Author Archives: Wayne Horkan

About Wayne Horkan

I’m a technologist and engineer, typically working in enterprise architecture and systems engineering.

A Beginner’s Guide to Using MetaTrader 4 for Trading Success

Part of a short series of articles on using MetaTrader 4, written on request. This does not mean I endorse trading, MetaTrader 4, or that I’d do this because I wouldn’t. I design and build IT systems, and that’s what I’ll stick to, ta. This article is the introduction and precis to the other articles below.

Continue reading

Reaction to FT’s Comparative Analysis of AI Video Models: Sora versus Runway

In the rapidly evolving field of artificial intelligence, video generation technologies are shaping up to be the next frontier in digital media creation. As companies strive to leverage AI for more realistic and creative video content, OpenAI’s Sora is emerging as a standout contender. A recent evaluation by the Financial Times, which tested several AI video models including Sora, Runway, and Pika, revealed intriguing results about their capabilities. This article delves into why Sora appears to be leading the pack, potentially redefining how industries like advertising, animation, and real estate utilize video content in the digital age.

Continue reading

The Ideal Strengths and Capabilities of Service Desk Professionals: Shaping the Future of IT Support

What are the essential strengths and capabilities that define the best in IT support leadership? From fostering a positive workplace culture to mastering the latest in technical expertise, learn how service desk managers and third-line engineers are shaping the future of IT support. This insightful article dives deep into the qualities that make these professionals indispensable to their teams and organizations. Join us in exploring the key insights that drive success in the fast-evolving world of IT support.

Continue reading

Cyber Governance at a Crossroads: Responding to DSIT’s Consultation

This framing article summarises a set of responses to DSIT’s Cyber Governance Code of Practice consultation in Jan/Feb 2024. It highlights practitioner and institutional submissions, alongside thematic deep dives on law, assurance, incentives, and professionalism. The message: DSIT asked the right questions, but the hardest answers were still missing.

Continue reading

Professionalism and Accountability: Why Cyber Needs Recognition like Law and Engineering

This article argues that DSIT’s Cyber Governance Code of Practice must embed professional recognition for cyber experts, just as directors rely on lawyers, accountants, and engineers. Without a register of recognised professionals, directors risk being accountable without credible support.

Continue reading

Incentives, Not Just Obligations: Driving Real Uptake of Cyber Governance

This article argues that obligations alone will not drive the adoption of DSIT’s Cyber Governance Code of Practice. To succeed, the Code must be backed by incentives — tax relief, insurance benefits, procurement levers, and reputational recognition — that make governance valuable to boards. Obligations can enforce compliance; incentives will create commitment.

Continue reading

From Cyber Essentials to Corporate Governance: Raising the Bar

Cyber Essentials has value as a baseline, but reaches only 0.3% of UK organisations and says little about governance. This article argues that DSIT’s Cyber Governance Code of Practice must raise the bar, from compliance to accountability, from self-attestation to credible assurance, and from one-off certificates to continuous governance. Cyber Essentials is the floor; governance must be the ceiling.

Continue reading

Neurodiversity Is Our Strength

Neurodiversity is not just a concept; it is a testament to the boundless potential of the human mind. It’s the understanding that our brains, like the landscapes of the earth, are wonderfully diverse, each contour and crevice holding the possibility of unique thoughts, perspectives, and ways of interacting with the world. This diversity is not a weakness to be corrected, but a strength to be celebrated and harnessed.

Continue reading

Reasons not to implement Multi-Factor Authentication (MFA)

The article discusses the various reasons why organizations may choose not to implement Multi-Factor Authentication (MFA), despite its significant security benefits. These reasons range from cost and complexity to technical and regulatory challenges, emphasizing the need for a balanced assessment of MFA’s advantages and drawbacks.

Continue reading

Comparing and Mapping ISO 27001 and ISO 31000

This article delves into the comparative analysis and practical integration of ISO 27001 and ISO 31000 standards, focusing on their synergies in enhancing organizational risk management strategies. It offers insights into the distinct yet complementary roles of ISO 27001’s information security management and ISO 31000’s broader risk management frameworks, advocating for a unified approach to manage and mitigate diverse organizational risks effectively.

Continue reading

Understanding Key Product Development Roles: Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager

This guide delineates the distinct yet interrelated roles of Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager within the product development ecosystem. It aims to clarify the focus, responsibilities, and objectives of each role, highlighting how they contribute to the successful development and management of products.

Continue reading