Beware when connecting to Wi-Fi

At E3 (an annual technology conference) this year, a new video game was showcased. Watch Dogs, set in the near future, is a game about an elite hacker who can hack into any device as long as it has a Wi-Fi connection. In the short demo, you see the character listen in on private conversations,…

Modernize POS with iPad and app

One of the most common elements of small businesses is the point of sale system. Many businesses use the traditional setup of a cash register, cash drawer, printer and inventory management system. These systems have historically been the last to be upgraded. There’s a new app for the iPad however that’s out the change this.…

Three easy ways to backup Android tablet

Android tablets have come a long way in a relatively short period of time, and many small businesses have taken to integrating them into their daily operations. Like any technical device, there is a chance a tablet will fail and you’ll lose the applications, settings and other data stored on the tablet. To minimize the…

Better security due to authentication

The recent LinkedIn password breach and the various Mac and Windows Trojan horses have many small business managers wondering if their data is actually safe. Even if you take steps to ensure safety, they may not be enough and your data may still be at risk. One method companies could implement is two factor authentication.…

Intel gives processors a Turbo Boost

A few months ago Intel released the Ivy Bridge processor. Subsequently, computer manufacturers have been releasing computers with the processor and have been extolling the benefits of upgrading, along with some new features like Turbo Boost. These terms can be confusing and could trick you into unnecessary upgrades. Here’s an overview of what exactly Ivy…

Prepare for the worst with BCP

Disasters happen on a daily basis. Sometimes they’re big, wiping out communities, other times they’re small, affecting one online machine or computer. No matter the size of disaster, it pays for businesses, especially small businesses, to prepare for the worst. The only problem is, many small businesses don’t prepare and pay the price. When a…

Don’t just unplug your USB device

One of the most common ways to connect peripherals to your computer is by using a USB connection. You can connect a multitude of things, including your phone, external hard drives, mice and keyboards. Often many employees will plug one of these in, and when they’re done using it just unplug it. Doing this could…

Facebook’s useful hidden features

One of the most popular things software developers do is provide hidden functions, often called easter eggs. These features are sometimes jokes, other times they’re a useful function that for some reason was deemed not important enough to make it onto the main parts of the program. Facebook has some hidden features that are useful…

The end of the .com era as we know it!

As we exit the age of IPv4 and move into the IPv6 generation another change is taking place on the Internet that will be far more visible to most users. The dot com era may soon draw to an end, and that could lead to some unexpected headaches on corporate networks around the world.The Internet…

Peering through the vapor: Simplifying the Cloud

The term “Cloud” seems like it is everywhere these days. Cloud backup, cloud PC, even Cloud assistants. Gone are the days where “Cloud” meant multitenant geographically separate always-on service. Today important concepts like retaining Intellectual Property (IP), country of origin, distribution restrictions, and data-at-rest protection all must be considered when evaluating a cloud strategy for…