Category Archives: article

The Industrial Revolution: Quantification Meets Engineering

The Industrial Revolution, spanning the late 18th and 19th centuries, marked a seismic shift in human history. This period of rapid technological advancement, urbanization, and industrialization brought with it both opportunities and unprecedented challenges. As societies grappled with the complexity of large-scale infrastructure projects, mechanized production, and financial markets, the quantification of risk became an essential tool for decision-making. This essay explores how the Industrial Revolution catalyzed the integration of probability, statistics, and engineering into risk assessment, laying the groundwork for modern practices in safety, reliability, and financial risk management.

Continue reading

More Cloud Computing Bollocks: Myths, Missteps, and Overblown Claims

Cloud computing has become the backbone of modern technology, powering everything from streaming services and apps to enterprise infrastructure. It promises flexibility, cost savings, and scalability that were unimaginable a decade ago. But like any hyped technology, cloud computing is surrounded by its fair share of misconceptions, overpromises, and, yes, bollocks.

Continue reading

The Enlightenment: Formalizing Risk Assessment

The Enlightenment, spanning the 17th and 18th centuries, was a transformative period in intellectual and scientific history. During this era, humanity began to apply rational thought, empirical observation, and mathematical rigor to address questions of uncertainty and risk. The formalization of risk assessment emerged as a critical outcome of this intellectual revolution, driven by advancements in actuarial science, economics, and probability theory. This essay explores the key contributions of the Enlightenment to the field of risk assessment, highlighting pivotal figures, innovations, and ideas that continue to shape our understanding of risk today.

Continue reading

Exit Strategy 12: Summary and Bringing It All Together: Your Roadmap to a Successful Exit

Throughout this series, we’ve explored every stage of the exit process, from understanding the basics of an exit strategy to maximizing value during negotiations. Each article has delved into the nuances of preparation, industry dynamics, and strategic decision-making, all aimed at empowering you to achieve a smooth and successful exit.

Continue reading

The Ides of March: Reflections on Cyber, Startups, and Scaling Innovation

The Ides of March is a fitting time to reflect on betrayal, resilience, and the realities of UK cybersecurity. In the past two weeks, I’ve balanced DSIT’s Cyber Local funding process, chaired the West Midlands Cyber Working Group (WM CWG), led two funding bids, scaled one startup in a brutal funding climate, and booted up a second from scratch. Along the way, I’ve won the Pitch Battle at Cyber Runway Live, launched the UK’s first dedicated universal cyber risk score and comparison site, and tackled everything from weaponised AI threats to Kafka-powered scalability, all while navigating the messy, unpredictable, and often painful journey of building something that lasts.

Continue reading

More EdTech Bollocks: The Empty Promises of Technology in Education

Education technology, or EdTech, is often heralded as the saviour of modern learning. From AI tutors and personalised learning platforms to interactive apps and virtual classrooms, we’re told that technology will democratise education, close achievement gaps, and prepare students for the jobs of the future. But despite billions of dollars poured into EdTech solutions, the reality often falls far short of the hype.

Continue reading

The Renaissance and the Birth of Probability Theory

The Renaissance marked a transformative era of intellectual and scientific discovery, laying the foundations for many modern disciplines. Among its most significant contributions was the birth of probability theory, a mathematical framework that profoundly influenced the field of risk quantification. This period of innovation bridged abstract mathematical inquiry with practical applications, particularly in areas like gambling, insurance, and finance, establishing a systematic approach to understanding uncertainty.

Continue reading

Exit Strategy 11: Maximising Value During Negotiations: Strategies for a Successful Deal

The negotiation stage of an exit strategy is where the value of your hard work and preparation truly comes to fruition. Securing a favourable deal requires balancing your business’s worth, buyer expectations, and strategic interests. To maximize value, you need to enter negotiations well-prepared, stay focused on key priorities, and employ effective tactics.

Continue reading

Radia Perlman and the Innovation of STP and OSPF: A Legacy in Networking for International Women’s Day

Radia Perlman, often called the “Mother of the Internet”, revolutionized networking with her Spanning Tree Protocol (STP) and contributions to Open Shortest Path First (OSPF). Her innovations enabled loop-free redundancy in Ethernet networks and fast, scalable routing in modern infrastructure. Beyond STP and OSPF, Perlman has worked on network security, PKI, and TRILL, ensuring the internet remains resilient and efficient. As we celebrate International Women’s Day, recognizing pioneers like Perlman reminds us of the vital role of women in shaping technology.

Continue reading

More Wearable Tech Bollocks: Empty Promises and Unnecessary Gadgets

Wearable technology is everywhere—from smartwatches and fitness trackers to “revolutionary” health-monitoring rings and smart glasses. Promoted as tools to enhance your health, productivity, and connectivity, these devices promise to be indispensable. But while wearables do have some legitimate uses, the market is oversaturated with overhyped claims, gimmicks, and, frankly, bollocks.

Continue reading

The Middle Ages: The Role of Commerce and Insurance in Risk Management

The Middle Ages was a period of significant transformation in commerce, trade, and risk management. With the expansion of trade routes and the growing complexity of financial transactions, merchants and traders faced numerous uncertainties, including piracy, shipwrecks, and fluctuating market conditions. These challenges necessitated the development of innovative mechanisms for risk mitigation, many of which laid the foundation for modern financial and insurance systems.

Continue reading

Exit Strategy 10: Building a Resilient Business: Preparing for Unexpected Exit Opportunities

In business, opportunities often come when you least expect them. An unsolicited offer, an industry consolidation wave, or a sudden market shift could present the perfect moment to exit. However, without preparation, even the best opportunities can slip away. Building a resilient business ensures you’re always ready to capitalize on these moments while maintaining long-term growth and stability.

Continue reading

More Green Tech Bollocks: Greenwashing, Overpromises, and the Reality of Sustainable Innovation

Green technology is often hailed as the saviour of our planet. From solar panels and electric cars to carbon capture and smart grids, we’re told that innovation will lead us to a cleaner, greener future. While there’s no doubt that technology plays a vital role in addressing climate change, the reality of green tech is often far messier than the marketing suggests.

Continue reading

Antiquity: Early Intuitions of Risk

Risk, as we understand it today, was not a formalized concept in antiquity. Instead, it was deeply rooted in survival instincts and the need to navigate an unpredictable world. Ancient civilizations relied on rituals, divination, and early forms of governance to mitigate uncertainty and prepare for the unknown. These efforts, though primitive by modern standards, reflect the human desire to manage risks in the face of natural and societal challenges.

Continue reading

Christian Symbolism in The Mythical Man-Month: Reflections on Faith and Software Engineering

In the world of software engineering, The Mythical Man-Month by Fred Brooks is regarded as a seminal work, a collection of essays reflecting the complexities, challenges, and lessons learned from managing large-scale software development projects. Published in 1975, the book is best known for its contributions to project management theory and software development practices. Despite avoiding superlatives I feel it is the most important book on Computer Systems design and development and that all aspiring technologists should read it. Interestingly, beneath its technical content lies a rich layer of Christian symbolism and theological reflection that often goes unnoticed. This symbolism reflects Brooks’s deeply held Christian beliefs and provides a moral and philosophical framework for understanding the lessons of the book.

Continue reading

Exit Strategy 9: Exit Strategies for Specific Industries: Tailoring Your Approach to Sector Dynamics

No two industries are alike, and the same holds true for exit strategies. Buyers in different sectors prioritize unique metrics, value drivers, and risk factors, which means your exit plan must align with the dynamics of your specific industry. Whether you’re in technology, healthcare, retail, or manufacturing, understanding these nuances can significantly enhance your valuation and attract the right buyers.

Continue reading

The Risks of Self-Hosting DeepSeek: Ethical Controls, Criminal Facilitation, and Manipulative Potential

Self-hosting advanced AI models like DeepSeek grant unparalleled control but poses severe risks if ethical constraints are removed. With relatively simple modifications, users can disable safeguards, enabling AI to assist in cybercrime, fraud, terrorism, and psychological manipulation. Such models could automate hacking, facilitate gaslighting, and fuel disinformation campaigns. The open-source AI community must balance innovation with security, while policymakers must consider regulations to curb AI misuse in self-hosted environments before it becomes an uncontrollable threat.

Continue reading

More Data Privacy Bollocks: Myths, Missteps, and Misleading Promises

Data privacy is a hot topic in the modern age, with tech companies, governments, and advocacy groups all claiming to take it seriously. From GDPR compliance banners to promises of “end-to-end encryption,” the message is clear: your data is safe and secure. Or is it? Beneath the glossy surface of privacy pledges lies a mess of contradictions, loopholes, and outright bollocks.

Continue reading

A History of Risk Quantification

Risk quantification, the practice of measuring and assessing uncertainties, has evolved over centuries, reflecting humanity’s growing desire to understand and mitigate the uncertainties of life. From ancient times to the modern era, the tools, techniques, and philosophies behind this discipline have shaped decision-making, commerce, and science. Here is a brief history of risk quantification, starting with its origins in antiquity.

Continue reading