News Articles

Opternative is the most convenient way to get a prescription for glasses and contacts online. The Opternative online eye exam can be taken anywhere, anytime, to get a physician-approved prescription within 24 hours. 

Cupris’s mission is to improve healthcare access globally by enhancing communication in healthcare. Cupris provides a unique solution enabling both healthcare communication through an app and web platform, and clinical examination with smartphone-connected medical devices.

Hi I’m David Starkey, I’m a 24 year old PhD candidate at the University of St Andrews and I’m studying Physics.

I’m part of a study that searches for active galaxies. These are also known as quasars (although the term can denote a variety of objects). An active galaxy is a galaxy that shines very brightly – due to the presence of a black hole that is consuming enormous amounts of mass. The material being consumed by the black hole sort of bunches up and forms a spinning disk of matter called an accretion disk.

This image of the milky way accompanies article with David Starkey

MIME Technologies was established towards the end of Alasdair's  PhD studies at The University of Aberdeen's Centre for Rural Health in Inverness. MIME's aim is to develop next generation software to aid first responders on-scene at medical emergencies. 


An image of an Ipad accompanying the article An Interview with Dr. Alasdair Mort of MIME Technologies specialists in technology for medical emergencies

Paradise Palms is a bar and music venue located in Edinburgh that specialise in Scottish sourced spirits, beers and cocktails which compliment an exceptional Scottish vegetarian soul food menu. Palms' emphasis on Scottish sourced produce is just one facet of their emphasis on community, they also have a stage for live music and cabaret, as well as a vinyl record and print store with a focus on local artists.

Paradise Palms

As the world becomes increasingly connected to the internet the phenomenon of the big web has appeared. Nowhere does this sound more dystopian than when applied to Digital Health. Broadly speaking in this article we are talking about ethical problems to look out for in future Health technology that we are already facing in areas such as cyber security.  

Picture accompanying the article Ethics in Digital Health by Mark Jennings

Wearable technologies have made the switch from niche gadgets to mainstream mainstays as more people are becoming users that want to influence and control their own health. It’s truly inspirational to see companies surpassing year-on-year growth with the latest inventive wear containing heart level monitors, pedometers, and calories pawns, to name a few. A big focus has been adopted to refine a patient’s experience within severe care, restoration, and community-based care amenities, with wearables supporting patient’s in making the transition from hospital care to independent self-care.

Image of woman exercising accompanying the article: The Role of Wearables in Digital Health

Mark Chimley, an Information Assurance Architect and Cyber Security Consultant asks "What are reasonable mobile computing security procedures?"

Working on the Move

I am writing this on a train using mobile computing devices (a netbook and a phone) and I'm fairly happy with the security measures I've put in place and the procedures I'm using to enable mobile computing, but are these appropriate controls for the majority of people? There is always a risk involved in carrying out business practices outside of an office environment but it's pretty obvious that the advantages of the mobile office in its various forms are such that few of us can constrain our work to just occurring within a traditional office.

It seemed apt to write my first post here on a topic which is becoming increasingly important for businesses: the risk of ransomware. Just as a perpetrator may hold a physical person or thing to ransom, the same applies to a company's data assets and information. Documents, images and other files are encrypted by ransomware using a key that is only held by the attacker. A ransom demand is then made for release of the key so that the victim's files can be decrypted. As with many cyber attacks against businesses or individuals, the mechanism used to mount a ransomware attack is usually through infection of the victim's computer systems with some type of malicious software.

Photo of a building accompanying the article The Risk of Ransomware

Cybersecurity and, more broadly, issues connected with cyberspace, have risen to the rank of strategic, global challenges. On the one hand, over the last few decades we have witnessed unprecedented opportunities for general development: economic, political, social, and individual. On the other, we are now facing completely new categories of threats, with potentially catastrophic consequences. All stakeholders, even the non-governmental ones, who, in the past, had limited or no tools enabling them to effectively influence the world around, now have comparatively easy access to technologies that may potentially impact entire international security systems. The Web has become a tremendous source of influence.

Image of the planetarium building in Poland accompanying the article about the Instytut Kościuszki by Aneta Urban