Author Archives: Wayne Horkan

About Wayne Horkan

I’m a technologist and engineer, typically working in enterprise architecture and systems engineering.

Reaction to FT’s Comparative Analysis of AI Video Models: Sora versus Runway

In the rapidly evolving field of artificial intelligence, video generation technologies are shaping up to be the next frontier in digital media creation. As companies strive to leverage AI for more realistic and creative video content, OpenAI’s Sora is emerging as a standout contender. A recent evaluation by the Financial Times, which tested several AI video models including Sora, Runway, and Pika, revealed intriguing results about their capabilities. This article delves into why Sora appears to be leading the pack, potentially redefining how industries like advertising, animation, and real estate utilize video content in the digital age.

Continue reading

The Ideal Strengths and Capabilities of Service Desk Professionals: Shaping the Future of IT Support

What are the essential strengths and capabilities that define the best in IT support leadership? From fostering a positive workplace culture to mastering the latest in technical expertise, learn how service desk managers and third-line engineers are shaping the future of IT support. This insightful article dives deep into the qualities that make these professionals indispensable to their teams and organizations. Join us in exploring the key insights that drive success in the fast-evolving world of IT support.

Continue reading

Neurodiversity Is Our Strength

Neurodiversity is not just a concept; it is a testament to the boundless potential of the human mind. It’s the understanding that our brains, like the landscapes of the earth, are wonderfully diverse, each contour and crevice holding the possibility of unique thoughts, perspectives, and ways of interacting with the world. This diversity is not a weakness to be corrected, but a strength to be celebrated and harnessed.

Continue reading

Reasons not to implement Multi-Factor Authentication (MFA)

The article discusses the various reasons why organizations may choose not to implement Multi-Factor Authentication (MFA), despite its significant security benefits. These reasons range from cost and complexity to technical and regulatory challenges, emphasizing the need for a balanced assessment of MFA’s advantages and drawbacks.

Continue reading

Comparing and Mapping ISO 27001 and ISO 31000

This article delves into the comparative analysis and practical integration of ISO 27001 and ISO 31000 standards, focusing on their synergies in enhancing organizational risk management strategies. It offers insights into the distinct yet complementary roles of ISO 27001’s information security management and ISO 31000’s broader risk management frameworks, advocating for a unified approach to manage and mitigate diverse organizational risks effectively.

Continue reading

Understanding Key Product Development Roles: Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager

This guide delineates the distinct yet interrelated roles of Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager within the product development ecosystem. It aims to clarify the focus, responsibilities, and objectives of each role, highlighting how they contribute to the successful development and management of products.

Continue reading

Lester Dent’s Master Plot Formula: A Guide for Structuring Compelling Narratives

This article outlines Lester Dent’s Master Plot Formula, a systematic approach designed to help writers craft engaging and tightly structured stories. Originating from the pulp fiction era, Dent’s formula divides a story into four equal parts, each with specific goals and challenges for the protagonist, culminating in a resolution that ties up the narrative threads. It offers a practical framework for narrative development, emphasizing pacing, character predicaments, and a satisfying conclusion.

Continue reading

Securing Success: Strategic Questions for Cyber Startups Seeking Growth in the West Midlands and UK

This article outlines critical questions that cyber security startups, particularly those like Cyber Tzar after completing the NCSC’s “NCSC for Startups” Accelerator programme, should consider when seeking support from regional organizations such as the West Midlands Growth Company or Invest West Midlands. It emphasizes prioritising inquiries around funding and marketing to harness regional opportunities for development and expansion.

Continue reading

The Senate’s Latest Quest for Social Media Accountability

In an era where social media’s sway on public opinion, privacy, and youth well-being has become a burning issue, the U.S. Senate Judiciary Committee’s latest hearing on Wednesday the 31st of January, 2024, offers a pivotal glimpse into the potential future of digital regulation. This article provides an insightful summary of the discussions, focusing on the balance between innovation and user safety, the complex web of accountability, and the global implications of legislative measures. It’s a must-read for anyone interested in understanding the evolving digital governance landscape and its impact on society.

Continue reading