Menu Close

The Digital Age

"Imagine a school with children who can read or write, but with teachers who cannot, and you have a metaphor of the Information Age in which we live." Peter Cochrane

The Digital Age

From a single binary digit in a transistor to a global data sphere

Not all of us are digital natives.  Many of us grew up without the sophisticated tech gadgets we hold in our palms today.  As consumers, we are replacing and adding to them on a yearly basis.  Products are getting smaller and a lot more powerful.  Every new age is marked by some type of development that ultimately becomes a new driving force of human society.  We live in the Age of Information.  We’ve also called it the Computer Age and the Digital Age.

Three key factors have been the driving force of social evolution within the Age of Information

Consider the base-10 numeral system or decimal system.  This is how many learn to understand numbers & count at school.  An entirely different system is the base-2 numeral or binary system.  The smallest binary digit, abbreviated as ‘bit’, is a single binary value, either zero or one.  Any number can be represented with only 1s and 0s, side by side in a string as long as you could wish it to be.

Switching is essential to make rapid decisions about routing information

The science of electronics produced the transistor.  Turning a switch on and off lends itself perfectly to the binary numeral system.  The transistor is a simple memory device.  When “off”, the bit stored is “0”.  When “on”, the bit stored is “1”.  What remains is to link transistors together to make very simple computational decisions.  Once only a handful of transistors, today billions of tiny transistors are integrated on a digital circuit, a microchip.

Computing power is explosive and data creates value when it improves the lives of end users.  An MRI brain scan, for example, once captured a mere thousand images.  Today, doctors are looking at 20,000 images for a single scan.  These are phenomenal breakthroughs – challenging in terms of computer data storage though undoubtedly a driving force of social evolution.

Our Memo provides further insight.


On Key

Related Posts



Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner


The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.


You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.