Modernize POS with iPad and app

One of the most common elements of small businesses is the point of sale system. Many businesses use the traditional setup of a cash register, cash drawer, printer and inventory management system. These systems have historically been the last to be upgraded. There’s a new app for the iPad however that’s out the change this.…

Details

Three easy ways to backup Android tablet

Android tablets have come a long way in a relatively short period of time, and many small businesses have taken to integrating them into their daily operations. Like any technical device, there is a chance a tablet will fail and you’ll lose the applications, settings and other data stored on the tablet. To minimize the…

Details

Better security due to authentication

The recent LinkedIn password breach and the various Mac and Windows Trojan horses have many small business managers wondering if their data is actually safe. Even if you take steps to ensure safety, they may not be enough and your data may still be at risk. One method companies could implement is two factor authentication.…

Details

Intel gives processors a Turbo Boost

A few months ago Intel released the Ivy Bridge processor. Subsequently, computer manufacturers have been releasing computers with the processor and have been extolling the benefits of upgrading, along with some new features like Turbo Boost. These terms can be confusing and could trick you into unnecessary upgrades. Here’s an overview of what exactly Ivy…

Details

Prepare for the worst with BCP

Disasters happen on a daily basis. Sometimes they’re big, wiping out communities, other times they’re small, affecting one online machine or computer. No matter the size of disaster, it pays for businesses, especially small businesses, to prepare for the worst. The only problem is, many small businesses don’t prepare and pay the price. When a…

Details

Don’t just unplug your USB device

One of the most common ways to connect peripherals to your computer is by using a USB connection. You can connect a multitude of things, including your phone, external hard drives, mice and keyboards. Often many employees will plug one of these in, and when they’re done using it just unplug it. Doing this could…

Details

Facebook’s useful hidden features

One of the most popular things software developers do is provide hidden functions, often called easter eggs. These features are sometimes jokes, other times they’re a useful function that for some reason was deemed not important enough to make it onto the main parts of the program. Facebook has some hidden features that are useful…

Details

Peering through the vapor: Simplifying the Cloud

The term “Cloud” seems like it is everywhere these days. Cloud backup, cloud PC, even Cloud assistants. Gone are the days where “Cloud” meant multitenant geographically separate always-on service. Today important concepts like retaining Intellectual Property (IP), country of origin, distribution restrictions, and data-at-rest protection all must be considered when evaluating a cloud strategy for…

Details

Securing IPv6 Networks

For 20+ years IPv4 has been the world standard for Internet-attached device communication. As we enter the age of IPv6 a new gamut of security, performance, and equipment challenges are being revealed. Recently, FortiNet teamed with BreakingPoint to perform a real-world ultra-high bandwidth test of an IPv6-enabled FortiGate firewall. This test series yielded some surprising…

Details