The Official GEN Blog

The Curious Codex

Welcome to the Curious Codex, the official GEN Blog; a collection of interesting articles bringing a mix of tech, news, and insights. These articles are written by our staff, our customers, our resellers and sometimes our friends, so please remember they may not reflect the official company position on anything. We can assure you that they are 100% human authored.

If you have any comments or corrections, please feel free to reach out to us on the contact page, and if you appreciate our work (or not) please give us a thumbs up or down and subscribe to GEN for updates and articles.

GEN UK Blog

  

Privacy - What is it, and Why do you want it?

Privacy - What is it, and Why do you want it?

Explore the concept of privacy in the digital age, why it matters, and how various technologies and companies impact your personal data. Learn to protect your online privacy

Released2025-03-15
Updated2025-03-19
Written byMr Bat Man
Votes0
Asterisk - A Communications Powerhouse

Asterisk - A Communications Powerhouse

Asterisk is a mature open-source telephony platform that allows extremely powerful features to be used easily

Released2025-02-03
Updated2025-02-04
Written byRichard (Senior Partner)
Votes12
Free Email - A Real World Disaster

Free Email - A Real World Disaster

Why free anything presents a significant business risk that cannot be underestimated

Released2025-01-30
Updated2025-02-04
Written byMatt (Virtualisation)
Votes11
Social Engineering Attacks

Social Engineering Attacks

Social engineering poses a significant threat to companies, particularly in compromising email accounts for money interception scams and data breaches

Released2025-01-08
Updated2025-01-10
Written byRichard (Senior Partner)
Votes12
Cloud Backup Strategies

Cloud Backup Strategies

Explore comprehensive cloud backup strategies for virtual machines and containers. Learn about image vs. content backups, considerations for different server types, security measures, and best practices for disaster recovery

Released2024-12-12
Updated2024-12-17
Written byAdam Jones (Infrastructure)
Votes8
Incident at the Paper Mill

Incident at the Paper Mill

Discover an intriguing '80s tale of troubleshooting a massive automated paper mill tractor. Follow the investigation of mysterious stops and software challenges in industrial automation

Released2024-12-03
Updated2024-12-04
Written byRichard (Senior Partner)
Votes14
Apple Under Fire for Closed Ecosystem

Apple Under Fire for Closed Ecosystem

Explore the growing antitrust challenges facing Apple's App Store exclusivity and the potential shift towards allowing third-party app stores on iPhones, as regulators worldwide scrutinize the tech giant's practices

Released2024-11-20
Updated2024-11-20
Written byRichard (Senior Partner)
Votes5
Value Added Cloud (VAC) Providers

Value Added Cloud (VAC) Providers

Explore value-added cloud providers who offer more than just infrastructure. Learn how they support systems and applications, including open-source solutions, to enhance your cloud experience.

Released2024-11-13
Updated2024-11-13
Written byMatt (Virtualisation)
Votes17
Firefox`s 20th Anniversary

Firefox`s 20th Anniversary

Explore the 30-year journey of web browsers from Netscape Navigator to Firefox. Learn about the browser wars, open-source developments, and Firefox's role in internet history.

Released2024-11-01
Updated2024-11-01
Written byRichard (Senior Partner)
Votes13
Platform Diversity in IT Maintenance: Supporting Legacy to Modern Systems

Platform Diversity in IT Maintenance: Supporting Legacy to Modern Systems

Explore GEN's comprehensive IT maintenance services covering a wide range of platforms from legacy to modern systems. Learn about Linux dominance

Released2024-10-24
Updated2024-10-28
Written byRichard (Senior Partner)
Votes9
Cold and Hot Spares in Cloud Computing

Cold and Hot Spares in Cloud Computing

Explore cold spares in cloud computing: their role in disaster recovery, cost-effectiveness, and implementation strategies. Learn how they are used and work

Released2024-10-10
Updated2024-10-28
Written byMatt (Virtualisation)
Votes7
The Dark Side of Google Chrome: How Your Browser Betrays You

The Dark Side of Google Chrome: How Your Browser Betrays You

Discover why Google Chrome is a privacy nightmare. Learn how it tracks your every move, exploits your data, and compromises your online freedom. Explore alternatives for a safer browsing experience

Released2024-10-03
Updated2025-03-04
Written byRichard (Senior Partner)
Votes49
The Rise of Automated Pestering: When Marketing Goes Too Far

The Rise of Automated Pestering: When Marketing Goes Too Far

Explore the growing trend of automated hassling in marketing, its impact on user experience, and how businesses can strike a balance between engagement and annoyance

Released2024-09-23
Updated2024-11-27
Written byRichard (Senior Partner)
Votes15
Effective Strategies to Prevent Contact Form Spam

Effective Strategies to Prevent Contact Form Spam

Learn powerful techniques to stop automated form submissions, reduce spam, and improve website security. Discover best practices for contact form protection.

Released2024-09-11
Updated2024-09-22
Written byRichard (Senior Partner)
Votes12
UK Business Energy Market

UK Business Energy Market

Explore UK energy pricing mechanisms, wholesale gas trends, and their impact on business costs. Analyse energy companies profits and sustainability

Released2024-09-04
Updated2024-11-12
Written byRichard (Senior Partner)
Votes37
I've Been Hacked!

I've Been Hacked!

A discussion around the reasons for and the failures for getting 'hacked' either business or personal

Released2024-08-24
Updated2024-08-29
Written byRichard (Senior Partner)
Votes16
Cloud Hosted Options, Virtual vs Dedicated

Cloud Hosted Options, Virtual vs Dedicated

Explore the differences between virtual and dedicated cloud hosting options. Learn about their advantages, flexibility, cost factors, and how to choose the right solution for your needs

Released2024-08-21
Updated2024-08-25
Written byMatt (Virtualisation)
Votes10
Advances in Remote Support over the last 30 years

Advances in Remote Support over the last 30 years

Exploring how things have changed over the years with remote support and other instant support options.

Released2024-08-14
Updated2024-08-29
Written byRichard (Senior Partner)
Votes13
Protecting Your Digital Content: Copyright Challenges in the Age of AI and Web Scraping

Protecting Your Digital Content: Copyright Challenges in the Age of AI and Web Scraping

Explore the complexities of copyright protection for online content creators in the face of AI training, web scraping, and global jurisdiction issues. Learn about fair dealing, practical protection methods, and the limitations of current safeguards.

Released2024-07-30
Updated2024-08-29
Written byRichard (Senior Partner)
Votes22
Email Threats and Extortion - A review

Email Threats and Extortion - A review

Discover how email extortion scams use clever encoding to bypass spam filters. Learn to identify and protect yourself from these threats

Released2024-07-23
Updated2024-10-28
Written byAdam Jones (Infrastructure)
Votes11
From Defender to Offender: CrowdStrike's Billion-Dollar Blunder

From Defender to Offender: CrowdStrike's Billion-Dollar Blunder

In the wake of the crowdstrike disaster, are there better options available

Released2024-07-22
Updated2024-09-02
Written byRichard (Senior Partner)
Votes35
UK Broadband; ADSL, FTTC, FTTP, BT, Openreach and the future

UK Broadband; ADSL, FTTC, FTTP, BT, Openreach and the future

Explore the evolution of UK broadband from ADSL to FTTP. Learn about the history, technology, and future of internet connectivity in the UK, and the transition to fiber

Released2024-07-15
Updated2024-10-28
Written byRichard (Senior Partner)
Votes22
Disaster Recovery and Business Continuity in 2024

Disaster Recovery and Business Continuity in 2024

How can we protect our business and systems from catastrophic events

Released2024-07-09
Updated2024-09-02
Written byRichard (Senior Partner)
Votes26
The Software you own, the Software you don't

The Software you own, the Software you don't

The current trend of rent to use software across the spectrum is really bad, for you

Released2024-07-04
Updated2024-09-02
Written byRichard (Senior Partner)
Votes17
Free CV Critique, a great example of machine generated nonsense

Free CV Critique, a great example of machine generated nonsense

Many job sites offer a 'free' CV Critique or Review, but actually its nonsense and just a lead generation tool

Released2024-06-28
Updated2024-09-23
Written byMr Bat Man
Votes30
Programming languages over the last 40 years

Programming languages over the last 40 years

Analysing the popularity of programming languages over the last 4 decades

Released2024-06-25
Updated2024-09-03
Written byRichard (Senior Partner)
Votes6
Trustpilot censors their own Bad Reviews

Trustpilot censors their own Bad Reviews

How can we trust the company claiming to be impartial when they censor their own reviews

Released2024-06-24
Updated2025-01-16
Written byMatt (Virtualisation)
Votes11
AI Generated Code and its Impact on Code Stability

AI Generated Code and its Impact on Code Stability

AI can be good for many things, but code generation is not one of them, we'll discuss this and the impact on stability and security

Released2024-06-21
Updated2025-03-11
Written byRichard (Senior Partner)
Votes48
Artificial Intelligence and the Carbon Cost

Artificial Intelligence and the Carbon Cost

An article on the environmental impact of AI on the climate in terms of energy

Released2024-06-13
Updated2024-07-13
Written byRichard (Senior Partner)
Votes24
Using Telnyx S3 Storage with Synology Cloud Sync

Using Telnyx S3 Storage with Synology Cloud Sync

Telnyx provides a cost effective and functional NAS backup solution with 10GB Free

Released2024-06-06
Updated2024-06-16
Written byRichard (Senior Partner)
Votes65
Deliveroo Accused of Violating GDPR by Selling Customer Data to Restaurant Chains

Deliveroo Accused of Violating GDPR by Selling Customer Data to Restaurant Chains

Discover how Deliveroo allegedly violated GDPR by selling customer data to restaurant chains, and learn about the implications for data privacy and protection

Released2024-05-31
Updated2024-12-17
Written byRichard (Senior Partner)
Votes49
GDPR and Cloud Hositng Considerations

GDPR and Cloud Hositng Considerations

Explore key considerations, data protection principles, and best practices for ensuring data security and regulatory compliance with GDPR in the UK

Released2024-05-29
Updated2024-09-03
Written byRichard (Senior Partner)
Votes47
Don't let your Chatbot land you in Court

Don't let your Chatbot land you in Court

Discover the pitfalls of using chatbots for customer service, including real-world examples and insights on why poorly implemented chatbots can harm your business

Released2024-05-21
Updated2024-10-28
Written byAdam Jones (Infrastructure)
Votes15
Migrating away from VMWare to ProxMox before its too late

Migrating away from VMWare to ProxMox before its too late

Explore the benefits and steps of migrating from VMware to Proxmox. Learn about cost efficiency, flexibility, and comprehensive features of Proxmox and migration

Released2024-05-19
Updated2024-10-28
Written byMatt (Virtualisation)
Votes15
ClaudeBot and a Pandemic of inconsiderate coding

ClaudeBot and a Pandemic of inconsiderate coding

Learn how inconsiderate bots can negatively impact your website's performance and bandwidth. Discover known bad bots and effective methods to block them using apache

Released2024-05-18
Updated2024-10-28
Written byMatt (Virtualisation)
Votes18
Leveraging AI for Real World Commercial Benefits

Leveraging AI for Real World Commercial Benefits

Explore how AI enhances business analytics with use cases in call transcription and CRM data analysis to predict customer re-purchase likelihood

Released2024-05-17
Updated2024-06-16
Written byRichard (Senior Partner)
Votes7
Synology Active Backup for Business

Synology Active Backup for Business

Explore Synology's Active Backup for Business, its challenges, and how it compares to competitors like Veeam, Acronis, and UrBackup in the backup space

Released2024-05-11
Updated2024-06-16
Written byRichard (Senior Partner)
Votes7
Information Blackmail - Microsoft Style

Information Blackmail - Microsoft Style

Discover how Microsoft uses information blackmail to extort mobile numbers, the impact on user privacy, and ways to protect your personal information

Released2024-05-09
Updated2024-06-16
Written byRichard (Senior Partner)
Votes8
Leaving the sinking ship that is RedHat

Leaving the sinking ship that is RedHat

Discover why we are leaving RedHat in 2024, citing issues with CentOS, paywalls, and website usability, and explore alternatives like Rocky and Alma Linux

Released2024-05-08
Updated2024-07-02
Written byAdam Jones (Infrastructure)
Votes8
Why Email Housekeeping is a must

Why Email Housekeeping is a must

Discover why email housekeeping is crucial. Learn about impacts of large mailboxes on performance and security. Explore solutions for effective email management

Released2024-05-05
Updated2024-07-03
Written byAdam Jones (Infrastructure)
Votes10
Why does trustarc.com damage your traffic?

Why does trustarc.com damage your traffic?

Learn how trustarc.com impacts website usability, causing delays and errors on sites like RedHat, Oracle, and DigitalOcean, and explore alternatives to avoid it

Released2024-04-29
Updated2024-06-16
Written byMatt (Virtualisation)
Votes8
The new site finally arrives

The new site finally arrives

A blog article written by GEN UK Staff or clients

Released2024-04-25
Updated2024-07-04
Written by
Votes8
Finally leaving HomeSeer for HomeAssistant

Finally leaving HomeSeer for HomeAssistant

Discover why we transitioned from HomeSeer to Home Assistant in 2023, overcoming challenges with Z-Wave and Sonoff devices, and achieving a reliable smart home setup

Released2024-01-06
Updated2024-11-01
Written byRichard (Senior Partner)
Votes9
Torrent Sites - The History, Mistakes and Failures

Torrent Sites - The History, Mistakes and Failures

Explore the history of torrent sites, their rise with BitTorrent, key mistakes, and failures, including legal battles and the impact of DNS blocks on file sharing

Released2019-08-28
Updated2024-11-01
Written by
Votes17
Protecting Your Synology NAS from Internet Threats

Protecting Your Synology NAS from Internet Threats

Your Synology NAS should be fine on the internet, as long as you follow the recommendations and setup the firewall correctly

Released2019-07-25
Updated2024-07-10
Written byAdam Jones (Infrastructure)
Votes2
Amazon and Ebay for Business Procurement

Amazon and Ebay for Business Procurement

Comparing the platforms and assessing their suitability for business use

Released2019-06-04
Updated2024-09-11
Written byRichard (Senior Partner)
Votes3
A VPN is unlikely to protect you

A VPN is unlikely to protect you

NO matter what the internet says, a VPN isn't going to make you anonymous without some careful considerations

Released2019-05-17
Updated2024-07-11
Written byMatt (Virtualisation)
Votes2
How to annoy your customers with Google ReCaptcha

How to annoy your customers with Google ReCaptcha

Discover why Google ReCaptcha annoys users, its privacy concerns, and explore effective, user-friendly alternatives to improve your website's user experience

Released2019-04-30
Updated2024-12-07
Written byRichard (Senior Partner)
Votes18
The Food Delivery War (Deliveroo, Just-Eat, UberEats) Comparison and Analysis

The Food Delivery War (Deliveroo, Just-Eat, UberEats) Comparison and Analysis

Released2019-02-16
Updated2024-07-14
Written by
Votes2
The curious case of Traffic Exchanges

The curious case of Traffic Exchanges

Explore the pros and cons of various traffic exchange sites, their impact on SEO, and the potential risks involved in using these services for website ranking

Released2019-01-28
Updated2024-11-01
Written byMatt (Virtualisation)
Votes4
FreePBX as a route to a Data Breach

FreePBX as a route to a Data Breach

FreePBX has a long established history, from Schmooze to its buyout by Sangoma and their commercialisation of it, but its weak as products go

Released2017-06-08
Updated2025-02-02
Written byMatt (Virtualisation)
Votes8