Blog

Laptop, Tablet… Or 2-in-1?

Are you toting around two devices – a laptop to get serious work done and a tablet for a little Baldur’s Gate or Facebook action?  If you’re in the market for a new laptop or tablet, it’s time to consider getting a 2-in-1. Like an SUV or Swiss Army knife, 2-in-1’s offer supreme versatility.

Virtual Reality – Useless gimmick, or valuable marketing tool for your business?

According to investment firm Piper Jaffray, there will be $5.4 billion worth of virtual reality devices on the market by 2025. The uses for small business are limited only by imagination.  A roofing company, for instance, could, with this technology, give their prospective customers a live virtual tour of their roof, demonstrating its condition and places where they need to replace shingles – without having to climb up on it.

Encryption in The Cloud – How safe is your data?

Cloud technology can add a whole new layer of protection to your data backup system. However, it’s important to recognize that there’s one key difference between cloud service providers that will determine how safe your data is.  When stored data – aka “data at rest” (vs.

Conquering Connecting

“Everyone looks so much better when they smile.” – Jimmy Fallon, host of the legendary The Tonight Show

What a meteoric ride Jimmy Fallon has had to the top!

How did this son of an IBM machine repairman get to the chair once occupied by maybe the most legendary figure in comedy TV for 30 years straight, Johnny Carson?

He did it through exceptional networking.

Shiny New Gadget Of The Month: All This… For Just Five Bucks???

If you haven’t tried Fiverr.com yet, you’re in for a treat.  Fiverr is a global online marketplace where freelancers offer to perform an amazing variety of tasks and services, starting at just $5.00.

Need a whiteboard-style video for your website?  A new logo?  Help creating a PowerPoint or Prezi presentation?  Then you need to check out Fiverr.

10 Things You Must Do Now To Prevent A Costly Data Disaster

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster...

Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes.

Different types of hackers defined

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.