BLOG
Moore’s Law is still in effect. That’s the observation that computers double in power roughly every eighteen months. It’s held true for as long as computers have been around, and there’s no end in...
There’s always a risk for personal belonging loss whenever you are traveling. Airports are never as secure as you would hope, and travelers going to unfamiliar places are always easy targets for...
How many hours a day do you spend hunched over your computer, smartphone, or tablet at your desk? When you stop to think about it, the number will probably shock you, and it’s all but certain that...
Can You Trust Siri? Apple has long claimed that one of its chief advantages over Android and Windows devices is greater security. There’s a lot of truth to that, but there seems to be one glaring flaw...
A fair number of business owners are somewhat hesitant to embrace the cloud. That’s understandable, but the reality is that you’re probably already using cloud-based services yourself, and have been...
Sometimes, no matter how careful you are and how many precautions you take, the worst happens. Your company is successfully hacked. Given the number and sophistication of hacking attacks in recent...
The holidays are upon us, and with their arrival come lots and lots of photo ops. These days, almost everyone has a smartphone, and some people have more than one. Almost every smartphone comes...
Reliability and longevity are of special importance to business owners. The longer equipment can be made to last without needing repair or replacement, the better a company’s bottom line looks. A good...
In recent months, there’s been a tremendous amount of attention focused on upgrading corporate IT security, and with good reason. Hacking attacks are growing in both number and sophistication, and...