BLOG
Liquid computing is not another form of hardware or processor like quantum computing. As with many technology driven discussions, the focus is on mobile computing. The case is being made, and pursued...
While the vast majority of large companies already have IT policies in place, many small and even medium size businesses still operate without one. Although many smaller companies might feel that the...
Viruses have been a threat to computers since the first floppy disk and today they have never been a bigger problem for both individuals and especially, for businesses. First, antivirus solutions were...
Apple has earned a reputation for designing some of the best products in all its categories. From smartphones to computers, Apple has a true knack for style that has yet to be surpassed by its...
Wireless connectivity has become the de facto standard, both at home and in the business world. Many small business owners have a wireless network set up in their homes, and the thinking is: Hey, it...
One of the most difficult tasks any company has is filling those leading edge tech positions. It can be tough to find a person who can offer the special skills required, and many companies often go...
So you have decided to launch your business online. Maybe your business will be online exclusively or maybe you are looking to expand your traditional brick and mortar shop into the vast world of the...
During the furor over the NSA spy scandal, it was revealed that the technology in most people’s microwave ovens could be used to spy on them. Then comes the Internet of Things (IoT); a step forward in...
By now, you’ve almost certainly heard the term Shadow IT. Broadly speaking, it refers to apps and devices brought in by your employees that the company does not own, connecting to cloud-based...