BLOG
Apple enthusiasts are waiting with baited breath for the release of the iPhone 6. As ever, speculation is rampant about the new product, what it will look like and what new features it will have...
We see them all around us every day. They are our business associates, athletes, and movie stars; even a couple of our friends fit the bill. They have it all. They are cool and collected always...
On August 18, 2014, Microsoft issued a recall on its latest security patch, dubbed MS14-045. The patch was released to fix a total of thirty-seven known security flaws with the OS and the Internet...
2014 has been a very bad year for companies on the receiving end of hacking attacks. Earlier this year, the State of Montana’s records were breached, and the data of essentially every person in the...
Quite often when you’re sending files from one place to another, a simple email attachment or Dropbox link share will work, but every once in a while you’ve got to send a fax. If you’re mobile and on...
A picture really is worth a thousand words, and sometimes you need to show a thing rather than tell about it. You’d be amazed though, at how many people aren’t sure about how to go about taking a...
We live in a hybrid digital/real world, and the lines are blurring. Soon, it will be impossible to tell where digital reality stops, and the real world begins. Millions of transactions are completed...
The best social media images are those that are shared. The number of times an image is shared is the only metric that matters. If the image is being shared then your message is being shared, which is...
New findings in an extensive research report reveal two surprises that run against everything you’ve heard about your passwords and their safety. The first is: write them down. The second is: reuse...