable industrial controls directly connected to Internet? Why not?  

Lock out: The Austrian hotel that was hacked four times

  Lock out: The Austrian hotel that was hacked four times  

Developer Survey Results 2018

Stack Overflow surveryed over 100,000 developers – and told them how they learn, build their careers, which tools they’re using, and what they want in a job.  

Interview: Digital Danger for the UK Water Industry

Cyber attacks are becoming an increasing threat but, while the UK water industry could be vulnerable, Anglian Water security chief Steve Trippier says there is no cause to panic  

Database Design Basics – Part 3 – What is SQL?

 

Introduction

This article is part of our series describing the basic concepts for databases.

Checking downloaded files with cryptographic hashes

Introduction

A cryptographic hash is a short, fixed length sequence of numbers which is easily calculated from a much larger input sequence such as a file downloaded from the internet. By recalculating the cryptographic hash of such a file and comparing it with an advertised cryptographic hash, one can check that the file has not changed. This allows the integrity of a file to be checked and any malicious or accidental changes to be spotted.

Will blockchain technology disrupt the ICS world?

Will blockchain technology disrupt the ICS world?  

Don’t dare hackers to hack you!

Don’t dare hackers to hack you!  

I’m Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important

I’m Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important  

Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack

  Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack  

Electromagnetic Pulse Hack

A Diabolical Way of Hacking a Chip With a Wave of Your Hand

Robot cracks open safe live on Def Con’s stage

Robot cracks open safe live on Def Con’s stage

Database Design Basics – Part 2 – Tables and Relationships

Introduction

Here’s my second article on database design basics. I’m hoping to tackle other database design topics in future articles – let me know if there’s anything you’d like me to cover.

In part 1, I covered “CRUD’ – Creating, Reading, Updating and Deleting records.

I’m going to cover the basic building block for data storage in a database – the table. A database usually has more than one table. Tables can have relationships with other tables – and this is what makes a ‘relational database’.

Database Design Basics – Part 1 – CRUD

 

Introduction

Here’s my first article on database design basics. I’m hoping to tackle other database design topics in future articles – let me know if there’s anything you’d like me to cover.

Engineering breakthrough may lead to batteries that never die

Engineering breakthrough may lead to batteries that never die  

Electricity generated with water, salt and a three-atoms-thick membrane

Electricity generated with water, salt and a three-atoms-thick membrane

Microsoft: Government Should Regulate IoT Security

Microsoft: Government Should Regulate IoT Security  

IoT Security Anti-Patterns

IoT Security Anti-Patterns  

Former GCHQ boss backs end-to-end encryption

Former GCHQ boss backs end-to-end encryption  

The WITS Plugfest of May 2017

There came a point in the development of the WITS-DNP3 protocol, many years ago, when we had to migrate from writing documents about the protocol and thinking about how it would work, to building and testing real devices. To do this we used plugfests. For WITS and many other organisations, a plugfest is a chance to bring various bits of equipment together and test that the interfaces between them all work as expected. In the early days of WITS, the plugfests were pivotal to converting the paper standard to a real and working protocol on multiple vendor’s devices.

Apple v Android – my experience

Introduction

I had an iPhone for ages, then I flipped over to using Android. Why? Smartphones of both hues seem to do all the things we need, so why not just pick one, learn all its quirks and foibles, and stick with it?

Perks and pitfalls of pair programming

Perks and pitfalls of pair programming  

Think Domino’s is a pizza company?

How Domino’s Pizza re-invented itself  

Why you need software maintenance

Introduction

Simplistically, software maintenance is a service you buy once you have purchased a software licence to ensure the ongoing quality of that piece of software.

You’ll hear it called “support”, “maintenance”, “warranty”, “subscription” and these are all similar but subtly different concepts:

Where are the IoT Mobile Opportunities?

Where are the IoT Mobile Opportunities?  

Speed Up Your Mobile Development Using an MBaaS Platform

Speed Up Your Mobile Development Using an MBaaS Platform  

What is multi-factor authentication?


No doubt you will have heard of ‘2-factor authentication’. It’s often something your UK bank would say they’re introducing in order to beef up the security of online banking. What does 2-factor authentication mean? This article provides a brief introduction, but first of all we must start at the beginning with….

The uncrackable problem of end-to-end encryption

The uncrackable problem of end-to-end encryption  

Think older workers struggle with technology? Think again

Think older workers struggle with technology? Think again  

Internet of Things Guildford January Meetup

With many years’ experience in the telemetry industry and a background in electronic and embedded systems, it was only natural that I would have an interest in the Internet of Things (IoT); “who wouldn’t” you might say, given its position on the Gartner hype curve! That interest resulted in me joining and attending various meetups, chatting with companies in the sector and attending related lectures when I could. One of the meetups I have thoroughly enjoyed attending is the Internet of Things Guildford Meetup.

Project Management Tips

Introduction

Over the years I’ve been involved in countless IT projects. Lots of them have been software development projects, but I’ve also done other types of IT-related work. I’ve been a team member (working for a project manager); I’ve been the project manager; and I’ve also managed a programme of multiple projects. Not all of them have gone smoothly by any stretch of the imagination, but here’s eight tips from my accumulated experience…

They Write the Right Stuff

They Write the Right Stuff  

Why learn C?

Why learn C?  

23 mobile UX mistakes that Google doesn’t like

23 mobile UX mistakes that Google doesn’t like  

Learning Morse code without trying

Learning Morse code without trying  

Low Power Wide Area Networks: The new backbone for the Internet of Things

Low Power Wide Area Networks: The new backbone for the Internet of Things  

How Google fought back against a crippling IoT-powered botnet and won

  How Google fought back against a crippling IoT-powered botnet and won  

Cloud-based software we use – part 2

A little while ago we published an article which was a gallop through the web-based apps we found we essential to operate our start-up business as efficiently as possible.

A year on, we thought it was time to provide a quick update.

186m needless emails

NHS-wide test message (and replies) crash system

The poker-playing AI is getting smarter

The poker-playing AI is getting smarter and the humans are getting tired  

Where Computers Defeat Humans, and Where They Can’t

Where Computers Defeat Humans, and Where They Can’t  

Programming language for novel biological circuits

Programming language for novel biological circuits

The beginning of the end for encryption schemes?

New quantum computer, based on five atoms, factors numbers in a scalable way

Pocket-sized drone for US Marines

  The U.S. Marines are testing a pocket-sized helicopter drone

WITS Expo October 2016

We presented at the Water Industry Telemetry Standards (WITS) Expo conference on 18th October 2016.

What is ‘OT’?

Everyone’s heard of IT – Information Technology. It’s very likely that someone at your work, or a whole team, are responsible for providing IT for your organisation. But have you ever heard of IT’s sibling, ‘OT’ - short for Operational Technology? If not, then read on…

The major turning point that killed BlackBerry once and for all

The major turning point that killed BlackBerry once and for all  

This battery-free computer sucks power out of thin air

This battery-free computer sucks power out of thin air

Project warning signs

Some early warning signs for your project going off the rails, from someone who’s been there.  

A project in a week

Generally, projects, and in particular software projects, require some time to plan, design, build, test and deliver; but not all the time. Sometimes a project requires a quick turnaround and can have demanding deadlines! How do these projects differ and what factors might be important in determining the overall success of a quick project? In this article, we’ll look at a few of those factors and how they can set you up for a good experience.

Cyber-attacks on utilities

 

Overview

I’ve been working in OT as a supplier to utility companies now for nearly twenty years. OT stands for “Operational Technology” – distinct, but a sister to, the more familiar IT – Information Technology. OT shares much of the characteristics of IT – it’s about hardware and software – but focuses on managing assets in the field, rather than, say, helping users in offices.

SMS and two factor authentication

Is it time to reconsider SMS for two factor authentication?

Using your mobile phone to confirm your identity may be flawed.

New tech turns your skin into a touchscreen for your smartwatch

Today a team at the Future Interfaces Group, a research lab within Carnegie Mellon University, released a look at a novel solution to this problem: making the skin on your arm and hand act like a touchscreen for your smartwatch.  

Ukraine power grid hack: What happened and what needs to change?

  The Ukrainian power grid hack that reportedly left 700,000 homes in the dark just before Christmas highlights how the critical infrastructure sectors must step up to the plate and work harder to keep the bad guys out.  

Devoxx UK 2016

Devoxx is one of my favourite conferences! Having volunteered to help last year, I put my name forward to help again this year and was lucky enough to be selected. Volunteering allows you to attend parts of the conference in exchange for working in various capacities in other parts; for instance: room monitor, handing out swag, or manning the reception desk. It is also a chance to be part of the friendly team who put the conference together which is just as rewarding as seeing all those great talks.

Tips for Reading a WITS Device Profile

Introduction

The WITS-DNP3 Protocol is an open communications protocol designed to allow Field Devices to talk to Master Stations within the water industry. For the first time the protocol gives the water industry a common language for communication between devices in the field and their telemetry masters. In turn this provides the users with a genuine choice of Field Device instead of being tied into using the Field Devices made by the vendor of the Master Station they have deployed.

Why you won’t be voting in the referendum by mobile phone

The country goes to the polls for the EU in/out Referendum on 23rd June 2016. I was recently discussing voting habits with some other small business owners, when one queried why we couldn’t vote using our mobile phones, and if/when that option would be available? Whatever the type of vote – national, local or referendum, I don’t believe it will be anything but paper-based for quite some considerable time, and here’s why.

Why science grads make good developers

Introduction

I’m often meeting other software developers. If things get a little more formal and we need to convey a potted history of our careers, a 2 minute run-through usually starts with “I graduated with a degree in Physics in 1998” or similar. It’s shorthand for “this is my education and background for the time before I started my working life”.

Many other developers seem to have a background in the sciences. Apart from scientists and developers being “technical”, I wondered why one would often lead on to the other. So I started researching studies and information on the web, and found surprisingly little. So in the absence of hard facts from other sources, this article is generally based on my experience and speculation….

Installing gdb on a Mac

 

This month I am only presenting a small article on what we’ve done, but hopefully a few will find it useful. If you have not already stopped reading because of the article title, I’ll start by giving a bit of an introduction so that you can decide whether this is something you will find interesting.  gdb is the Gnu Debugger a tool which “allows you to see what is going on ‘inside’ another program while it executes – or what another program was doing at the moment it crashed.” according to its website.

Young Enterprise

Young Enterprise  - What is it?

The Young Enterprise (YE) scheme is a charity which enables young people, coming towards the end of their school careers, to develop their skills and attitude through setting up and managing their own business.

A group of pupils decides to be part of the YE programme, and forms a business. The pupils have to decide on the purpose of the business. It could be a commercial one, to build and sell products, or it could be a charity. Selecting the purpose of the business is one of the early challenges the team faces. Within a few specific exclusions and guidelines, pupils can setup a business to do something out of a wide variety of potential options.

SWAN Conference

As part of our work for Anglian Water Services (AWS), Mark recently attended the SWAN Conference in London. SWAN (the Smart Water Networks Forum) is a worldwide industry forum promoting the use of data technologies in water networks, making them smarter, more efficient and more sustainable. The conference was well attended with around 200 delegates from organisations including companies in the water and smart water space, water companies from the UK and abroad, consultants, and researchers from academia working in the water sector. You can see highlights of the conference, who spoke, and their slides on the SWAN website.

Survey your customers

I’ve been involved this month in surveying a group of people to gather their opinion on a regular networking event, on behalf of the organiser of that event.

Lessons From a Decade of IT Failures

  Lessons From a Decade of IT Failures. Why big projects fail.

17-gram microrobots pull a full-sized car

  Teamwork and timing are key to this amazing feat.  

The Test Automation Pyramid

 

In the years that I have been involved in software, it seems that the methods I followed in developing and testing software often revisit me with a different name and a heightened sense of hype. Luckily, the second coming of these ideas often cement sensible lessons I should have learned from my first experience and result in new methods which invariably seem to improve on my original experience. I have found this to be the case, given some poetic licence, with testing and the test automation pyramid. In this article, I look at what the test automation pyramid is and compare it with the older techniques I used to use.

Minimum Viable Product

 

This article introduces the concept of MVP – Minimum Viable Product. It’s a simple concept and is well accepted in large parts of the software development community. Ten years ago it was a different story….

What is the Internet of Things?

You may have heard the term “Internet of Things”, often abbreviated to “IoT”. If so, it may conjure up a particular image in your mind, or you may have an impression of what it means. The concept is actually quite flexible, and can mean lots of different things to lots of people. In this article, I provide a brief, fairly non-technical overview of the subject.

Cloud or Local?

Cloud or Local Hosting

Within small companies today, there are a great many functions of the business which can be conveniently provided using IT; these might include accounting, CRM, file storage, ticketing systems, office applications, source code control, backup or automated build systems. Having decided that you are going to utilize IT to provide one of these functions a question one often has to answer is: should that service be provided from the cloud or implemented in the local IT system? This article discusses that question and details the factors one should consider in coming to a decision.

Smart Meter Rollout

On 17th February, we attended a presentation on the smart meter rollout in the UK. In particular, the talk focused on the technology used for the communications between the end-point meters and the central computer systems.

Guildford IoT Meetup

In February, Mark attended the 16th IoT Guildford meetup. The meeting was held at Collaborate.works in Woking, a collaborative workspace available to small businesses, freelancers, start-ups and entrepreneurs. Amongst the speakers were Stuart Black of BrainTrain UK and Geoff McCormick of Alloy.

Standing can also be bad for you, says scientist studying desk set-up

As software developers we spend an inordinate amount of time sitting in front of a computer screen, so it is always with great interest that we read articles on how that affects us.  

Surprising tips from a super-hacker

Here’s the advice of the world’s most famous hacker, Kevin Mitnick, on how to secure a smartphone and laptop.  

What Price Privacy? Apple v the FBI

It will have been difficult to miss the news that the FBI and Apple are in debate about getting information off iPhones. Don’t worry if you have though, because in this piece I will try and link some of the best stories I have seen with some of my thoughts and give you a fighting chance of understanding what is happening in the debate.

Reducing the pain of passwords

Passwords. They’re a real pain, and they’re everywhere. You probably have more than a hundred accounts that require a password, from ones you use every day (such as logging on to your computer) all the way through to ones on websites where you signed up to get access to a one-time service, have never used it since, and have probably forgotten that you even signed up with that company.

Distributech conference

Neil visited the Distributech conference in Orlando in early February. Distributech brings together tech providers in the OT (Operational Technology) space.

Websites and apps are designed for compulsion, even addiction.

Should the net be regulated like drugs or casinos?  

Why Developers Avoid Daylight

Mark has often found late at night working productive but never really wondered why. Here are a few thought-provoking and contrary ideas to explain it.  

Xamarin 4 Launch

When we first set up to write apps for mobile phones, we initially selected to use the Android platform because of its free availability and the popularity of Android phones. However, it soon became apparent, that for any commercial application there was a strong requirement to support both Android and iOS.

Don’t mess with the live system

How many times have you seen someone just about to, or actually, make what they thought was going to be a “quick change” on a live IT system without enough evidence that it was going to work? Or worse still, a big change?

Should you use a ticketing system?

Whatever project you're working on, in whichever sector of business, you are likely to start collecting a series of issues with that project which need to be addressed. Those issues could be of pressing concern right now or they may not require any attention until a much later stage of the work. When there are only a few issues we can all manage them through our normal daily workloads, but as the number of issue grows, the task of managing the issues starts to become non-trivial. This article delves into why it is important to deal with the ever growing load of issues and how we should go about dealing with them.

IP strategy forum

Terzo attended the Surrey Chamber of Commerce (SCOC) Intellectual Property (IP) Forum, held at Guildford University on 3rd December 2015.

API Management with apiman

As part of our continued interest in Java EE, JBoss and Wildfly we are members of the JBUG (JBoss User Group) in London. In early December 2015 Terzo attended a JBUG meeting at CodeNode, the new venue for Skillsmatter in London. The main part of this meeting was a presentation by Marc Savy of RedHat on apiman, a free and open source API Management tool. Marc is a core developer on the apiman project.

IoT industry is in “for a big wakeup call” if security isn’t addressed

The Internet of Things may be a big buzz term at the minute, but its potential is huge. Various analysts predict billions of IoT devices to be measuring the world around us within the next few years. However, the industry is doomed from the start if it doesn’t start taking basic security seriously.

Don’t Gamble with User Experience

Short for UX-driven design, UXDD is an approach that primarily promotes the use of wireframes and storyboards as the starting point of software archi­tecture.

What’s next : A potted history of mobile communications in the water industry

Being long enough in the tooth, I remember when there was no internet. I have watched with keen interest the development of communications technologies through dial-up to 4G and more latterly new wireless technologies aimed at IoT like SIGFOX and LoRa. During that time, I have worked on a number of communication projects, but most recently I have been heavily involved with telemetry in the UK Water Industry.

Utilities companies within the UK water industry would normally have many thousands of devices deployed to monitor their estate. Those devices would likely have been deployed over many years; with some devices in the field being new and others much older. It is a non-trivial process replacing and maintaining all that equipment and the industry therefore moves at a slower pace than other cutting-edge young industries. The utilities companies were however very interested when early machine-to-machine (M2M) communications became possible with mobile 2G networks. With the advent of improved battery technologies and mobile communications it became possible to deploy telemetry in locations which had neither landline communications nor power.

The death of PCs?

Are we witnessing the death of PCs?    

The Project Triangle – Explained

Intro

In this article I’ll go through the basics of “project triangle principle”. [Sometimes referred to as the "Iron Triangle" or the "Triple Constraint"]

The Project Triangle theory is interesting because:

  1. It applies to most, or arguably all, projects; covering a very wide range of sizes and subjects
  2. It gives a vital frame of reference for managing a project, and helps you, as the project manager, to understand that there is an interplay of constraints at work and that varying one key aspect of a project is likely to have knock-on effects on other aspects

Most project managers will be familiar with this concept, but many of you who haven’t “formally” managed a project will no doubt have managed “projects” in your personal lives and will recognise the concept. You are likely to be, or have been, a project manager – whether you have been given that formal title or not!

Consultancy work for AWS

Anglian Water have awarded a support and consultancy contract to Terzo Digital to provide specialist support for WITS system development. Mark Davison and Neil Tubman of Terzo Digital both have a number of years of experience of DNP3 and WITS in the water telemetry industry, with Mark having served on the WITS PSA committee for the last four years and having been recently voted back onto the WITS PSA committee representing Terzo Digital.

Steps to consider in implementing a WITS Field Device

 

WITS is the Water Industry Telemetry Standards group. The group was set up to look after telemetry standards in the Water Industry and in particular the WITS-DNP3 Protocol.Traditionally water companies could only use proprietary devices which utilised the same communications protocol as their telemetry systems, limiting the water companies choice in devices. The WITS-DNP3 Protocol allowed water companies to utilise telemetry devices from various vendors on their telemetry system and hence control costs and select more effective equipment. The WITS group is made up of water companies (a combination of WaSCs and WOs) and telemetry equipment vendors or related companies. Terzo Digital were recently elected onto the WITS PSAC for a further two years. The article below was produced for WITS and is available here on the WITS website. 

 

So you are considering implementing a WITS Field device? This article provides an insight into the factors you may need to consider and the steps you may have to take to do that. By pulling together some of the experiences of current WITS device manufacturers on the PSAC, it also provides a glimpse into the types of issues that others in your position have found important.

To explain a few terms before we dive in to the article, the protocol is called WITS-DNP3 as it is based on DNP3, for the remainder of this article we will just refer to it as the WITS protocol. The PSA is the Protocol Standards Association, set up to manage the protocol and any other protocols developed. The PSAC is the PSA Committee, a group of six users and six vendors of the PSA who are voted onto the PSAC by the members of the PSA every two years.

The majority of the article is presented in an informal and anecdotal style giving you an unordered list of things to consider, together with why they should be considered. The article ends by pulling together a roughly ordered list of the things you will need to do during planning and development. Remember though that each vendor organisation is likely to have a different experience depending upon their exact situation, so please treat this in the advisory sense in which it is written.

 

Complex problem made simple sends computer scientists wild

freeimages.com/Wagner Magni Theoretical computer scientists are normally a fairly sedate bunch, but are humming with excitement after a potential breakthrough in a long-standing problem called graph isomorphism.

Free software we used when starting up

We’re a two-man software consultancy that started up, from scratch and with bootstrap funding, in the spring of 2014. Like most businesses, and indeed many business people, we’ve used an array of different software products in the course of starting up and keeping going over the last 18 months. I thought it would be useful to share with you the highlights – software that helps us do our business and has proven to be more than an install-use-once-then-delete experience for us. Poorer products that have been tried and discarded have not been mentioned – hopefully this list will help someone make some shortcuts to finding the right piece of software to do a job for them.

I debated what to call this article. Some of the tools I mention are cloud-based services, either accessed through a browser or via an app. Some tools are apps that live on the computer itself. Some are just very useful websites that I find myself going back to, time and time again. However, all have the same thing in common: the service they provide is either free or low cost, and using it has made an appreciable difference to the business.

 

Secure your website – stop the hackers grabbing your data

freeimages.com/Syam Hassan The Talktalk website hack, and subsequent breach of its customers’ data, has cost Talktalk £35 million and counting. There’s also it’s brand reputation to consider. However, there’s plenty of good advice around to help. Here’s a very good article about some simple, practical steps you can take to make it much, much harder for…

Fun at the Football Hackathon

Earlier this year Mark took part in our first hackathon. In this case it was a Football Hackathon, where teams of like-minded football fans tried to put together novel applications related to football. The whole event kicked off on Friday night with a social meeting with the organisers and sponsors at The Counting House pub near Bank in London. The sponsors, including Onefootball, X8, Pusher and WIP presented at the social and it was a great chance to get to know the other participants prior to the main event.

Freeimages.com/Christopher Bruno

Terzo awarded business support grant from Reigate and Banstead Borough Council

Terzo Digital, a software engineering consultancy, was founded in 2014 and is partly based in the borough of Reigate and Banstead. Reigate & Banstead Borough Council is active in promoting and supporting locally-based businesses and operate a number of schemes to help support this vital part of the local economy.

Make Tracks: Terzo’s first app is released on the Android App Store

Terzo Digital are pleased to announce the release of their first app on the Android App Store. The puzzle game, "Make Tracks" was released by Terzo's game brand "Minelark" on 17th December 2014 and is freely available from the link below or by searching the App Store for "Minelark".

 Get it on Google Play

Terzo on Twitter

Terzo Digital Ltd has an official voice on Twitter using the handle @terzodigital. Please follow us as we’ll be keeping an eye on the world of mobile development, and software development in general. We’ll be retweeting important news, commenting on developments in the industry, and telling you what we’ve been up to.

Terzo Digital launched

Terzo Digital Ltd has been incorporated as a Limited Company in England. Terzo brings together two dynamic, senior individuals (Mark Davison and Neil Tubman) to create a unique business. The founders have broad capabilities and in-depth experience in the field of IT, and more specifically software engineering.   The business will focus on leveraging these…