Thursday, June 21, 2018
Home Authors Posts by Clive Howard

Clive Howard

Clive Howard
12 POSTS 0 COMMENTS
Clive Howard is a technology consultant and Entrepreneur with over 15 years’ experience in the web industry. He started his career as a developer in digital agencies before founding his own consultancy in 2002. The last 2 years have been spent delivering strategic “User Experience” improvement programmes that have enhanced business effectiveness and customer engagement. His clients have ranged from one person start-ups to global brands that span industries as diverse as Healthcare, Entertainment, Publishing and Finance. He has a passion for innovation and technology that demonstrates sustainable benefits for businesses and their customers.

LATEST NEWS

Intel and Enigma work on privacy-enhancing smart contracts

According to Coindesk, Intel and blockchain start-up Enigma are working on privacy-enhancing smart contracts. Privacy-enhancing smart contracts seek to hide transaction data from general inspection. Enigma...
Telstra wields the axe

Telstra cuts jobs and prepares more asset sales

Communications company Telstra has announced its latest strategy for the business called Telstra2022. The company claims that its moves will: "improve customer experience, simplify...
Cryptocurrencies

Bithumb robbed – again!

South Korean crypto-coin exchange, Bithumb, has been robbed again. The company claims on its website that: "BTC Korea co protects your esteemed assets, backed...
DevOpsGuys renames to DevOpsGroup (Image credit www.devopsguys.com video

DevOpsGuys rises phoenix like at DevOpsGroup

DevOpsGuys has announced a funding round by the Business Growth Fund as it prepares for future growth. The company has also changed its name...

DHS investigates blockchain for IoT

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a grant to Factom to begin beta testing of a capability...
F-Secure buys MWR InfoSecurity

F-Secure acquires MWR InfoSecurity

Finnish cyber security powerhouse, F-Secure, has signed an agreement to buy MWR InfoSecurity. This move adds around 400 new employees to F-Secure, many of them...
Image credit PIxabay/Lincerta and LinkedIN Sanj Bhayro

Salesforce delivers for small businesses and non profits

Enterprise Times spoke to Sanj Bhayro, SVP - EMEA Commercial Sales at Salesforce at the recent Salesforce World Tour event in London.  Sanj Bhayro spoke...
Bank for International Settlements

BIS slams cryptocurrencies (and blockchains, for good measure)

The Bank for International Settlements (BIS) has published a damning assessment of cryptocurrencies and by extension blockchains or distributed ledger technology (DLT, as it...
Football Germany Mexico Image credit Pixabay/RonnyK (c) 2018

SAP looks to future of German football after defeat

As the German football team slid to an unexpected defeat to Mexico at the World Cup in Russia, SAP announced innovations to its sports...
Blue Frontiers adopts Kleros for dispute resolution

Kleros delivers dispute resolution for floating cities

This week, scientists reported that the Antarctic was losing 200 billion tonnes of ice per year (registration required). The result is that sea levels...

Ivanti’s Steve Daly and his prime foci

Steve Daly, Ivanti’s President and CEO and in Madrid for Interchange18, discussed with Enterprise Times some of his prime foci for the future along...
freeze pane - image source: Pixabay.com

How to apply freeze panes in Excel

I really feel for people who struggle with their Excel spreadsheets not knowing some of the features that really help create and update the...

Spiking and Nebulas to partner for blockchain financial signals search and processing

Spiking and Nebulas have signed a Memorandum of Understanding to develop core search technologies. Spiking is a blockchain asset validation and AI-driven crypto trading...
Okta warns of Apple code-signing vulnerability

Okta asks – did Apple really approve that code?

Enterprise security vendor Okta, has taken a bite out of Apple's much vaunted security model. It has identified a vulnerability that allows anyone to...