Category Archives: Uncategorized

Tales from Tech Support

This guest blog post was written by Sheenika Wilson and originally appeared on the ZCorum blog. It is used with their permission. Most people usually share tales of endearment around Valentine’s Day, so I thought that I’d share some of … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

IT Support Review: 9 Checkpoints to Save Money (and Possibly Be Amused)

When it comes to providing IT support, we’ve seen a lot of things through the years. And, well, we’ve been paid for some efforts that, quite frankly, could have been avoided.  They’ve provided us with funny memories, and the checkpoints … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | 1 Comment

5 Ways To Integrate Social Media Into Your Company’s DNA

This guest post is by Jeff Bullas and originally appeared on his blog.  It is being used here with his permission. Social media is embedding itself in the human DNA as we connect and interact globally in an increasingly mobile … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

So you think you know Social Media?!

So, you’re using LinkedIn, Facebook, and Twitter. You’ve even posted a few photos to Flikr and a video or two to YouTube. You may be asking, “What’s beyond these? Are there tools that will help me to get the most … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

Basic Computer Security Tips

This guest blog post is by Howard Sherman and originally appeared on his RoyalGeeks.com blog. With the recent hacker activity leading to arrests across the USA, the UK and even Russia and Ukraine on the heels of more and more … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

Bad Guys are Everywhere: The Basics of Computer and Network Security

Bad guys are everywhere. So let’s talk about the basics of computer security.  There are a few primary objectives with computer security: to protect assets and information from any sources that would seek to compromise the computer or the network.  … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

IPv6 – Should You Take the Leap?

This guest post is by Stephane Bourque, founder and CEO of Incognito Software, and originally appeared on the Incognito blog. A few months ago, I decided to try skydiving. I had been curious for years and figured it was time, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Celebrate! The Day for IPv6 has arrived

Excuse me… did you say the internet was full?!  How could this happen?! It’s true… well, kinda sorta.  32-bit addresses have been used for the past 30 years.  The last of these 4 billion plus addresses were released by IANA … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Leave a comment

Cloud Computing – Is it Right For Your Business?

By Scott Herbert Cloud computing, put simply is the use of computers located on the Internet for your day to day computing needs, including services like web based e-mail and data storage as well as more complex tasks. Cloud computing … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

7 Advantages of Cloud Computing

Cloud computing; it isn’t right for everyone currently, but is it right for you? Continue reading

Posted in Uncategorized | 1 Comment